CYBER SECURITY

The K-12 STEM Center follows all University guidelines for protecting students, families, teachers, and staff during the COVID-19 pandemic and USC reopening attempts. Learn More.

K-12 STEM Center & Cybersecurity

The K-12 STEM Center provides Viterbi students to serve as technical mentors to high school teams participating in CyberPatriot. CyberPatriot is the Air Force Association’s national youth cyber education program designed to excite, educate, and motivate the next generation of cyber defenders critical to our nation’s future security. The program features the National Youth Cyber Defense Competition, a tournament-style competition in which high school and middle school students compete to defend a computer network against attack in a series of web-based competition rounds.

The K-12 STEM Center also offers an online Cybersecurity Course for high school students.  To learn more about the course please click here.

Image

Career In Cyber Security

  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder
  • Placeholder

Cybersecurity and You

Social Engineering


The GraVoc video explains what social engineering is, some examples of, and ways to protect information from hackers. The visuals coincide with the explanations and examples to effectively demonstrate how hackers obtain information. The video addresses what a company could do to protect themselves from social engineering.

Proofpoint uses manipulation to define social engineering hacks in the beginning, then supports their claim with the definition of social engineering. The video provides visuals and examples of different types of social engineering. Towards the end, they explain how someone can stay protected from social engineering hacks.

PhishingBox introduces the definition and the importance of knowing social engineering. The video presents possible motivations and categories of social engineering.Majority of the video explains the categories, and at the end provides prevention practices.

Phishing


IDG TECHtalk explains the definition and why the attack is called phishing. Then gives a real life example of phishing and how the hackers obtained information.

Security Quotient wants to spread phishing awareness by defining the cyber attack and providing common phishing attacks. The video briefly analyzes a type of phishing attack commonly used to obtain information from people.

Iluli by Mike Lamb defines phishing through an example. Then provides data about how the majority of people are unable to identify sophisticated phishing attacks, and explain spear phishing.

A fun video that musically explains phishing, and provides an example of how to stay protected. The song has examples of common phishing hacks in order to spread awareness.

Passwords


StaySafeOnline.org informs their audience about password security through a skit. Where one character represents what not to do when creating a password and storing passwords. While, another person gives advice on making strong passwords. At the end, the video sums up their tips presented in the video.

NYU Information Technology’s short gives advice on how to make a strong password when making an account, and how to tell if your password is weak. After the short it lists there advice about creating strong passwords.

The video goes over why having a strong password is important and briefly explains how hackers attempt to guess user passwords. Majority of the video is the tips on creating a strong password and how to protect your password. Lastly, the video explains what to do if someone else is using your computer.

Zero Day Attacks


The video explains the definition of zero day attack and further explains the reason why it is called zero day. They further explain the reason why hackers use zero-day attacks, and a real life example and how it affected people. The end explains how to stay protected from these types of attacks.

MalwareFox explains the definition and presents alternative names the hack is referenced as. The video then details how to prevent zero-day attacks and acknowledges that the developer might not be aware of the exploit.

IOT hacking


Simplilearn explains what the internet of things means, and how the concept applies to our daily lives. The video provides a list of IoT devices and how they work by presenting an example to explain. Towards the end of the video there is a mini quiz to check for understanding.

Ken Munro is an ethical hacker that shares his experiences at his job in order to make aware of appliances and devices susceptible to hacking and stealing user’s information. He talks about the vulnerabilities in devices and how hackers use those vulnerabilities to gain information. Some of the objects that he talks about are smart toys and security cameras.

Free wifi hacking


The Windows community addresses the concerns of using public wifi, and how easy people can gain information through wifi. The video provides examples of secure sounding wifi networks compared to suspicious ones. The video also lists some examples on how to stay safe using public wifi.

The video describes their concerns about public wifi and how easily hackers can obtain information through public wifi. After explaining the risks, they provide examples on how to stay safe using public wifi. The video wants to spread awareness on public wifi cyber attacks and how to keep devices and information secure.

Resources

FBI’s Safe Online Surfing

Educate & Entertain students on ways to stay safe on internet by playing games

Learn More

Public Broadcasting Service

Offers a library of resources for kids that want to explore cybersecurity.

Learn More

NJCCIC E Learning For Kids

Encourages students to learn and explore by providing articles & games

Learn More

KnowBe4 Children’s Cybersecurity Activity Kit

Offers free activities & videos to teach younger kids about cybersecurity.

Learn More
Image

Learn Kali Linux

Kali Linux tutorial covers both fundamental and advanced hacking and penetration testing concepts. The following  Kali Linux tutorials are designed for both beginners and professionals:

Check out the video tutorials!

Published on February 2nd, 2022

Last updated on September 6th, 2022