Lesson Planet
Search educational resources
  • Sign In Try It Free
  • AI Teacher Tools
    • Discover Resources Search reviewed educational resources by keyword, subject, grade, type, and more
    • Curriculum Manager (My Content) Manage saved and uploaded resources and folders To Access the Curriculum Manager Sign In or Join Now
    • Browse Resource Directory Browse educational resources by subject and topic
    • Curriculum Calendar Explore curriculum resources by date
    • Lesson Planning Articles Timely and inspiring teaching ideas that you can apply in your classroom
    • Our Story
    • Frequently Asked Questions
    • Testimonials
    • Contact Us
  • Pricing
  • School Access
    • Your school or district can sign up for Lesson Planet — with no cost to teachers
      Learn More
  • Sign In
  • Try It Free
Crash Course Computer Science #32: Hackers and Cyber Attacks Instructional VideoCrash Course Computer Science #32: Hackers and Cyber Attacks Instructional Video
Publisher
Crash Course
Resource Details
Curator Rating
Educator Rating
Not yet Rated
Grade
9th - 10th
Subjects
Career & Technical Education
1 more...
Resource Type
Instructional Videos
Audiences
For Administrator Use
2 more...
Lexile Measures
0L
Instructional Video

Crash Course Computer Science #32: Hackers and Cyber Attacks

Curated by ACT

This episode discusses hackers and their strategies for breaking into computer systems. Now, not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats who hunt for bugs, close security holes and perform security evaluations for companies. There are a lot of different motivations for hackers-sometimes just amusement or curiosity, sometimes for money, and sometimes to promote social or political goals. We are going to walk you through some of the strategies hackers use to gain access to your devices, so you can be better prepared to keep your data safe.

3 Views 2 Downloads

Concepts

fishing

Additional Tags

hacker strategies, malware, pretexting, black hats, crash course, hackers and cyber attacks, oh ni.c.9-12.f.a, oh ni.c.9-12.f.b, white hats, cyberattack, digital security risks, hackers

Classroom Considerations

  • Knovation Readability Score: 2 (1 low difficulty, 5 high difficulty)
  • The intended use for this resource is Instructional
  • This video is hosted on YouTube

View 8,026 other resources for 9th - 10th Grade Career & Technical Education

© 1999-2026 Learning Explorer, Inc.
Teacher Lesson Plans, Worksheets and Resources

Sign up for the Lesson Planet Monthly Newsletter

Open Educational Resources (OER)

  • Health
  • Language Arts
  • Languages
  • Math
  • Physical Education
  • Science
  • Social Studies
  • Special Education
  • Visual and Performing Arts
View All Lesson Plans

Discover Resources

  • Our Review Process
  • How it Works
  • How to Search
  • Create a Collection

Manage Curriculum

  • Edit a Collection
  • Assign to Students
  • Manage My Content
Contact Us Site Map Privacy Policy Terms of Use