Make sure that no matter what you do on the Internet, you are leaving a positive digital footprint.
A Cyber Privacy Parable
Learn what can happen when you post something to social media, who can access it and your personal information.
Be Internet Awesome with Interland
Interland includes online adventures in learning more about online safety, phishing, privacy, security, and online behavior.
Build an Electromagnet
Build an electromagnet in this COSI Connects activity. Click the green Open button to access this COSI Connects activity.
Play Kithgard Dungeon and use simple lines of code to move your hero through a labyrinth of spikes. Follow the link to play without an account.
Cyber Security: Passwords
Watch this video from The World Almanac for Kids about using passwords. One vital way to keep intruders out of a personal computer is to safeguard passwords. Passwords should be at least 8 characters long and should include letters, symbols, and numbers. (If you're at home, you'll need your school's INFOhio username/password. If you don't know it, find it on INFOhio's Get Password page).
Cyberbullying Research Center: Tips for Teens
Downloadable tip sheets on identifying, preventing, and responding to cyberbullying, cell phone safety, social media safety, and other related topics.
In this online lab, you will complete a series of cybersecurity challenges to defend your company against some sophisticated cyber attacks.
Cybersecurity Lab - NOVA Labs
Whenever we go online—to shop, chat with our friends, or do anything else—we put ourselves at risk of cybercrime. NOVA has teamed up with cybersecurity experts to create the Cybersecurity Lab, a game in which players will discover how they can keep their digital lives safe and develop an understanding of cyber threats and defenses.
Cybersecurity: Crash Course
Discussion on ways to protect the security, integrity, and availability of computer systems and data against threats.
Dance Mat Typing
Four levels to play practicing typing skills. New letters are introduced at each level along with a test and reward.
Learn how everyday objects are built and redesign them to be better!
Read more about how hacking is used to evaluate the security and vulnerabilities in computer and network systems.
Express Course - Code.org
Learn computer science by trying the lessons at your own pace! Learn to create computer programs, develop problem-solving skills, and work through fun challenges! Make games and creative projects to share with friends, family, and teachers.
Google Quick Draw
Can a neural network learn to recognize doodling?
Help teach it by adding your drawings to the world’s largest doodling data set, shared publicly to help with machine learning research.
Hackers and Cyber Attacks
Learn the difference between Black Hats (malicious cybercriminals) and White Hats (who work to identify and close security vulnerabilities).
Hacktivism [Points of View Reference Center]
Learn more about Hacktivism that combines high-tech computer hacking with political activism.
Hour of Code Activities
Search by grade level, experience level, topics, and more to access hundreds of coding games and resources.
Learn about what is happening with robots today!
Learn about inventors, inventions, and technology.