cybersec-1 · Module 5
Cybersecurity I, Unit 5: Cyber Threats and Attack Vectors
Name the threat. Trace the attack. Students leave able to identify malware families, dissect a phishing email, recognize social engineering plays, and profile a threat actor.
240 min · foundational
Locked module
Get the full Cybersecurity I, Unit 5: Cyber Threats and Attack Vectors module with the cybersec-1 edition.
Each module includes a teacher overview, learning objectives, vocabulary, safety notes, warm-up, mini-lesson, activity, rubric, answer key, and career connection.
