Student's Categories

Our program divides students into three categories according to their grades (exiting):

  For grades 4-6:

The program provides a fun and interactive learning experience. We will integrate the following technologies and tools into the curriculum:

• Cyber security (understand basic security issues. demonstrate some Cyber threats. understand the risk of different online behaviors).

• Information hiding (Steganography): Define different techniques such as injection and substitution and tools and threats of information    hiding.

• Cryptography (introduce students to formal definitions of security).

  For grades 7-9:

The program provides an interactive learning and mentoring experience. We will integrate the following technologies and tools into the curriculum:

• Cyberethics, Cybersafety and Cybersecurity: Identify ethical and legal issues using technology and Demonstrate knowledge of social,    legal, and ethical issues related to technology use through practical application.

• System/Network Vulnerabilities: Provide key network perimeter security tools, including firewalls and intrusion detection systems,    technologies that are critical to IT operations.

• Information Hiding (Steganography): Define different techniques such as injection and substitution and tools and threats of information    hiding.

• Cryptography (introduce students to formal definitions of security, cryptographic primitives and protocols).

  For grades 10-12:

The program provides an exciting, hands-on and creative activities. We will integrate the following technologies and tools into the curriculum:

• Cyberethics, Cybersafety and Cybersecurity: assist students in integrating the concepts of cyber-safety, cyber-security, and cyber-ethics    (C3) into existing technology and literacy standards and curricula. Preparing students for 21st century digital communication.

• System Vulnerabilities: understanding common attacking techniques such as virus, Trojan, worms and memory exploits.

• Information hiding (Steganography): Define different techniques such as injection and substitution and tools and threats of information    hiding. Understanding the impact of such techniques in cyber security.

• Digital Forensics: Conduct digital investigations based on the investigative process: identification, preservation, examination, analysis    and reporting. Understanding ethical standards of conduct, including impartiality and the protection of personal privacy.

• Cryptography: cryptographic theories, principles and techniques that are used to establish security properties and understanding    differences between different encryption/decryption algorithms.