Online College Courses for Credit

2 Tutorials that teach Cyber-Security
Take your pick:



In this lesson, you will be introduced to Dr. Pruitt-Mentle's framework for digital citizenship and learn about cyber-security.

See More

Like what you're learning?

Digital Citizenship

Take the whole course from Capella University FOR FREE


Source: Globe, Clker,; Stick Figure, Pixabay,; Target, Pixabay,; Box, Pixabay,; Document, Pixabay,

Video Transcription

Download PDF

Hello everybody. Hope you're doing well today. Our topic we'll be covering is cyber-security. My name is Gino Sangiuliano, and let's get this started. We'll begin by going over the 3 C's framework, which was developed by Dr.Pruitl-Mentle, a leading researcher in the field of educational technology. This framework has been adopted by numerous state departments of education, and endorsed by leading internet safety curriculum providers.

As you can see, the three components are cyber-safety, cyber-ethics, and cyber-security. Notice how the three overlap, and that's intentional and purposeful. For example, you may learn how to minimize the risk of your email being compromised, which would fall under the category of cyber-safety, but it's also important to understand the reasons that make hacking someone's email wrong in the first place. That would fall under the category of cyber-ethics.

The definition we'll be using for cyber-security comes directly from the Cyber Security Information Act of 2000. It reads, "the vulnerability of any computing system, software program, or critical infrastructure to, or the ability to resist intentional interference, compromise, or incapacitation through the misuse, or by unauthorized means of the internet, public or private telecommunication systems, or other similar conduct that violates federal, state, or international law that harms interstate commerce of the US, or that threatens public health or safety."

That certainly is a mouthful, but I'd like to break it down to some of the most important terms in that definition. They are vulnerability, misuse, unauthorized, harms, threatens. When you focus on those few words, you really get a sense of what this is talking about.

I remember a difficult decision my wife and I had to make a few years ago. It was whether or not to get our son a cellphone. Like many parents at the time, we did our homework. We researched and talked with other people to help us with what was, at the time, a very serious decision. He was entering sixth grade, middle school. He was an excellent student and quite responsible. He hadn't asked for a phone. However, he would now be walking to school every day and we felt he was ready.

The day finally came and he was excited. We went to the store and picked out a very modest phone. He now had his own number and a sense of independence. However, there was one thing I felt I had to do, and that was a draft a contract outlining the rules that he had to sign before he actually got it. As I look back, I realize many of the rules I had written had to do with cyber-security.

As adult digital citizens, it's important that we provide students with the tools they need to be successful and reiterate the most important things they need to know. For example, to protect their personal information, to protect their electronic devices, and to protect their networks.

Cyber-security is a moving target, and students, as well as adults, must understand that, in order to protect ourselves, we need to maintain current knowledge on digital security issues and strategies. Nevertheless, there are habits that we can instill in them.

For instance, how to recognize risks that come from being online, making well-informed decisions about interacting with others online, taking steps to protect themselves while using technology, and understanding the diversity choices that they will encounter online. When all is said and done, the most important thing that we can do to help students better understand cyber-security is model and advocate.

We need to model an advocate secure behaviours among friends, classmates, and family. Any teacher knows that you can lecture all you want, but your actions will have a greater influence than anything else you may say. Let's go ahead and summarize some of the points of today's lesson.

We reviewed the 3 C's frameworks, we defined cyber-security, we discussed the tools that are needed to succeed, and how teachers and adults can help students stay secure, and finally, we talked about the importance of modeling proper online behavior. Today's food for thought requires you to seek someone out that works with technology on a regular basis.

Ask them what security measures they employ to keep their devices and information safe. To dive a little deeper and learn how to apply this information, be sure to check out the additional resources section associated with this video. This is where you'll find links targeted towards helping you discover more ways to apply this course material. Thanks again for watching. Have a great day.

Notes on "Cyber-Security"

(00:00-00:10) Intro

(00:11-00:54) 3 C’s Framework

(00:55-02:10) Definition of Cyber-Security

(02:11-03:05) “The Contract” Story

(03:06-03:25) Providing the Tools

(03:26-04:27) Helping Students

(04:28-04:53) Summary

(04:54-05:22) Food for Thought

Additional Resources

Teaching Tools for Educators (resource list)

National Initiative for Cybersecurity Education (NICE) provides a variety of resources to help develop curricula and incorporate cyber-security into lesson plans. In particular links to iKeepSafe, Cyberwatch and CSave offer curriculum teaching tools and resources for teachers to use with their students. Scroll down the page to click out to these resources.


Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches

This lesson by Jennifer Cutraro supports teachers in instructing students on the danger posed by cyber security breaches on governments and companies. This lesson offers students with an authentic learning experience relevant to modern day attacks on familiar institutions such as Target.