K-12 Cybersecurity Educations
  • Home
  • VR Games
    • Advanced Sniffing Game
    • 2D Cyber Security Card Game
    • 2D Cyber Security Card Game II
    • Buffer Overflow Code Puzzle Game
    • Basic Sniffing Game
    • 3D Cyber Tower Defence Game
    • Cyber Security NOC Day Game
    • Cyber Security NOC Night Game
    • Nslookup and Port Game
    • 3D Secure Cyber and Online Behavior Game
    • 3D Social Engineering Game
    • SQL Injection Game
  • Webbased Game
    • Establish Trust game
    • Cybersecurity Ethics Game
    • Cybersecurity Ethic game with scenarios
    • Cipher Island Game
    • Cyber Tower Defense
    • Ubiquitous Connectivity
    • Adversary thinking Game
    • System Security Game
    • CyberSecurity Implications Game
    • Risk Assessment Game
  • Ethical Hacking
    • Creating A Virtual Machine
    • Virtual Machine Access and Virtual Network Setup
    • Virtual Machine Download
    • TCP Session Setup-Threeway Handshake
    • TCP Session Hijacking
    • TCP reset
    • Syn flood
    • SQL Injection
    • smurf
    • Physical Security
    • Document-Based on Seed Lab
    • DNS cache poisoning
    • Buffer Overflow
    • Basic network communication
    • Basic DNS
    • Basic CPU Programming
    • Basic CPU
    • ARP Poisoning
    • Basic ARP
    • Ethical Hacking Lab
    • Ethical Hacking Stealthy Scanning
    • Ethical Hacking Vulnerability Identification
    • Password Cracking
    • System Break in
    • Web Hacking
  • Robotic Programming
    • Robot Basic
    • Robot Remote Control
    • Move Robot
    • Robot Wall avoidance
    • Robot Grip and Carry
    • Robot Bluetooth Sniffing
    • Robot Bluetooth Hijacking
    • Data Hiding
    • Wi-Fi Phsing 1
    • Wi-Fi Phsing 2
  • Digital Forensics
    • File System-FTK Imager Examination
    • FTK Imager create disk images
    • Disk Format Preparation labs
    • FTK Basics
    • Software to be installed on machine
    • Firefox Browser Forensics Analysis
    • IE Browser Forensics analysis
    • Windows RegistryForensisc Analysis
    • Password Cracking–FTK License Needed
    • File Recovery from Intercept Network Traffic Log
    • Additional Steganography File Recovery
    • Steganography File Recovery
    • FTK Examine of Windows OS
    • Alternate Data Stream and Secret
    • Recover Deleted File and Lost Password

K12-Robotic Programming

Robotic Programming

Robot programming refers to the process of developing a control scheme for how a machine interacts with its environment and achieves its goals. It usually requires a basic knowledge of mathematics and a programming language. For example, Python is one of the most popular robot programming languages today.

  • Robot Basic
  • Robot Remote Control
  • Move Robot
  • Robot Wall avoidance
  • Robot Grip and Carry
  • Robot Bluetooth Sniffing
  • Robot Bluetooth Hijacking
  • Data Hiding
  • Wi-Fi Phsing 1
  • Wi-Fi Phsing 2
  • Privacy Policy
Hestia | Developed by ThemeIsle