I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.
Open a Chrome browser and visit the Google website.
Click the blue Sign In button in the upper right corner.
Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
Click on the blue New button on the left hand side, and create a new Google Doc.
In this document, write a couple of sentences to tell me about what you’re interested in learning about CyberSecurity (techniques, cyberthreats and how to handle them, cryptography, all of the above). If you don’t know specifically what you want to learn, just type a few sentences that let me know that you’ve got an open mind.
When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
Today I’ll walk you through the process of logging in to the computer for the first time.
Don’t forget your signed Technology Agreements are due today! Make sure you get those turned in to me before you leave class.
Tomorrow, we’ll begin our introduction to the Macintosh operating system, so make sure you give me your signed Technology Agreement and get logged in today so you’re ready for this week’s lessons.
I can complete a physical security-related icebreaker activity to help build a fun and collaborative working environment.
Links: None.
Topics Discussed:
Cybersecurity
Physical Security
Assignment:
Welcome to my classroom website for AP Cybersecurity! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Today we’re going to complete a Physical Security thought exercise.
The scenario is this: In the kingdom of Far, Far Away, you are the Security Chief of the Royal Museum, appointed by the Queen herself to guard her most precious possession: Her Majesty’s Royal Crown – a priceless artifact made of the most precious metals, jewels and fabrics, and a symbol of the wealth, power and dignity of the royal family.
However, as a monarch of the People, the Queen wants to ensure that everyone can view and enjoy the magnificence of the Royal Crown.
Of course, there are those who would love to make the Crown their own, and would go through great lengths to steal it. As such, she has tasked you with designing a building, outfitted with the latest in security measures, to prevent this from happening.
Grab a partner, and put your heads together to design the most secure facility imaginable, and help Her Majesty protect the Crown! Remember: You have to let people in, but you only have to let them see – not touch- the Crown! Think about all the ways someone might try to steal the Crown, and how you might stop them!
Use the provided paper, pencils, pens and markers to sketch out your super secure Crown viewing facility, and be prepared to present and explain your security configuration to the class, and at the end, we’ll vote on the most secure facility!
Good Luck! The Queen’s most precious possession and the dignity of the Royal Family is in your hands!
I can understand and agree to abide by the Computer Lab and Internet Usage Policy for the Center for Computer Studies measured by the returned signature page bearing my and my parents’ or guardian’s signatures, so that the classroom and network remains a safe and secure place for us to work, learn and play.
By now, you’ve been using computers in school long enough that you should have a pretty good handle on what is an acceptable use of computer equipment and the Internet, and what isn’t acceptable. Today’s presentation will eliminate any doubt or confusion as to what is and isn’t acceptable here in the lab.
Watch the Usage Policy Presentation along with me, and feel free to ask any questions you may have on the policy.
This policy is also outlined on the Plan for Success that you will receive today. Please read the Plan for Success, and sign on the last two pages to confirm that you agree to abide by the policies, then take it home and show it to your parents/guardians, and have them sign to confirm that they understand and agree to the policy. Please return the document with all required signatures to me by Monday, August 11th.
The policies make sure that this room remains a clean and functional place for everyone to live and learn in. We can’t get much accomplished in here unless everyone can agree to abide by them. If you can live with that, then we can move on to learning the good stuff.
I can introduce myself to the instructor and the other students in the classroom by completing an icebreaker activity to help build a fun and collaborative working environment.
Links: None.
Topics Discussed:
Cybersecurity
Room 225
Mister Marmolejo
Yourself!
Assignment:
Welcome to my classroom website for AP Cybersecurity! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Today we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class today. Don’t worry, I’ll do my best to make it fun.
Use the provided materials to make a tri-fold “Name Tag” that will help me learn your name.
Let’s play “Two Truths and a Lie!” On the back of your name tag, write three complete sentences about yourself: Two of which are true, and one that is a complete lie!
We’re going to go around the room and give each class member a chance to introduce themselves, and share their Two Truths and a Lie, then the rest of the class and I will try to guess which of the statements is the lie! Don’t make it too obvious or easy! Stump me if you can!
I can prepare for success in the class by familiarizing myself with the classroom and introducing myself to the instructor and the other students in the classroom so I can more efficiently and effectively complete class activities and assignments.
Links: None.
Topics Discussed:
Cybersecurity
Room 225
Mister Marmolejo
Yourself!
Assignment:
Welcome to my classroom website for AP Cybersecurity! Frankly, I’m surprised you’re here – I’m not going to introduce this website to the rest of the class for another couple of days. I guess until then, it’ll be our little secret. This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.
Take a look around! I’ll explain everything here very soon.
Tomorrow we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class for the next few days. Don’t worry, I’ll do my best to make it fun.
The fact that you even found this site shows you have a remarkably inquisitive and adventurous personality. Those qualities will serve you well here. When you meet me, mention the secret word: “Steganography“, and I’ll give you a prize. Don’t tell anyone else! It’s a secret to everybody.
Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface on Monday.
Assigned: August 16th, 2024 Teacher Pacing Due Date: August 16th, 2024
I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.
Open a Chrome browser and visit the Google website.
Click the blue Sign In button in the upper right corner.
Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
Click on the blue New button on the left hand side, and create a new Google Doc.
In this document, write a couple of sentences to tell me about the most interesting thing you’ve learned during our past week and a half together. It can be anything you learned in this class: something about the room, about the class itself, about me or another member of the class, etc. Add a couple more sentences about what you’re interested in learning about CyberSecurity (techniques, cyberthreats and how to handle them, cryptography, all of the above). If you don’t know specifically what you want to learn, just type a few sentences that let me know that you’ve got an open mind.
When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
I can effectively navigate the Macintosh OS, and change my desktop wallpaper, mouse settings and desktop settings using the System Preferences so I can customize and configure my Mac workspace to suit my preferences.