Activities

Welcome. In the year 1982, the first virus infiltrated the early Internet.
Today we are on the defense, fighting new attackers at every turn.
Your cybersecurity expertise has won you an invite to the Cisco Bureau of Cyber Intelligence.
Find your way there to gain access to the latest threat intelligence to help you defend your network.
Are you ready to begin?
You are the CIO of a global organization called The Fugle, on the verge of making the first release of a biometrically authenticated mobile payment app. You will steer the project through its final stages, dealing with your internal security team, your colleagues in Marketing and PR and of course your CEO. There are many competitors and individuals out there who would love to get their hands on the data held by your organization at such a critical time. Can you make the right choices? Can you keep the project on time and on budget? Can you protect your company from attack? Based on the format of the old “Choose Your Own Adventure” books, the game offers you the chance to step into someone else’s shoes and find out if you’re good enough to come out on top. Click here to play!
A choose-your-own-adventure style game where you play the role of a CISO making decisions for a hospital. Click here to play!
It is important to understand why cyber attacks occur. Why not have a little fun while you learn? To help demonstrate common attack scenarios, Cisco has created a series of comic books to educate and entertain. The technology and security concepts in these comics are real, and most are covered in the Cyber Defense Clinic labs. Download Comic 1 Download Comic 2
Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe.
Cybersecurity Hackers & Cyber Attacks Cryptography

In this exclusive 10-part series, cybersafety educator and author Claudiu Popa, founder of the KnowledgeFlow Foundation invites an exceptional group of special guests to take part in grounded discussions on the promise and myth of edtech, from the original intentions to catalyze learning through technology to the privacy-invasive practices that may impact generations of students across Canada and the United States.

Packed full of cybersecurity examples, amusing anecdotes, relevant advice and intellectual ammunition, the unmissable CybersecurED series is aimed at educators, parents and administrators who truly care about maximizing the potential and safety of educational technology in the modern classroom. Truly a show for everyone!

Click here to listen!

Interested in a career in cybersecurity? With more than 500,000 job postings for open cybersecurity jobs in the United States, you chose a great time to join a booming industry – but where to start? To help close the cybersecurity skills gap, CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market, which helps job seekers identify what they need to transition between cybersecurity roles and advance in their careers. Click here to read!
If you are interested in pursuing a career in cybersecurity and don’t know where to start, here’s your go-to guide to salaries, job markets, skills, and common interview questions in the field. Click here to read!
Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer. Click here to read!

Courses

Cybrary

The Cybersecurity and IT Career Development Platform

Sans Cyber Aces

Your gateway to cybersecurity skills and careers

Cisco Netacad

Cybersecurity professionals who can protect and defend an organization's network are in high-demand right now. Put your detective-like qualities to work by gaining knowledge toward a career in fighting cybercrime.

IBM

IBM has leveraged its artificial intelligence and machine learning services, including Watson, to help with detection and response to cyber threats. See how with the cybersecurity training below.

Fortinet

Free Cybersecurity Training

Resources

KnowBe4

free Children’s Interactive Cybersecurity Activity Kit

Scroll to Top