top of page
Unlock Your Hidden Cyber Talent: Exciting Quiz for Kids and Teens!
-
What is it?This quick, fun quiz is intended to help kids and teens know what they would be most interested in regarding cybersecurity. The names of each team member are kid-friendly and easy to understand. These are based on real roles in the cybersecurity profession. So, it's not like it's made up for farts and giggles lol.
-
How to use it?Answer the questions as honestly as you can. There are no correct answers. Do not try answering based on what you want to score. The idea is to be truthful so you can see what you may currently enjoy doing. Of course, if there is a title you specifically want, I encourage you to read up on it and learn what you can from there. These are just a suggestion. This is most helpful for kids and teenagers who think they may be interested but don't know where to start or even what cybersecurity is.
-
Who is it for?Similar to most resources on this website. This quiz is designed simply for 12-18 years olds. If you are older and want a similar test using more professional terms. Be patient, as it's in development on CyberBennett.com.
-
When are you available to speak?Contact me today and we can discuss further details.
-
Who is this service for?Anyone who survived 2020.
-
Why are you doing this aside from your mission statement?To provide students with a role model who they can relate to. While in college, I didn't My objective is to discuss these tips and help students learn what it takes to be successful.
-
You've said this workshop includes 10 standards from Texas's Framework. Which standards are covered in this first workshop?This workshop aligns with the Texas State Board of Education's §130.428. Foundations of Cybersecurity Framework. The standards: Use appropriate cybersecurity terminology. Define malware, including spyware, ransomware, viruses, and rootkits. Identify the transmission and function of malware such as Trojans, worms, and viruses. Discuss the impact malware has had on the cybersecurity landscape. Compare free and commercial antivirus software alternatives. Compare free and commercial anti-malware software alternatives. Explain the importance of backup files; and Identify well-known ports by number and service provided, including port 22 (ssh), port 80 (http), and port 443 (https). Compare methods for single- and dual-factor authentication such as passwords, biometrics, personal identification numbers (PINs), and security tokens. Compare risks associated with connecting devices to public and private wireless networks.
-
Do You Offer a Certificate?Yes, students who finish the workshop and pass the final assessment will receive a certificate.
-
What problem are you solving with this workshop?● Cybersecurity information is traditionally highly technical. ● Limited resources exist for young people interested in cybersecurity.
-
Who is Your Target Audience?Ideally, the workshop is for 12-year-olds to 16-year-olds (7th - 10th grade) in underrepresented communities. We work with youth programs, STEM communities, and learning institutions to ensure we have a tremendous impact. We aim to simplify complex cybersecurity concepts, making them accessible, engaging, and inclusive.
Take Quiz Below
(Screenshot your results)
bottom of page