Expected Outcome

By the end of this program the participants in each categories will learn and be able to do the following:

  For grades 4-6:

the students will learn and be able to:

air max Scarpe nike shox adidas adidas polo camicie ぺ ニス 増大 scarpe da calcio nike free Scarpe da donna air max Asics scarpe asics hogan Scarpe nike air force Puma scarpe Puma Scarpe Adidas Scarpe

• Understand the risk of different online behaviors.

• Demonstrate some cyber threats for daily online activities, e.g., web surfing, online social, smartphones, ipad.

• Understand basic security issues.

• Follow ethics of cybersecurity and cyber laws.

• Grasp new skills, e.g., teamwork, prepare slides, public speech, communicate.

• Be self-confident

  For grades 7-9:
polos lacoste Adidas Stan Smith Zapatos nike Adidas Gazelle pulseras pandora zapatillas converse ropa hollister Zapatillas puma zapatos jordan nike shox nike air max mujer joyas tiffany nike huarache polo ralph lauren Zapatillas adidas air max zapatos louis vuitton Adidas Superstar Zapatos adidas zapatos christian louboutin

In addition to the previous outcomes in the (4-6) level, the students in this level will learn and be able to:

• Cyberethics, Cybersafety and Cybersecurity: Identify ethical and legal issues using technology and Demonstrate knowledge of social, legal, and ethical issues related to technology use through practical application.

• System Vulnerabilities: Describe key network perimeter security tools, including firewalls and intrusion detection systems, technologies that are critical to IT operations in financial institutions.

• Information hiding (Steganography): Define different techniques such as injection and substitution and tools and threats of information hiding.

• Cryptography: Describe formal definitions of security, cryptographic primitives and protocols.

  For grades 10-12:

In addition to the previous outcomes in the (4-6) and (7-9) levels, the students in this level will learn and be able to:

• Cyberethics, Cybersafety and Cybersecurity: Assist students in integrating the concepts of cyber-safety, cyber-security, and cyber-ethics (C3) into existing technology and literacy standards and curricula. Preparing students for 21st century digital communication.

• System Administration/Networking: Describe and analyze the hardware, software, components of a network and the interrelations. Explain networking protocols and their hierarchical relationship hardware and software. Compare protocol models and select appropriate protocols for a particular design.

• System Vulnerabilities: Understand common attacking techniques such as virus, Trojan, worms and memory exploits.

• Information hiding (Steganography): Define different techniques such as injection and substitution and tools and threats of information hiding. Understanding the impact of such techniques in cyber security.

• Cryptography: Cryptographic theories, principles and techniques that are used to establish security properties and understanding differences between different encryption/decryption algorithms.