Tag Archives: Welcome

HAYDENMAGNET.ORG ACCOUNTS AND GOOGLE CLASSROOM 2025

Objective:

I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.

Links:
Google Apps for Carl Hayden: https://www.haydenmagnet.org

Topics Discussed:

  • Haydenmagnet.org
  • Google Drive
  • Google Classroom

Assignment:

  • Open a Chrome browser and visit the Google website.
  • Click the blue Sign In button in the upper right corner.
  • Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
  • Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
  • Click on the blue New button on the left hand side, and create a new Google Doc.
  • In this document, write a couple of sentences to tell me about what you’re interested in learning about CyberSecurity (techniques, cyberthreats and how to handle them, cryptography, all of the above). If you don’t know specifically what you want to learn, just type a few sentences that let me know that you’ve got an open mind.
  • When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
  • Open a new Window or Tab in Chrome and navigate to https://classroom.google.com.
  • You should be able to join the Classroom using the code provided in class. If you did not receive the code, please see Mr. Marmolejo.
  • Look over the introduction post and the current assignment. This is where you will turn in the Google Doc you just created.
  • Attach the Google Doc to today’s assignment and submit it using Google Classroom by tomorrow.
  • If you have any questions, my email address is mi.marmolejo@haydenmagnet.org.

Assigned: August 12th, 2025
Teacher Pacing Due Date: August 12th, 2025

INTRO TO AP CYBERSECURITY – MACINTOSH ACCOUNT SETUP 2025-26

Objectives:

  • I can successfully log on to the 225 lab iMac workstations.

Links:

Lab Use Policy Presentation

Topics Discussed:

  • Proper use of school and network resources
  • Software Copying
  • Copyright
  • Software Privacy and Vandalism
  • Care of Equipment
  • Food and Drink Policy
  • Internet Usage Guidelines
  • Consequences of Policy Violation

Assignment:

  1. Today I’ll walk you through the process of logging in to the computer for the first time.
  2. Don’t forget your signed Technology Agreements are due today! Make sure you get those turned in to me before you leave class.
  3. Tomorrow, we’ll begin our introduction to the Macintosh operating system, so make sure you give me your signed Technology Agreement and get logged in today so you’re ready for this week’s lessons.

Posted: August 11th, 2025

INTRO TO AP CYBERSECURITY – FALL 2025 – PHYSICAL SECURITY: “PROTECT THE CROWN JEWELS!”

Objective:

  • I can complete a physical security-related icebreaker activity to help build a fun and collaborative working environment.

Links:
None.

Topics Discussed:

  • Cybersecurity
  • Physical Security

Assignment:

Welcome to my classroom website for AP Cybersecurity! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.

  1. Today we’re going to complete a Physical Security thought exercise.
  2. The scenario is this: In the kingdom of Far, Far Away, you are the Security Chief of the Royal Museum, appointed by the Queen herself to guard her most precious possession: Her Majesty’s Royal Crown – a priceless artifact made of the most precious metals, jewels and fabrics, and a symbol of the wealth, power and dignity of the royal family.
  3. However, as a monarch of the People, the Queen wants to ensure that everyone can view and enjoy the magnificence of the Royal Crown.
  4. Of course, there are those who would love to make the Crown their own, and would go through great lengths to steal it. As such, she has tasked you with designing a building, outfitted with the latest in security measures, to prevent this from happening.
  5. Grab a partner, and put your heads together to design the most secure facility imaginable, and help Her Majesty protect the Crown! Remember: You have to let people in, but you only have to let them see – not touch- the Crown! Think about all the ways someone might try to steal the Crown, and how you might stop them!
  6. Use the provided paper, pencils, pens and markers to sketch out your super secure Crown viewing facility, and be prepared to present and explain your security configuration to the class, and at the end, we’ll vote on the most secure facility!
  7. Good Luck! The Queen’s most precious possession and the dignity of the Royal Family is in your hands!

Posted: August 8th, 2025

INTRO TO AP CYBERSECURITY – USAGE POLICY PRESENTATION AND PLAN FOR SUCCESS 2025-26

Objective:

  • I can understand and agree to abide by the Computer Lab and Internet Usage Policy for the Center for Computer Studies measured by the returned signature page bearing my and my parents’ or guardian’s signatures, so that the classroom and network remains a safe and secure place for us to work, learn and play.

Links:

Lab Use Policy Presentation

Topics Discussed:

  • Proper use of school and network resources
  • Software Copying
  • Copyright
  • Software Privacy and Vandalism
  • Care of Equipment
  • Food and Drink Policy
  • Internet Usage Guidelines
  • Consequences of Policy Violation
  • Plan for Success

Assignment:

  1. By now, you’ve been using computers in school long enough that you should have a pretty good handle on what is an acceptable use of computer equipment and the Internet, and what isn’t acceptable. Today’s presentation will eliminate any doubt or confusion as to what is and isn’t acceptable here in the lab.
  2. Watch the Usage Policy Presentation along with me, and feel free to ask any questions you may have on the policy.
  3. This policy is also outlined on the Plan for Success that you will receive today. Please read the Plan for Success, and sign on the last two pages to confirm that you agree to abide by the policies, then take it home and show it to your parents/guardians, and have them sign to confirm that they understand and agree to the policy. Please return the document with all required signatures to me by Monday, August 11th.
  4. The policies make sure that this room remains a clean and functional place for everyone to live and learn in. We can’t get much accomplished in here unless everyone can agree to abide by them. If you can live with that, then we can move on to learning the good stuff.

Posted: August 7th, 2025

THE BAKER POSTULATE – MAINTAINING A GROWTH MINDSET – FALL 2025

Objective:

I can participate in a collaborative activity to refresh my memory on the Growth Mindset, and remind myself what I am capable of.

Links:

Topics Discussed:

  • Talent
  • Drive (Ganas)
  • Creativity
  • Fixed Mindset
  • Growth Mindset

Assignment:

  1. Follow along with the in-class activity.

Assigned: August 6th, 2025
Teacher Pacing Due Date: August 6th, 2025

INTRO TO AP CYBERSECURITY – FALL 2025 – GETTING TO KNOW YOU

Objective:

  • I can introduce myself to the instructor and the other students in the classroom by completing an icebreaker activity to help build a fun and collaborative working environment.

Links:
None.

Topics Discussed:

  • Cybersecurity
  • Room 225
  • Mister Marmolejo
  • Yourself!

Assignment:

Welcome to my classroom website for AP Cybersecurity! This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.

  1. Today we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class today. Don’t worry, I’ll do my best to make it fun.
  2. Use the provided materials to make a tri-fold “Name Tag” that will help me learn your name.
  3. Let’s play “Two Truths and a Lie!” On the back of your name tag, write three complete sentences about yourself: Two of which are true, and one that is a complete lie!
  4. We’re going to go around the room and give each class member a chance to introduce themselves, and share their Two Truths and a Lie, then the rest of the class and I will try to guess which of the statements is the lie! Don’t make it too obvious or easy! Stump me if you can!

Posted: August 5th, 2025

First Day Fall 2025 – Welcome to AP Cybersecurity!

Objective:

  • I can prepare for success in the class by familiarizing myself with the classroom and introducing myself to the instructor and the other students in the classroom so I can more efficiently and effectively complete class activities and assignments.

Links:
None.

Topics Discussed:

  • Cybersecurity
  • Room 225
  • Mister Marmolejo
  • Yourself!

Assignment:

Welcome to my classroom website for AP Cybersecurity! Frankly, I’m surprised you’re here – I’m not going to introduce this website to the rest of the class for another couple of days. I guess until then, it’ll be our little secret. This website will be your one-stop shop for all classroom assignments, announcements and materials pertaining to the class.

  1. Take a look around! I’ll explain everything here very soon.
  2. Tomorrow we’re going to do one of those “getting to know you” activities. I know, you’re probably going to do something like this in every class for the next few days. Don’t worry, I’ll do my best to make it fun.
  3. The fact that you even found this site shows you have a remarkably inquisitive and adventurous personality. Those qualities will serve you well here. When you meet me, mention the secret word: “Steganography“, and I’ll give you a prize. Don’t tell anyone else! It’s a secret to everybody.

Posted: August 4th, 2025

CYBER.ORG – WELCOME TO THE CYBER RANGE – FALL 2024

Objective:

Students will begin preparing for proficiency in cyber security by connecting to the CYBER.ORG Cyber Range.

Link:

Assignment:

  1. Today, you will receive your login information for the CYBER.ORG Cyber Range at https://apps.cyber.org.
  2. A cyber range is a virtual lab environment where students are able to simulate cybersecurity scenarios in a safe, protected online environment as they explore the back end of IT systems used by today’s industries.
  3. Check your Teams for your username/password, and use it to log into the Cyber Range. You will use the Cyber Range to complete the Lab Activities and Case Study assignments throughout this course.
  4. Please see Mister Marmolejo if you encounter any difficulties connecting to or logging into the Cyber Range.
  5. We will begin using the Cyber Range with our first Lab Activity exploring the Linux Command Line Interface on Monday.

Assigned: August 16th, 2024
Teacher Pacing Due Date: August 16th, 2024

HAYDENMAGNET.ORG ACCOUNTS AND GOOGLE CLASSROOM 2024

Objective:

I can log into my Haydenmagnet.org Google Account with the login information provided to me and turn in an assignment using Google Classroom, so that I can successfully hand in assignments throughout the school year.

Links:
Google Apps for Carl Hayden: https://www.haydenmagnet.org

Topics Discussed:

  • Haydenmagnet.org
  • Google Drive
  • Google Classroom

Assignment:

  • Open a Chrome browser and visit the Google website.
  • Click the blue Sign In button in the upper right corner.
  • Sign in with the Haydenmagnet.org account provided to you in your Computer Fundamentals or other Computer Science class. If you do not remember your username or password from this account, or if you never took Computer Fundamentals or Computer Science, please see Mister Marmolejo to get your account information.
  • Once you are logged in, click on the “waffle” icon in the upper right corner and choose “Drive” from the list of Google Apps to access Google Drive. Here you will have access to the most useful Google Apps: Document, Presentation, Spreadsheet, Form and Drawing.
  • Click on the blue New button on the left hand side, and create a new Google Doc.
  • In this document, write a couple of sentences to tell me about the most interesting thing you’ve learned during our past week and a half together. It can be anything you learned in this class: something about the room, about the class itself, about me or another member of the class, etc. Add a couple more sentences about what you’re interested in learning about CyberSecurity (techniques, cyberthreats and how to handle them, cryptography, all of the above). If you don’t know specifically what you want to learn, just type a few sentences that let me know that you’ve got an open mind.
  • When you are finished, click the words “Untitled Document” in the upper left corner, and give this document a proper name.
  • Open a new Window or Tab in Chrome and navigate to https://classroom.google.com.
  • You should be able to join the Classroom using the code provided in class. If you did not receive the code, please see Mr. Marmolejo.
  • Look over the introduction post and the current assignment. This is where you will turn in the Google Doc you just created.
  • Attach the Google Doc to today’s assignment and submit it using Google Classroom by tomorrow.
  • If you have any questions, my email address is mi.marmolejo@haydenmagnet.org.

Assigned: August 15th, 2024
Teacher Pacing Due Date: August 16th, 2024

MEET YOUR MAC – FALL 2024

Objective:

  • I can effectively navigate the Macintosh OS, and change my desktop wallpaper, mouse settings and desktop settings using the System Preferences so I can customize and configure my Mac workspace to suit my preferences.

Links:

MacOS Ventura Basics: https://www.apple.com/business/enterprise/docs/resources/Employee_Starter_Guide-Mac_Basics-macOS_Ventura.pdf

Topics Discussed:

  • MacOS Ventura
  • Desktop
  • Menu Bar
  • System Preferences
  • Mouse
  • Dock
  • Icons
  • Finder
  • Trash
  • Launchpad
  • Documents
  • Finder Window
  • Finder Window Views
  • Safari
  • Google Image Search
  • Resolution

Assignment:

  1. Today we’ll begin our introduction to the Macintosh operating system.
  2. Follow along with the in-class demonstrations to learn how to:
    • Log in using your newly created network account.
    • Navigate through the MacOS Ventura operating system.
    • Identify and use items on the desktop, including the Finder, application icons, the menu bar, the dock, the trash and the Launchpad.
    • Use the System Preferences panel to adjust your Desktop wallpaper and your Mouse settings (enable right click).
    • Open a new Finder window and navigate to your Documents folder to store files and folders.
    • Use the Finder window to view files and folders in different ways.
    • Adjust the Finder Preferences to see all items on the desktop.
    • Use Chrome to browse the web
    • Locate and bookmark the class website (https://cgd.mistermarmolejo.com).
  3. Use Google Image Search to find an appropriate image to personalize your desktop. (Keep it classy!)
    • Use the Search Tools underneath the search bar to search for Large images with higher resolutions for the best results.
    • Remember: for the image to look good on your desktop, it has to have a minimum horizontal resolution of 1920 pixels!

Posted: August 14th, 2024