How Can We Help?

Outhack the Hackers

You are here:

Estimated Time: Ten 45-minute class periods

Project Summary: Students learn some of the history about cybersecurity and research cybersecurity topics. They then create a website, game, interactive presentation, or brochure to educate younger students about cybersecurity and how to keep themselves safe from hackers and others who may be trying to scam them.

Driving Question (Teacher Guided, Student Constructed): How can we educate young students about how to keep themselves safe from hackers?

Get this PBL Plan: This plan is in Google Docs. When you view this plan you are seeing the most current version. To edit the plan, you can either download or make a copy of the plan in this view mode by clicking on “File” menu item located on the top left corner of the Google Doc. Note that if changes are made to the most current version on this website, your “copy/download” has not been updated. All updates to this plan will be noted the comment box on the bottom of this page. Please do not “request edit access” to this web version of the file. If you find areas for improvement, please leave a comment! View the “Outhack Hackers” Plan to copy or download to your drive.

11 Replies to “Outhack the Hackers”

  1. Good news everyone who is following these posts, Mike Wood (the author) has just updated the PBL plan with some new resources for easier implementation.

    1. While the focus and milestones of this PBL is careers in coding to address hacking, the flip side is that hackers are subject to criminal charges. So yes, I do think careers in the Law and Public Safety Career cluster could be explored in this PBL.

    1. Yes, this is something that happened in November or December. For right now, I don’t have a good workaround. My district won’t allow students to login either unless we do a lot of vetting and contacting the company which I haven’t done yet.

      For now, I may be focusing on the encryption side of things and the pringles activity I referenced in a comment below. Kids really liked the cybergo stuff, so too bad it’s hard to access. I will update if I find a good replacement.

  2. Here’s another fun activity that goes with this PBL … use a can of pringles to simulate the German Enigma machine used during WWII to encrypt secret messages.

    https://cyber.org/enigma

    We’ve found that you can print the template at 88% and use it on soda cans as well if that’s easier on the budget.

  3. I am currently using this PBL in my CCA class. Is cyberbullying not part of cyber security? What are your thoughts?

    1. Cyberbullying is certainly and issue of concern, but as this is a career awareness/exploration course, the PBL has been developed to explore cybersecurity careers. If the driving question was focused on “How could careers in cybersecurity track and remove cyberbullying posts in social media?” you might be able to explore this career area and using cyberbullying as the content to raise awareness about this issue.

Leave a Reply

Your email address will not be published. Required fields are marked *

Table of Contents