Teacher Guide - Cybercrime and Computer Forensics Unit
Teacher Guide - Cybercrime and Computer Forensics Unit
Teacher Guide
This unit is designed to be completed over 12 45-minute class periods. Outlined below are the daily activities and
topics covered in the unit along with any required preparation or teacher notes.
Materials ● Students should work through their own copy of the “Online Safety and Cybercrime”
Needed: slide deck.
● Teachers should ensure that each student gets their own copy of the “Online Safety
Teacher Prep: and Cybercrime” slide deck. If assigned on Google Classroom, students should each
be assigned their own copy.
● What is Cybercrime?
● What is Online Personal Data?
● What is a Digital Footprint?
● How to protect online data
● Scams
Topics Covered:
● Ransomware attacks
● Pop-ups
● Phishing
● Spam
● What is the Dark Web?
The “Online Safety and Cybercrime” slide deck contains a variety of student activities,
including:
● Asking students to answer the question, “How do online cyber criminals try to get your
Student data and personal information?”
Activities: ● Asking students to sort descriptions of online threats into the appropriate type (scam,
ransomware, etc.)
● Asking students to identify online safety missteps in three different scenarios
● Student reflections activity
Day 2: Famous Cybercrimes and Their Impact
Materials ● Students should work through their own copy of the “Famous Cybercrimes and Their
Needed: Impact” slide deck.
● Teachers should ensure that each student gets their own copy of the “Famous
Cybercrimes and Their Impact” slide deck. If assigned on Google Classroom, students
Teacher Prep:
should each be assigned their own copy. I’ve also provided a teacher key for this
activity.
● The Melissa Virus (What happened, how perpetrator was caught, after-effects)
● NASA Cyber Attack (What happened, how perpetrator was caught, after-effects)
Topics Covered:
● Darkode Cyber Criminal Forum (What it was, how it worked, and how it was taken
down)
The “Famous Cybercrimes and Their Impact” slide deck contains a variety of student activities,
including the following student questions:
● What impact did the Melissa Virus have on computer systems?
● How did the Melissa Virus spread so quickly?
● What advice would you have given users in 1999 to avoid being victims of the Melissa
Virus?
● What measures could have been taken by NASA to prevent James Jonathan from
hacking into their systems?
● Why do you think the Darkode Forum was created? What need did it fill?
● What role does the Dark Web play in facilitating cybercrime?
Materials ● Students should work through their own copy of the “Catfishing Activity” slide deck.
Needed: ● Students should also be given access to the Catfishing Article and Article Questions.
● Teachers should ensure that each student gets their own copy of the “Catfishing
Activity” slide deck. If assigned on Google Classroom, students should each be
assigned their own copy. I’ve also provided a teacher key for this activity.
Teacher Prep: ● Teachers should also make the Catfishing Article and the Article Questions available to
students. There is a PDF version of the article on Google Drive, but the direct link to the
article is: https://www.irishtimes.com/life-style/people/2022/06/06/gaa-catfish-the-2-
johnnies-and-the-fake-identity-case-theyre-cracking/
● What is Catfishing?
Topics Covered: ● Notable Catfishing Cases
● Red flags to help identify catfishing attempts
Student ● Students will be asked to identify catfishing red flags in three examples
Activities: ● Students will read a Catfishing article and answer questions about its content
Day 4: Red Flag Infographic/Informational Poster
● Teachers should ensure that each student gets their own copy of the “Red Flag
Infographic/Informational Poster” activity directions and rubric.
● Teachers should also ensure that students are shown/given a copy of the Red Flag
Teacher Prep:
Infographic/Informational Poster example (on second page of activity directions). Note
that the example is over a different topic (online safety) instead of catfishing red flags.
This is so that students don’t copy the example poster for their own work.
Student Students will be asked to create an informational poster/infographic detailing red flags for
Activities: catfishing attempts.
Day 5 - 6: Hacktivism
● Make sure all of the materials listed above are available to students before the lesson.
Teacher Prep: The only materials that need to be editable by students are the Hacktivism slide deck
and the Informational Brochure Activity Template.
● What is hacktivism?
● Brief history of hacktivism
● Motivations for hacktivism
● Overview of hacktivist methods
Topics Covered: ● Notable hacktivist groups - Anonymous, LulzSec, Syrian Electronic Army
● Notable hacktivist attacks
● Hacktivism trends
● Ethics surrounding hacktivism
● Future of Hacktivism in age of AI
● Ensure that students have access to all of the above resources. They should be able to
Teacher Prep:
edit their own copy of the Intro to Cyber Forensics Slide Deck.
● Students will be asked to research the challenges that one of the following technologies
pose to the field of cyber forensics: Artificial Intelligence, Quantum Computing.They will
also be asked to suggest possible mitigations that can be used to address these
Student challenges.
Activities:
● Students will be asked to match the type of cyber forensic evidence with its description
● Students will complete a collage activity, where they are asked to compile various
images that represent different types of cyber forensics
Day 8: Notable Criminal Cases Solved with Cyber Forensics
Make sure all of the above resources are made available to students. Students should be able
Teacher Prep: to edit the Timeline Template and the High Profile Criminal Cases Solved with Cyber Forensics
slide decks. The BTK Timeline Example can be shared as “View Only”.
● Notable criminal cases that have been solved with digital forensic tools are profiled.
Cases include:
Topics Covered: ○ BTK
○ Golden State Killer
○ Craigslist Killer
● Before class begins, post the link to the Cyber Forensics Website
(https://sites.google.com/caseywestfield.org/cyberforensics/home) on Google
Classroom
● Give students access to the Evidence Tracking Sheet. You can either post this on
Google Classroom for them to have their own copy or print it out for them to write on.
Teacher Prep:
Sometimes it seems easier for students to write on the paper rather than switch
between the website and the Google Doc to track their evidence.
● DO NOT post the Crime Solution. This is for you, the teacher, to use. You can choose
to reveal who the killer is at the end of the activity, should you desire, or just leave it a
mystery to the students.
Topics Covered: The use and importance of cyber forensics in solving crimes.
Students will visit the website linked above, examine the cyber forensic evidence, and
Student determine which of the suspects is the serial killer. They will complete their evidence tracking
Activities:
sheet as they read through the descriptions of the crimes, evidence, and suspects.
Days 11 - 12: Future of Cyber Forensics in the Age of AI
● Students should be given their own copy of all of the materials listed above. The
“Future of Cyber Forensics” slide deck, the Ethical Scenarios, and the Future of Cyber
Teacher Prep:
Forensics Scenarios should all be able to be edited by the students. The Press Release
Activity can be set to View Only.