RECNT
This research is supported by NSF Award #1855159
What are you looking for?
Cybersecurity Overview
Ethics
Cryptography
Coding
Privacy
Communications
Digital Forensics
Biometrics Security
Robotics
Risk Management
Lessons/Activites from Other Teachers
Curriculum Integration
Posters
All Video Demos
Lesson Plans/Activities
Videos
Ethics 2018 (Parts 1-5)
Ethics Exercise (Parts 1-4)
Lesson Plans/Activities
Videos
Cryptography (Part 1-9)
Hashes Tabletop Activity (Part 1-4)
Lesson Plans/Activities
Video Lessons 2016
Brute Force Attack
Wireless Router and Wep Cracking
Virtual Lab Networking Activity (Parts 1-10)
Mobile Security (Parts 1-8)
Networking (Parts 1-6)
Video Demos
Communications Security - 2016
Communications Security - 2017
Communications Security (Parts 1-2) - 2018
Lesson Plans/Activities
Videos
Programming (Parts 1-8)
Python (Parts 1-9)
Lesson Plans/Activities
Video Lessons 2016
Thumbcache Viewer
File Carving Fragments
AthenaKlock OST File Viewer
Registry Files Time Zone Information
Video Demos
Dig Forensics - 2016
Dig Forensics - 2017
Digital Forensics (Parts 1-3) - 2018
Lesson Plans/Activities
Video Demos
Biometrics Cybersecurity 1 - 2016
Biometrics Cybersecurity 2 - 2016
Biometrics Cybersecurity 2017
Biometrics Cybersecurity (Parts 1 and 2) - 2018
Lesson Plans/Activities
Video Demos
Robotics Cybersecurity - 2016
Robotics Cybersecurity - 2017
Robotics Cybersecurity (Parts 1-2) - 2018
Video Demos 2016
Biometrics Cybersecurity 1
Biometrics Cybersecurity 2
Communications Cybersecurity
Digital Forensics
Robotics Cybersecurity
Video Demos 2017
Biometrics Cybersecurity
Communications Cybersecurity
Digital Forensics
Robotics Cybersecurity
Video Demos 2018
Biometrics Cybersecurity (Parts 1-2)
Communications Cybersecurity (Parts 1-2)
Digital Forensics (Parts 1-3)
Robotics Cybersecurity (Parts 1-2)
Posters
Videos
Privacy - Mehmet Gunes
Videos
Risk Management - Shamik Sengupta
Curriculum Integration Videos
Curriculum (Parts 1-8) - Candice Guy-Gaytán
Curriculum Integration Discussion I(Parts 1-8)
Curriculum Integration Discussion II (Parts 1-8)