Startup Development Team
High School Summer Adventures

FOLLOW THE STEPS

Review, Consider, Log

STEPS 5-8

EXPLORING CAREER PATHWAYS

VOYAGE V

CYBERSECURITY

Cybeersecurity - Pathway 2 - High School Summer Adventures - STEP #5

 

Considering Cybersecurity Summer Activities

Victoria and Christopher are making plans for their High School Summer Vacation. With a mutual concern about information security and cyber-terrorism, they are seeking to find summer activities that will help them understand the intricate, yet exciting world of cybersecurity. As their exploration begins, Victoria finds she is more drawn toward governmental agencies and national infrastructure, like the power grid and air traffic control. Christopher feels he would rather pursue a career in commerce, such as banking or retail. Both look into summer activities of interest that will provide them each a uniquely valuable experience.

What direction will you take on this pathway?

CYBER CAMPS

For this step on your pathway, Chris and Victoria would like you to investigate the details for the following cyber-related camps:                                      

  • Research any other virtual camps

  • Research any other local or regional camps

  • After investigating these resources and programs, explain which one you would find the most exciting and be most interested in.

 

Record your evaluations and feedback in your Quantum Leap Voyages Log. 

Cybersecurity - Pathway 2 - High School Summer Adventures- STEP #6

 

Cybersecurity Summer Reading

As Christopher and Victoria become more involved in the world of Cybersecurity, they discover it has a language of its own. After a recent workshop, they heard about the following reference books that define hundreds of primary cybersecurity terms used in the industry. 

 

In this step, complete the following:

  • At a small investment, obtain a copy of The Cybersecurity to English Dictionary by Raef Meeuwisse.

  • Or, at Live-Library, you can borrow another great reference book by the same author, Cybersecurity for Beginners.

  • Read through and evaluate either reference book. Describe if it is valuable in helping you become more fluent in understanding common cyber security terms. Would recommend them to Victoria and Chris and why?

Record your evaluations in your Quantum Leap Voyages Log. 

Good Time to Learn

Cybersecurity Jargon

cloud

domain

software

VPN

IP address

exploit

breach

malware

randsomware

virus

botnet

trojanhorse

worm

bot

spyware

phishing

rootkit

DDos

encryption

BYOD

social engineering

clickjacking

deepfake

white hat

black hat

firewall

pen testing

Listen

Cybersecurity - Pathway 2 - High School Summer Adventures - STEP 7

 

Cybersecurity top events

And why you want to attend one...

Events and Conferences

While Christopher and Victoria are at a summer camp, they would like you to do a little extra research to find one or two really good events or conferences they could attend. In this step:

 

  • Watch Top 10 Cybersecurity Events video.

  • Search the Internet for current cybersecurity conferences, meetings, and/or videos.

  • Check for upcoming national, regional, and local events.

  • Select two or three events you would like to attend in person or online.

  • Evaluate and list why you chose the events in your search.

  • What recommendations do you have for Christopher and Victoria?

 

Record your impressions and notes in your Quantum Leap Voyages Log.

Cybersecurity - Pathway 2 - High School Summer Adventures - STEP 8

 

Getting Real About Cybersecurity

As Victoria and Chris learn more and more about cybersecurity, they decided to get together to explore close-to-home, real-life cybersecurity situations. First, they made a list of some local businesses, agencies and institutions to investigate how they are prepared for cyber-attacks. Enthused, they consider some of the following agencies to explore:

  1. Local Police Precinct

  2. Town Fire Department

  3. School District

  4. Community Ambulance Services

  5. Local Hospitals

  6. Town Government

  7. Water, Electric, Phone Services

  8. Banks

  9. Target Stores

  10. Home Depot

 

In this step:

  • Pick two or three on the list in your community.

  • Make a list of a few questions to ask about how they prepare for a cyberattack.

  • Set up an interview with the professional(s) responsible for their cybersecurity.

Record the information you learned and your impressions in your QLV Log.    

Coding

REMINDER:

Log findings for

Steps 5-8 in your

QLV Journal

EXPLORE MORE...

OFF TO COLLEGE!

GO TO PATHWAY 3

GO TO PATHWAY 3
 
 

Quantum Leap Voyages is an Xtreme Intern Adventure

 

Quantum Leap Voyages is an Xtreme Intern Adventure

 

Copyright © 2011-2020 XTREME INTERN

All Rights Reserved | Nassau BOCES Perkins Consortium

CLICK HERE TO REPORT ISSUES OR BROKEN LINKS

 

UNDER CONSTRUCTION

Quantum Leap Voyages is an Xtreme Intern Virtual Career Adventure, an educational career-building activity created for students through the Nassau BOCES Perkins Consortium grant. Xtreme Intern, Quantum Leap Voyages, Global Planet Solutions, Cloud City, all voyages, divisions, subsidiaries, internships, mentors, and characters are fictitious. The information provided is for educational purposes only to assist students in researching options for academics, colleges, careers, and life.