0% found this document useful (0 votes)
30 views6 pages

Lesson 6 - Lesson Plan - Career Connections

Uploaded by

marian.louis76
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views6 pages

Lesson 6 - Lesson Plan - Career Connections

Uploaded by

marian.louis76
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Lesson 6: Career Connections

LESSON PLAN
🌎 Lesson overview
💡 Learning objectives
🎓 Standards
💻 Digital skills used
✏️Materials and Prep

📗 Lesson Vocabulary
✅ Procedure
Start Here

Start Class (10 minutes)

During the class (30-50 minutes depending on your class length)

End of Class (5 minutes)

💯 Opportunities for assessment


Career Connections Rubric

⏭️Differentiation

🌎 Lesson overview
In Lesson 6: Career connections, students will be investigating the following topics:
● Careers associated with Cybersecurity
● Innovative careers surrounding cybersecurity and their impact on mainstream
society.
💡 Learning objectives
By the end of this lesson students will be able to:
● Explain the career associated with cybersecurity
● Describe several ways the career will impact personal and digital security

🎓 Standards
ISTE Standards

● ISTE Standard 1 - Empowered Learner (1d): Students understand the


fundamental concepts of technology operations, demonstrate the
ability to choose, use and troubleshoot current technologies and are
able to transfer their knowledge to explore emerging technologies.
● ISTE Standard 3 - Knowledge Constructor (3a): Students plan and
employ effective research strategies to locate information and other
resources for their intellectual or creative pursuits. (3c): Students curate
information from digital resources using a variety of tools and methods
to create collections of artifacts that demonstrate meaningful
connections or conclusions.
● ISTE Standard 5 -Computational Thinker (5b): Students collect data or
identify relevant data sets, use digital tools to analyze them, and
represent data in various ways to facilitate problem-solving and
decision-making.

CCSS Math

● MP1: Make sense of problems and persevere in solving them.


● MP5: Use appropriate tools strategically.

CCSS ELA

● RL.6.2, RL.7.2, RL.8.2: Determine themes or central ideas and summarize the text.
● RL.6.4, RL.7.4, RL.8.4: Determine the meaning of words and phrases as they are
used in a text.
● RL.6.10, RL.7.10, RL.8.10: Read and comprehend literature at the high end of the
grades 6-8 text complexity band independently and proficiently.
● W.6.2, W.7.2, W.8.2: Write informative/explanatory texts to examine a topic and
convey ideas.
● W.6.3, W.7.3, W.8.3: Write narratives to develop real or imagined experiences or
events.
● W.6.4, W.7.4, W.8.4: Produce clear and coherent writing.
● W.6.6, W.7.6, W.8.6: Use technology to produce and publish writing.
● W.6.8, W.7.8, W.8.8: Gather relevant information from multiple sources.
● W.6.9, W.7.9, W.8.9: Draw evidence from literary or informational texts to support
analysis, reflection, and research.
● SL.6.1, SL.7.1, SL.8.1: Engage effectively in a range of collaborative discussions.
● SL.6.2, SL.7.2, SL.8.2: Interpret information presented in diverse media and
formats.
● SL.6.4, SL.7.4, SL.8.4: Present claims and findings, sequencing ideas logically.
● SL.6.5, SL.7.5, SL.8.5: Include multimedia components and visual displays in
presentations.

CSTA

● 2-AP-18 Distribute tasks and maintain a project timeline when collaboratively


developing computational artifacts.

💻 Digital skills used


● Research topics and gather information about various careers surrounding
cybersecurity.
● Communication skills related to presenting information and conveying the
importance of the career they investigated.

✏️ Materials and Prep


● Enough computers for 1:1 ratio during class
● Internet connection strong enough to stream videos from multiple devices at

📗 Lesson Vocabulary
the same time


None

✅ Procedure
Start Here

1. Ensure students have downloaded the student poster worksheet


2. Group your students into pairs. Although students will be in pairs, they will each
be responsible for creating their own products.
Start Class (10 minutes)
1. Instruct students to sign into the CompTIA Spark web app and open the
activity for Career Connections.
2. Students should complete the Career Connections Inventory

During the class (30-50 minutes depending on your class


length)
1. Instruct students to research their career choice, filling in the presentation
as they work through it. The template form provided includes all sections
that students are to research and expand on.
2. As students work their way through the lesson, they may search for the
information themselves using the Cybersecurity Specialist Careers or a
website of their choice.
3. Students may share their poster with the class or if time permits, have a
gallery walk around the room to showcase their information.

End of Class (5 minutes)


1. Give a 10 minute warning and ask students to save their work, upload any
artifacts to the CompTIA Spark web app.
2. In the last 5 minutes ask the class to reflect on the unit on Cybersecurity. Ask
what they thought was interesting throughout each lesson.

💯 Opportunities for assessment


1. Group your students into pairs. Although students will be in pairs, they will each
be responsible for creating their own products.
2. Instruct students to sign in to the CompTIA Spark web app and open the
activity they should be working on.

Student Name_____________________________________________________________

Career Connections Rubric

Criteria 1 (Poor) 2 (Fair) 3 (Good) 4 (Excellent)


Understanding of Does not understand Has a basic Understands the Has a deep
the Position the position at all understanding of the position well understanding of the
position position
Knowledge of Does not know the Has a basic Knows the Has a deep
Required required education understanding of the required understanding of the
Education and and certifications required education education and required education
Certifications and certifications certifications well and certifications

Understanding of Does not understand Has a basic Understands Has a deep


the Importance of why the position is understanding of why the position understanding of why
the Position important why the position is is important the position is
important important

Knowledge of Does not know the Has a basic Knows the Has a deep
Required Skills required skills for the understanding of the required skills for understanding of the
position required skills for the the position well required skills for the
position position
Discussion:

Looking back through the entire unit, reflect on the various lessons on cybersecurity.
What are your biggest "aha" moments?

-Answers may vary.

Moving forward, how do you foresee AI and Chatbots impacting your life? How do you
think they will be used in the future?

-Answers may vary.

⏭️ Differentiation
● Extension Activities
○ Students who finish the activity quickly may add to their poster, including
current issues surrounding their career. They could tie this back to the
investigation on the DoS attack and what role their career may have
played in preventing the attack.
● For students who need accommodations:
○ Allow some students more time while others are working on extension
activities.

You might also like