RECNT
Home
People
Site Experience
Teacher Resources
NetDefense
FAQs
Contact
National Science Foundation
University of Nevada, Reno
This research is supported by NSF Award #1855159
RET Site: Research Experience in Cybersecurity for Nevada Teachers (RECNT)
University of Nevada, Reno
What are you looking for?
Cybersecurity Overview
Ethics
Cryptography
Coding
Privacy
Communications
Digital Forensics
Biometrics Security
Robotics
Risk Management
Lessons/Activites from Other Teachers
Curriculum Integration
Posters
All Video Demos
Lesson Plans/Activities
Cybersecurity Intro Part 1
Cybersecurity Intro Part 2
Cybersecurity - Kristina Erb
Cybersecurity - Scott Underwood
Videos
Cybersecurity Overview 2018 (Parts 1-7)
Lesson Plans/Activities
Cybersecurity Ethics
Ethics Exercise 1
Ethics Exercise 2
Videos
Ethics 2018 (Parts 1-5)
Ethics Exercise (Parts 1-4)
Lesson Plans/Activities
Cryptography Intro
Robots and Sequencing Cryptography - Joel Hurley
Videos
Cryptography (Part 1-9)
Hashes Tabletop Activity (Part 1-4)
Lesson Plans/Activities
Networking Activity
Network Infrastructure - Kristina Erb
Network Communication - Latanya Robinson
Network Infrastructure - Latanya Robinson
Video Lessons 2016
Brute Force Attack
Wireless Router and Wep Cracking
Virtual Lab Networking Activity (Parts 1-10)
Mobile Security (Parts 1-8)
Networking (Parts 1-6)
Video Demos
Communications Security - 2016
Communications Security - 2017
Communications Security (Parts 1-2) - 2018
Lesson Plans/Activities
Learn to Code
Videos
Programming (Parts 1-8)
Python (Parts 1-9)
Lesson Plans/Activities
Forensics Activity
Forensics (Event Logs)
Video Lessons 2016
Thumbcache Viewer
File Carving Fragments
AthenaKlock OST File Viewer
Registry Files Time Zone Information
Video Demos
Dig Forensics - 2016
Dig Forensics - 2017
Digital Forensics (Parts 1-3) - 2018
Lesson Plans/Activities
Biometrics Activity
Video Demos
Biometrics Cybersecurity 1 - 2016
Biometrics Cybersecurity 2 - 2016
Biometrics Cybersecurity 2017
Biometrics Cybersecurity (Parts 1 and 2) - 2018
Lesson Plans/Activities
Robotics Cybersecurity
Robots and Sequencing: Sequencing - Joel Hurley
Robots and Sequencing: Debugging - Joel Hurley
Robots and Sequencing: Cryptography - Joel Hurley
Video Demos
Robotics Cybersecurity - 2016
Robotics Cybersecurity - 2017
Robotics Cybersecurity (Parts 1-2) - 2018
Video Demos 2016
Biometrics Cybersecurity 1
Biometrics Cybersecurity 2
Communications Cybersecurity
Digital Forensics
Robotics Cybersecurity
Video Demos 2017
Biometrics Cybersecurity
Communications Cybersecurity
Digital Forensics
Robotics Cybersecurity
Video Demos 2018
Biometrics Cybersecurity (Parts 1-2)
Communications Cybersecurity (Parts 1-2)
Digital Forensics (Parts 1-3)
Robotics Cybersecurity (Parts 1-2)
Daniel Ingram
Metadata
Kristina Erb
Computer Architecture
Network Infrastructure
Cybersecurity
Wireless Security
Scott Underwood
Cybersecurity
Privacy vs Security
Privacy Explored
Security Explored
Safe Computing
Latanya Robinson
Network Communication
Network Infrastructure
Joel Hurley
Robots and Sequencing: Sequencing
Robots and Sequencing: Debugging
Robots and Sequencing: Cryptography
Scott Wilson
Drone Activities
Videos
Frogbotics - Using Unplugged Robotics to Teach Cybersecurity
Posters
2016
2017
2018
2019
2022
Videos
Privacy - Mehmet Gunes
Videos
Risk Management - Shamik Sengupta
Curriculum Integration Videos
Curriculum (Parts 1-8) - Candice Guy-Gaytán
Curriculum Integration Discussion I(Parts 1-8)
Curriculum Integration Discussion II (Parts 1-8)