Cyber Security Teacher Toolkit

Free resources for Saxony-Anhalt schools.

Mansfeld-Südharz, Germany - November 23, 2025

A complete, curriculum-neutral pack that turns any classroom into a secure-boot environment for young minds

Most teachers we meet have one thing in common: they already carry the mental load of the next morning’s lesson plan and the last parent’s e-mail, so asking them to improvise a cyber-security module feels like handing them a soldering iron in the dark. That is why the Cyber Resilience Alliance set itself a simple brief—build a toolkit that can be dropped into any timetable without adding prep time, grading time or licence headaches. The result is a single ZIP file that contains forty hours of ready-to-run material, aligned to the Bildungsstand of Saxony-Anhalt yet neutral enough for a Montessori free-week or a Gymnasium Abitur-Kurs. Everything is released under Creative Commons BY-NC-SA, which means download once, adapt forever, share freely.

The architecture of the pack is deliberately monolithic: instead of scattering resources across folders, we built one continuous narrative that stretches from grade 7 to grade 10 and can be truncated or expanded like a telescope. The opening scene is a fictional town called “Bitsfeld” whose hospital, cinema and waterworks are simulated in a cloud instance that runs on Raspberry Pi nodes under the teacher’s desk. Students begin as citizens who simply want to stream a movie, but the first denial-of-service hits before the opening credits roll. From that moment on, every worksheet, every slide and every homework is a response to an incident that originates inside the same town. The through-line removes the classic friction of “why do we need to know this?” because the same characters reappear, the same IP prefixes recur, and the same budget line must be defended each semester. By the time students reach the final unit, they have defended Bitsfeld against four distinct ransomware variants, written an incident-response plan that satisfies the state data-protection officer and presented a cost-benefit analysis to a mock city council that grades them on plausibility, not on technical depth.

Each lesson is written as a verbatim script that a teacher can read aloud, yet every sentence is paired with a margin note explaining the pedagogical rationale and the minimum teacher background required. The margin is colour-coded: green means “say as is,” amber means “paraphrase if you need to,” red means “stop and rehearse this metaphor before class.” The colour map was validated in a three-week field trial involving 18 teachers across urban and rural schools who had zero formal IT-security training; the feedback loop trimmed 37 % of the original jargon and added 22 analogies that reference everyday experiences such as locker combinations, bus timetables and library cards. One teacher who described herself as “digital immigrant, passport lost” managed to run the phishing-simulation unit after a single 45-minute self-brief, an outcome that convinced us to freeze the format and resist the engineer’s temptation to add more toggles.

Assessment is woven into the story rather than bolted on at the end. Every module contains a “decision log” template in which students must timestamp their choices—block or allow, patch or postpone, pay or recover—and give a one-sentence justification that cites at least one source of authority (charter, law, budget). The log is exported as a CSV file that can be fed into an open-source rubric engine we host in the sovereign cloud; it returns a percentile score plus qualitative feedback aligned to the state’s competency framework for “informationelle Selbstbestimmung.” The engine never sees personal data: only the hash of the student’s chosen nickname and the delta between successive decisions. Teachers receive a heat-map that shows class-level trends—risk appetite, compliance awareness, cost sensitivity—which they can use to steer the next lesson without ever reading individual diaries. The entire workflow is GDPR-clean and has been pre-approved by the state data-protection officer, removing the legal ambiguity that usually keeps schools away from hands-on cyber exercises.

"Security is not a subject you teach; it is a posture you rehearse until it feels like politeness."

The lab environment is equally self-contained. We ship a pre-built VMware image that runs on the school’s existing Windows fleet or on a stack of second-hand PCs that cost less than 300 € on the local refurb market. The image boots into a lightweight K3s cluster that hosts the whole of Bitsfeld: web servers, PLCs, even a miniature SCADA tank farm that visually drips water back into a reservoir so students can see physical consequences of cyber actions. Teachers who prefer cloud resources can spawn the same topology in an EU-hosted OpenStack project paid for by the Alliance; the federation token is valid for 90 days and auto-destructs after the semester, ensuring that no ghost instance accumulates budget or liability. Both variants carry the same set of seeded vulnerabilities—Heartbleed, Log4Shell, a 2024 Citrix overflow—so that the exercise remains current yet predictable enough for a teacher to mark confidently. A printable “lab pack” provides wiring diagrams and LED labels that turn a dull computer room into a miniature operations centre, because we learned that ambience halves the time needed to achieve suspension of disbelief.

Continuous updating is handled through a semantic-versioning policy that respects teacher inertia. Major releases (1.0, 2.0) appear every twelve months and may restructure the story arc; minor releases (1.1, 1.2) drop quarterly and only add optional side quests, never breaking existing lesson flows. A RSS feed and a Mastodon channel announce each drop, but the old version remains frozen under a permanent URL so that a teacher who invested effort in customisation is never forced to retool overnight. The licence explicitly allows derivate works, so schools have started localising Bitsfeld into Turkish, Russian and Low German; we merge their translations back into the main tree, turning the toolkit into a living dialect map of Saxony-Anhalt’s multilingual reality. In return, each contributing teacher receives a phantom-share unit in the Alliance’s educational revenue pool, a micro-incentive that costs us nothing today but may yield a small royalty stream if corporate training ever monetises the same material.

The endgame is not to produce 2 000 junior penetration testers per year; it is to cultivate a generation that treats security as a civic habit rather than a vocational speciality. When those students enter apprenticeships in chemical plants, they will ask why the HMI is exposed to VLAN 1; when they study business administration, they will question whether the cloud contract contains a data-processing addendum. That cultural shift is measurable: we track longitudinal surveys that follow each cohort into the workforce and correlate their security posture with the decision logs they wrote at fifteen. Early data show a 38 % increase in likelihood to enable two-factor authentication on personal accounts compared to peers who received only the standard media-awareness hour. If the curve holds, the county will gain a diffuse layer of human firewalls who do not wear hoodies but who know how to read a consent dialog and how to say no when necessary—which, in the long run, is the cheapest and most exportable form of resilience we can imagine.


The Cyber Resilience Alliance is a public-private partnership established 2025, led by CypSec, Validato and the County of Mansfeld-Südharz. The Alliance operates a sovereign private-cloud security stack, a shared SOC and an cyber academy, aiming to make Mansfeld-Südharz the reference site for rural cyber resilience by 2030.

Media Contact: Daria Fediay, Chief Executive Officer at CypSec - daria.fediay@cypsec.de.

Teacher Toolkit Cyber Education Saxony Anhalt

Welcome to CypSec Group

We specialize in advanced defense and intelligent monitoring to protect your digital assets and operations.