Module Organization
The content shown in these videos is presented in a logical progression of topics that allows for a foundation to be constructed and context to be built upon as the reader progresses through the chapters. The videos are designed to correspond to the chapters in the book. However, individual videos can be used to teach a particular concept.
These videos are designed to be used in multiple grade levels including college. The levels of discussion and the difficulty of the assessment can vary depending on the purpose and the level of the students.
The videos can be found on our IowaCyber YouTube Channel or our IowaCyber Vimeo Channel. Downloadable videos can be access through the Teacher/Educator Materials page.
Topic | Name/Description | Chapter Info | Video Links |
---|---|---|---|
Avoiding Plagiarism | A brief introduction to plagiarism. This video gives some tips for avoiding plagiarism of ideas and language. This video discusses both idea plagiarism and language plagiarism. [5:11] | Pre–Chapter 1 | YouTube Vimeo |
Why Study Cyber Security | This is an introduction video discussing what cyber security is and why it is important. It also tears down the media’s perception of cyber criminals and sketches some reasons why everyday people would want to study cyber security. [6:29] | Pre-Chapter 1 | YouTube Vimeo |
Cyber Security Terminology | This video utilizes the information security vocabulary through various vignettes. [15:47] | Chapter 1 | YouTube Vimeo |
Demystifying Computers Part 1 | Take apart a computer and examine some of the bigger parts that interact with each other. It goes through all four layers mentioned in the textbook: users, hardware, operating system, and applications. [14:16] | Chapter 2 | YouTube Vimeo |
Demystifying Computers Part 2 | Begin examining how software interacts with computers. Discusses what happens when you turn on a computer and run an application (how layers interact with each other). [6:45] | Chapter 2 | YouTube Vimeo |
Demystifying the Internet Part 1 | Examines the Internet – What is it? How does it work? Discusses how the Internet works, Internet service providers, Internet protocol; demonstrates how the Internet is a network of computer networks bound together. [6:52] | Chapter 2 | YouTube Vimeo |
Demystifying the Internet Part 2 | Hierarchical structure of the Internet and how devices are assigned IP addresses. Describes the basic structure of the whole Internet. Also describes the basic structure of small, individual networks like home wireless networks or office networks. [13:08] | Chapter 2 | YouTube Vimeo |
Demystifying the Internet Part 3 | Explores how information travels through the Internet. [13:13] | Chapter 2 | YouTube Vimeo |
Passwords and Hash Functions | Begin talking about passwords. Discusses why passwords are so prevalent today. Explains hash functions and how organizations use hash functions to secure stored passwords. Shows a mathematical illustration of how a function can be ‘irreversible’ (like how hash functions are intractable). [8:16] | Chapter 3 | YouTube Vimeo |
Common Password Threats | Introduces common password threats and tricks that hackers use against you to get your user names and passwords. Strategies on how to avoid them/minimize the threats. Explains ten common password threats: user disclosure, social engineering, phishing, key logging, wireless sniffing, brute force guessing, dictionary attacks, password files not encrypted, exposed passwords with known hash values, security questions. [20:41] | Chapter 3 | YouTube Vimeo |
Creating Strong Passwords | Provides tips for creating strong, memorable passwords. [6:41] | Chapter 3 | YouTube Vimeo |
Managing Passwords | How to manage passwords in a practical manner. Tips include how to securely record your passwords, how to rank your passwords, and how to use password management software. [6:47] | Chapter 3 | YouTube Vimeo |
How Email Works | Describes the paths that emails follow across the internet. Clarifies how email systems work in order to learn how to defend yourself from certain kinds of cyber attacks. Goes through application and web–based UAs, MTA, SMTP, and MIME headers. Also explains how to view full headers. [10:12] | Chapter 4 | YouTube Vimeo |
Email Security | Security threats and privacy issues that come through email and how to avoid/minimize these threats. Goes through eavesdropping, spamming, phishing, spoofing, malicious email attachments, replying/forwarding issues, and Carbon Copy (CC)/Blind Carbon Copy (BCC) issues. [12:35] | Chapter 4 | YouTube Vimeo |
Kinds of Malware | Malicious Software – the differences between virus, worm, Trojan horse, and bot. [7:39] | Chapter 5 | YouTube Vimeo |
Functions of Malware | Describes what malware can do to your computer and goes through the seven most common functions of malware: overwhelming system resources, running malicious adware, running spyware, running ransomware, creating backdoors, disabling security functions, and creating botnets. [10:23] | Chapter 5 | YouTube Vimeo |
Sources of Malware | Eight common sources of malware: removable media, documents and executables, Internet downloads, network connections, email attachments, drive–by downloads, pop–ups, malicious advertisements. Also, briefly discusses security patches and firewalls. [13:38] | Chapter 5 | YouTube Vimeo |
Layers of Defense Against Malware | This video introduces the layers of defense that can be used to prevent/minimize a malware attack including: backing up data, using a firewall, installing software patches, using antivirus software, and user education. [8:50] | Chapter 6 | YouTube Vimeo |
How Web Browsing Works | Web browsing and how your computer interacts with it. Discusses Figure 7.1 in textbook. Looks at HTML code seen in Figure 7.3 in the textbook. [11:38] | Chapter 7 | YouTube Vimeo |
Safely Navigating the Web | Security topics relevant to web browsing. Handling files in web browser (Figure 7.4), accepting cookies from a website, using the more secure version of HTTP, keeping/deleting web browser history. [18:08] | Chapter 7 | YouTube Vimeo |
Online Shopping | Most common security issues faced when shopping online [16:30] | Chapter 8 | YouTube Vimeo |
How Wireless Networks Work | Introduction to wireless networks and how they work. [5:25] | Chapter 9 | YouTube Vimeo |
Wireless Internet Security Threats | Introduces common security threats that wireless users face. **CONTENT ADVISORY** We recommend that an adult screen this video before sharing it with young children. The fourth section of this video contains a passing reference to a serious and potentially frightening cyber crime revolving around crimes against children beginning at [9:50]. [11:32] | Chapter 9 | YouTube Vimeo |
Using Public Wireless Networks | What users can do to safely, or more securely, use public wireless networks. [9:17] | Chapter 9 | YouTube Vimeo |
Administering Wireless Networks | Securing your home wireless network. [7:34] | Chapter 9 | YouTube Vimeo |
Social Media and Privacy | Privacy issues on social media. Addresses three privacy considerations for social media users: Friend Gluttony, Copying & Pasting, Employers. [9:50] | Chapter 10 | YouTube Vimeo |
Social Media – Security | How privacy tradeoffs on social media can lead to tradeoffs in personal security. How burglars can use social media to target their victims. How social media is used for malware attacks. [10:31] | Chapter 10 | YouTube Vimeo |
Social Engineering | Introduction into social engineering and four common threats associated with it. [14:46] | Chapter 11 | YouTube Vimeo |
Reading URLs | A crash course on reading URLs (also known as web addresses). Being able to read URLs helps web users to verify that they are visiting authentic web pages instead of malicious counterfeits. [9:52] | Chapter 11 | YouTube Vimeo |
Interpersonal Issues | Social threats faced online – being aware of these five common interpersonal issues facing web users: anonymity, missing the communication context, privacy, everlasting information, credibility . [10:50] | Chapter 12 | YouTube Vimeo |