This Module forms part of the Henry Ford Corporate College Series on …
This Module forms part of the Henry Ford Corporate College Series on Cyber Intelligence and is accompanied by a Teaching Guide. The full range of materials includes teaching modules on cyber threat intelligence, threat hunting,MITRE and Diamond Frameworks, CARET, ATT&CK, collecting and processing data, assessments, slides, and other teaching tools that lecturers can adapt to their contexts, and integrate into existing college courses. The Module provides an outline for a 8 week class, but can be used for shorter or longer sessions.All teaching modules engage with existing academic research and debates, and may contain information, opinions and statements from a variety of sources, including press reports and independent experts. Links to external resources were tested at the time of publication. However, as third-party websites may change, please contact us if you come across a broken link or are redirected to inappropriate content. Please also inform us if you notice that a publication is linked to an unofficial version or website.
Learn about the Chandra X-Ray Observatory's telescope system, science instruments, and spacecraft …
Learn about the Chandra X-Ray Observatory's telescope system, science instruments, and spacecraft system in this interactive activity adapted from NASA.
Do you sometimes feel that you do not belong in this program, …
Do you sometimes feel that you do not belong in this program, or some of its courses? The instructors assure you that you do belong! To help combat that sense of imposter syndrome that you might be feeling, let's explore the notion that your cognitive styles of learning are similar to your peers' learning styles.
You may already know that OSU and other universities have studied course materials and technical tools to make improvements that level the playing field amongst you and your peers. Programs such as Cognitive Style Heuristics and GenderMag/InclusiveMag study differences in how people problem-solve while learning new technical skills. The projects' core methods of finding bias bugs in software and materials is to apply personas that represent different sets of cognitive facets.
Explore the Facets and Personas by clicking on the tabs at the top, then analyze which persona fits you best, by taking the Survey.
Your selection data will disappear after refreshing the page, or closing the browser. It will not be saved and collected.
This video from NASA describes the detailed computer modeling used to predict …
This video from NASA describes the detailed computer modeling used to predict that colliding neutron stars can produce gamma-ray bursts similar to those associated with black holes.
Students learn about complex networks and how to represent them using graphs. …
Students learn about complex networks and how to represent them using graphs. They also learn that graph theory is a useful mathematical tool for studying complex networks in diverse applications of science and engineering, such as neural networks in the brain, biochemical reaction networks in cells, communication networks, such as the internet, and social networks. Topics covered include set theory, defining a graph, as well as defining the degree of a node and the degree distribution of a graph.
In the digital tapestry of the 21st century, education, particularly in the …
In the digital tapestry of the 21st century, education, particularly in the realms of Computer Applications Technology (CAT) and Information Technology (IT), stands at the forefront of innovation and transformation. It is with immense pride and enthusiasm that we present this pioneering Open Educational Resource (OER) Textbook, a testament to the collaborative spirit and intellectual rigor of a group of distinguished postgraduate students from North-West University, South Africa: L. Van der Walt, B. Molokwane and N. Mbele. Under the editorship of Dr. C. Bosch, this textbook emerges as a beacon of knowledge, co-creation, and dissemination, meticulously crafted to serve the vibrant community of computer science educators.Embarking on a journey through the rich landscapes of learning theories in CAT and IT education, this textbook unveils the multifaceted dimensions of teaching and learning strategies that resonate with the demands of contemporary education. It meticulously navigates through the intricacies of effective pedagogical approaches, ensuring that educators are well-equipped to foster environments where learning is not just absorbed but experienced and enacted.
Students gain experience with the software/system design process, closely related to the …
Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)
Cyberinfrastructure is a tightly integrated, planet-wide grid of computing, information, networking and …
Cyberinfrastructure is a tightly integrated, planet-wide grid of computing, information, networking and sensor resources which will enable individual researchers to have the power of the world's highest-performance digital resources at their disposal. NSF has funded or is exploring cyberinfrastructure-related projects designed to lead the scientific and engineering community in the coordinated development and expansive use of cyberinfrastructure.
This book on Cybersecurity is written for beginners. No college degree is …
This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.
It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.
Have you ever felt uneasy or even dreadful after losing a USB …
Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?
This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.
Attendees will learn about the following topics: - A brief introduction to data encryption. - A few encryption tools for a novice user. - Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB flash drive. - Pros and cons of encryption/decryption technology.
This toolbox aims to: - create the foundations in cybersecurity - inspire …
This toolbox aims to: - create the foundations in cybersecurity - inspire with very practical cybersecurity non-formal activities - give cyber tips for youth organisation
Students conduct Internet research to investigate the purpose and current functioning status …
Students conduct Internet research to investigate the purpose and current functioning status of some of the largest dams throughout the world. They investigate the success or failure of eight dams and complete a worksheet. While researching the dams, they also gain an understanding of the scale of these structures by recording and comparing their reservoir capacities. Students come to understand that dams, like all engineered structures, have a finite lifespan and require ongoing maintenance and evaluation for their usefulness.
The Data Renaissance delves into the complexities of data's role in various …
The Data Renaissance delves into the complexities of data's role in various industries and its broader impact on society. It highlights the challenges in investigating data practices, citing examples like TikTok, where algorithms and data handling are closely guarded secrets. The content, contributed by students under the guidance of an expert, covers a wide range of topics, including the ethical aspects of generative AI in education and the workplace, and case studies reflecting real-world experiences. This evolving text, intended to be updated with each class, serves as a dynamic resource for educators and students alike, offering insights and discussion guides for an in-depth understanding of the ever-changing landscape of data in our digital age.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.