Cyber Fundamentals

Completed

The Cyber Fundamentals collection is intended for learners ranging from grades 6-8 / Lower Secondary / Ages 11-14. This collection of cybersecurity maps is intended to help educators continue to expand students’ knowledge of cybersecurity concepts.

Network Heroes

Players are joining their new school. They meet their teacher and classmates. However, it’s quite a day to join the school. Something interesting is happening at the school! In this world, students need to take charge of safeguarding school networks against menacing attackers.

Screenshot of Minecraft Education Network Heroes world opening screen.

In this Minecraft map, players work through three different lessons: Network Components, Password Protection, and Malware.

By the end of the unit, students will be able to:

  • Articulate the components make up a local-area network (LAN)
  • Differentiate between local area-network (LAN) and wide-area network (WAN)
  • Draw and label a diagram of how information travels through a network (packets)
  • Explain the importance of encryption for confidentiality
  • Create complex passwords
  • Describe layered security practices (such as 2FA and network firewalls) to keep unauthorized users from accessing their networks
  • Define malware and identify common types of malware
  • Explain how individuals can avoid malware

The full lesson plan and educational materials for Cyber Fundamentals: Network Heroes are found on the Minecraft Education website.

Network Components

Screenshot of the Packet Thief character.

In this lesson, players learn about network connections and how data is sent from computer to computer; network to network. Then, they fight off Packet Thief who is trying to siphon the data. They accomplish this task by encrypting the computers.

Password Protection

Screenshot of the Password Protection character.

In this lesson, players learn how to create complex passwords, their role in network security, and other layered security practices (such as 2FA) to keep unauthorized users from accessing their networks.

Malware

Screenshot of Malware and Phishing characters.

In this lesson, players learn what malware is, how to identify it, and what steps they can take to keep themselves safe from it.

The Interceptors

Everyone loves a school field trip, right?

Well, this school field trip turns into an intense mission! With your teacher and a security specialist trapped, harness the power of multifactor authentication and other skills to thwart off another cyber assault.

Screenshot of the Minecraft Education Cyber Fundamentals world opening screen.

In this Minecraft map, players work through two different lessons: Authentication and Incident Response Team.

By the end of the unit, students will be able to:

  • Define the concept of authentication
  • Explain why authentication is important in cybersecurity
  • Describe how multi-level authentication works.
  • Provide real examples of multi-level authentication
  • Articulate the concept of authentication.
  • Explain why authentication is important in cybersecurity
  • Explain how multi-level authentication works.
  • Present real examples of multi-level authentication

The full lesson plan and educational materials for Cyber Fundamentals: The Interceptors are found on the Minecraft Education website.

Authentication

Screenshot from Minecraft Education Authentication lesson.

In this activity, players learn about the three different types of authentication and how multi-level authentication should be used to strengthen their defense against any kind of cyberattack.

Incident Response Team

Screenshot from Minecraft Education Incident Response Team lesson.

In this lesson, players learn what an incident response team is, the members of an incident response team, and their roles/responsibilities.

Cloud Champions

Our friends are all grown-up now! However, you should brace yourselves for the ultimate challenge with Cloud Champions as our school friends are grown-up cyber experts, who ward off large-scale cloud attacks! In this epic showdown, players join forces with fellow cybersecurity experts to secure a datacenter and prevent a coordinated cloud attack against the internet.

Screenshot of Minecraft Education Cloud Champions lesson opening screen.

In this Minecraft map, players work through two different lessons: Back-Up Data and Big Bad’s Attack.

By the end of the unit, students will be able to:

  • Explain what is a digital footprint and actions that contribute to a digital footprint
  • Describe how the 3-2-1 data storage method
  • Explain the importance of backups
  • Articulate the concept of the Internet of Things (IoT)
  • Provide real examples of Internet of Things (IoT) devices
  • Explain the risks and benefits of IoT devices

The full lesson plan and educational materials for Cyber Fundamentals: Cloud Champions are found on the Minecraft Education website.

Back-Up Data

Screenshot from Back-Up Data.

In this activity, players reinvestigate the cyberattack from years ago. Amal, Taylor, Lee, and Malik lead them through a series of activities to learn the importance of data storage.

Big Bad’s Attack

Screenshot from Big Bad's Attack lesson.

In this lesson, players learn about the Internet of Things (IoT), identify types of IoT devices, and discover both the benefits and vulnerabilities of using IoT devices. Players finish up the lesson by entering the supercomputer to defend against Big Bad’s G.H.O.S.T. v2 attack!