Best Cybersecurity Lessons and Activities for K-12 Education (2023)

Best Cybersecurity Lessons and Activities for K-12 Education (1)

Computer literacy and security are not merely elective topics for today’s students. Instead, these have become an essential part of elementary education, starting at the earliest levels— because even preschoolers have access to internet-enabled devices.

Launched in 2004 as a collaboration between the National Cyber Security Alliance and the U.S. Department of Homeland Security, Cybersecurity Awareness Month aims to promote not only awareness of cybersecurity hazards, but also the knowledge and tools users need to protect themselves, their devices, and their networks while accessing the vast information highway that makes modern life possible.

The following cybersecurity lessons, games, and activities cover a wide range of topics and grade levels, and can be implemented in general instruction classes as well as dedicated computer science courses. Nearly all are free, with some requiring a free educator registration.

Best Cybersecurity Lessons and Activities for K-12 Education

CodeHS Introduction to Cybersecurity (Vigenere) (opens in new tab)
A full year-long course for high school students, this introductory curriculum is ideal for beginning computer science students. Topics include digital citizenship and cyber hygiene, cryptography, software security, networking fundamentals, and basic system administration.

(Video) Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security | Simplilearn Cybersecurity - Simple Encryption (opens in new tab)
This standards-aligned classroom or elearning lesson aims to teach students the basics of encryption - why it matters, how to encrypt, and how to break encryption. As with all lessons, included are a detailed teacher’s guide, activity, vocabulary, warmup, and wrap up. Rapid Research - Cybercrime (opens in new tab)
What are the most common cybercrimes and how can students (and teachers) identify and prevent such attacks? Learn the basics in this standards-aligned lesson from the curriculum team.

Common Sense Education Internet Traffic Light (opens in new tab)
This Common Core-aligned first-grade lesson teaches basic internet safety with a fun Google Slides presentation/activity. Also included are instructions for an in-class Traffic Light game, as well as a video, handout poem popster, and take home resources. Free account required Cybersecurity Lesson for Grades 10-12 (opens in new tab)
A comprehensive cybersecurity course covering threats, architecture and design, implementation, risk, regulation, and much more. Login via Canvas account or create a free educator account. Events (opens in new tab)
Explore’s upcoming virtual events, such as Intro to Cybersecurity, Cybersecurity Activities for Beginners, Cybersecurity Career Awareness Week, Regional Cyber Challenge, and more. It’s a great resource for professional development, as well as for your high school cybersecurity curriculum.

CyberPatriot Elementary School Cyber Education Initiative (ESCEI) (opens in new tab)
Complete a brief request form, download the digital ESCEI 2.0 kit, and you’re ready to plan your cybersecurity instruction. Included in the free digital kit are three interactive learning modules, supplementary slides, instructor’s guide, introductory letter describing ESCEI, certificate templates and more. An excellent start to your K-6 cybersecurity curriculum.

Don't Feed the Phish (opens in new tab)
Help your students learn how to protect themselves from Internet scams with another fine lesson from Common Sense Education. Taking a playful approach to a serious topic, this complete standards-aligned lesson includes a warmup and wrap up, slides, quizzes, and more.

Faux Paw the Techno Cat (opens in new tab)
Questionable puns and animated animal characters such as Faux Paw the Techno Cat are a great way to engage young learners in an important topic. Follow the adventures of this technology-loving polydactyl puss via PDF books and animated videos as she learns with difficulty how to navigate digital ethics, cyberbullying, safe downloading, and other tricky cyber topics.

(Video) Cybersecurity Training for Kids

Hacker 101 (opens in new tab)
Ever hear of ethical hacking? The thriving ethical hacker community invites interested persons to grow their hacking skills for good. A wealth of hacking how-to resources is free for users, from novice to advanced levels.

Hacker Highschool (opens in new tab)
A comprehensive self-guided curriculum for teens aged 12-20, Hacker Highschool consists of 14 free lessons in 10 languages, covering everything from what it means to be a hacker to digital forensics to web security and privacy. Teachers’ guide books are available for purchase, but not required for the lessons.

International Computer Science Institute: Teaching Security (opens in new tab)
Built on the AP Computer Science Principles, and standards-aligned, these three lessons cover threat modeling, authentication, and social engineering attacks. Ideal for high school students. No account required.

K-12 Cybersecurity Guide (opens in new tab)
What skills are needed to enter the burgeoning cybersecurity field? Which cybersecurity jobs offer the greatest career opportunities? What steps can students take to maximize their cybersecurity knowledge? These questions and many others are answered by cybersecurity experts in this guide for interested K-12 students.

Nova Labs Cybersecurity Lab (opens in new tab)
Designed to teach students how to detect and thwart cyber attacks, PBS’s Cybersecurity Lab posits a newly launched company website with insufficient built-in security. What strategies will you, the CTO, employ to protect your startup? Play as a guest or create an account to save your progress. Cybersecurity Lab Guide for educators included. Be sure to check out the Nova Labs Cybersecurity Videos too!

Risk Check for New Tech (opens in new tab)
A highly practical lesson from Common Sense Education, Risk Check for New Tech asks kids to think hard about the tradeoffs that come with the latest tech innovations. Privacy is especially vulnerable in today’s smartphone- and app-driven tech culture. How much privacy should one give up for the benefits of the latest tech gadget?

Science Buddies Cybersecurity Projects (opens in new tab)
One of the best sites around for complete, free cybersecurity lessons. Each lesson includes background information, materials needed, step-by-step instructions, and guidance on customization. Ranging from intermediate to advanced, these eight lessons examine hacking the air gap (i.e., computers not connected to the internet -- yes these can be hacked!), the actual security of security questions, sql injection attacks, the true status of “deleted” files (hint: these are not really deleted), and other fascinating cybersecurity issues. Free account required.

SonicWall Phishing IQ test (opens in new tab)
This simply 7-question quiz tests students’ ability to spot phishing attempts. Have the entire class take the quiz, tally the results, then examine each example closely to distinguish the salient features of a genuine vs. “phishy” email. No account required.

(Video) S2, EP16 - Cybersecurity in the School System

Best Cybersecurity Games for K-12

ABCYa: Cyber Five (opens in new tab)
This animated video introduces five basic internet safety rules, as explained earnestly by Hippo and Hedgehog. After watching the video, kids can try the multiple-choice practice quiz or test. Perfect for younger students. No account required.

CyberStart Go (opens in new tab)
Terrific selection of free cyber games sorted by difficulty level and subject. The easy games are ideal for younger students and novices, while the harder games pose a stimulating challenge for more advanced students.

Education Arcade Cyber Security Games (opens in new tab)
Five arcade-style cybersecurity games offer an adventurous look at digital security issues such as password breach, phishing, sensitive data, ransomware, and email attacks. Fun for middle to high school students.

Internet Safety Hangman (opens in new tab)
The traditional Hangman game, updated for the internet, provides an easy exercise for kids to test their knowledge of basic internet terms. Best for younger students. No account required.

InterLand (opens in new tab)
From Google, architects of much of the internet as we know it today, comes this stylish animated game featuring sophisticated graphics and music. Users are invited to navigate the perils of Kind Kingdom, Reality River, Mindful Mountain, and Tower of Treasure, learning important internet safety principles along the way. No account required.

picoGym Practice Challenges (opens in new tab)
Carnegie Mellon University, host of the annual picoCTF (“capture the flag”) cyber competition, offers dozens of free cybersecurity games that will challenge and engage middle and high school students. Free account required.

Science Buddies Cybersecurity: Denial-of-Service Attack (opens in new tab)
What happens to a website during a denial of service attack? How can computers be conscripted into such attacks without the owner’s consent? Most of all, how can these attacks be prevented? Explore critical cybersecurity concepts in this NGSS-aligned paper-and-pencil game for middle school students.

ThinkU Know: Band Runner (opens in new tab)
A simple, engaging, music-themed game designed to help 8-10 year olds learn how to stay safe online.

(Video) What You Should Learn Before "Cybersecurity" - Updated 2022

  • 5 Ways to Boost School Cybersecurity (opens in new tab)
  • How Higher Ed is Handling Cybersecurity During COVID-19 (opens in new tab)
  • Hands-On Cybersecurity Training (opens in new tab)




(Video) IDEA & TRA Webinar | What EdTech Leaders Need to Know about School Cybersecurity



What should I learn as a beginner in cyber security? ›

Top 5 Cybersecurity Skills
  • Networking and System Administration. ...
  • Knowledge of Operating Systems and Virtual Machines. ...
  • Network Security Control. ...
  • Coding. ...
  • Cloud Security. ...
  • Blockchain Security. ...
  • The Internet of Things (IoT) ...
  • Artificial Intelligence (AI)
20 Jul 2022

What are the 5 best methods used for cyber security? ›

Essential cyber security measures
  • Use strong passwords. Strong passwords are vital to good online security. ...
  • Control access to data and systems. ...
  • Put up a firewall. ...
  • Use security software. ...
  • Update programs and systems regularly. ...
  • Monitor for intrusion. ...
  • Raise awareness.

What are 10 good cybersecurity practices? ›

Top 10 Secure Computing Tips
  • Tip #1 - You are a target to hackers. ...
  • Tip #2 - Keep software up-to-date. ...
  • Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls. ...
  • Tip #4 - Practice good password management. ...
  • Tip #5 - Be careful what you click. ...
  • Tip #6 - Never leave devices unattended.

What is cyber security lesson? ›

Description. In this lesson, students will learn what is meant by cybersecurity and explore a few news worthy cyber attacks. They will also discuss the Internet of Things and the increase in connected devices. Cybersecurity is the protection of computer systems, networks, and data from digital attacks.

What skills are needed for cybersecurity? ›

The Top Skills Required for Cybersecurity Jobs
  • Problem-Solving Skills. ...
  • Technical Aptitude. ...
  • Knowledge of Security Across Various Platforms. ...
  • Attention to Detail. ...
  • Communication Skills. ...
  • Fundamental Computer Forensics Skills. ...
  • A Desire to Learn. ...
  • An Understanding of Hacking.

How do I start cybersecurity with no experience? ›

How to Get Into Cybersecurity With No Experience?
  1. Look at your current background and job role.
  2. IT Training Courses and Certifications For People With No Experience.
  3. Network and Use LinkedIn.
  4. Think Outside the Box.
  5. Keep a Close Eye on These Technologies.
  6. Salaries to Expect In Entry Level Position.

What are the 7 types of cyber security? ›

The Different Types of Cybersecurity
  • Network Security. Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. ...
  • Cloud Security. ...
  • Endpoint Security. ...
  • Mobile Security. ...
  • IoT Security. ...
  • Application Security. ...
  • Zero Trust.

What are the 3 major types of cyber security? ›

Application security. Network security. Cloud security. Internet of Things (IoT) security.

What are the 10 ways of preventing cyber crime? ›

10 ways to prevent becoming a cyber crime statistic
  • Notify your bank of travel. ...
  • Keep an eye on your bank statements. ...
  • Don't use public wifi for sensitive transactions. ...
  • Enable device location services. ...
  • Get a separate spending card. ...
  • Be suspicious of apps. ...
  • Watch out for holiday scams. ...
  • 'Tis the season for phishing.
24 Dec 2021

What are best security practices? ›

10 cybersecurity best practices
  • Protect your data. ...
  • Avoid pop-ups, unknown emails, and links. ...
  • Use strong password protection and authentication. ...
  • Connect to secure Wi-Fi. ...
  • Enable firewall protection at work and at home. ...
  • Invest in security systems. ...
  • Install security software updates and back up your files.
9 Apr 2019

What are the three key activities for information security as per the standard of good practice for information security? ›

The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

What is importance of cyber security? ›

Cybersecurity is crucial because it safeguards all types of data against theft and loss. Sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and government and business information systems are all included.

What is the best way to learn cyber security? ›

  1. 5 Proven Strategies for Learning Cybersecurity. ...
  2. Step 1 – Enroll in a College Cybersecurity Program. ...
  3. Step 2 – Get Involved in Extracurricular Learning Opportunities. ...
  4. Step 3 – Study for and Pass a Certification. ...
  5. Step 4 – Get Volunteer and Part-Time Entry Level Experience. ...
  6. Step 5 – Supplement with Online Course Options.

How do you teach a child about cybersecurity? ›

Cyber Tips for Kids

Keep your personal information private; avoid sharing your name, address, telephone number, birthday, passwords, and the name of your school when using the Internet. Think twice before you post or say anything online; once it is in cyberspace, it's out there forever.

What are the 5 types of cyber-attacks? ›

The different types of cyber-attacks are malware attack, password attack, phishing attack, and SQL injection attack.

What are the top 3 personal attributes important to a cyber professional? ›

The traits you'll need to be successful in cyber security
  • An eye for attention. ...
  • Listening ability. ...
  • A hunger to learn. ...
  • Writing and speaking. ...
  • Courtesy and professionalism. ...
  • Ethical standards. ...
  • Passion for the field.
10 Feb 2020

Which tools are used in cyber security? ›

Cybersecurity Tools
  • Network security monitoring tools. These tools are used to analyze network data and detect network-based threats. ...
  • Encryption tools. ...
  • Web vulnerability scanning tools. ...
  • Penetration testing. ...
  • Antivirus software. ...
  • Network intrusion detection. ...
  • Packet sniffers. ...
  • Firewall tools.

Is cybersecurity a lot of math? ›

Does cybersecurity involve math? The short answer is yes. Cybersecurity is a technical field in computer science, and potential job seekers will need strong analytical skills. It isn't a math-intensive field—not like astrophysics or engineering—but it requires comfort using certain math types.

Can a non IT person learn cyber security? ›

Cybersecurity is actually very easily understood, learnt and applied by non-techies all over the world. There are many top cybersecurity practitioners in the world who have no technology background whatsoever. That means no course on cybersecurity needs to be complicated or esoteric.

Can I learn cyber security without coding? ›

While a lot of entry-level cyber security positions do not require programming skills, it is one of the crucial skills for some mid-level and upper-level cyber security jobs.

Is cybersecurity difficult to learn? ›

No, cybersecurity isn't hard. Although there may be difficult concepts, like cryptography or areas that require more technical knowledge, cybersecurity is one of the few fields in the tech world that doesn't require a strong technical background.

What are the 4 main types of vulnerability in cyber security? ›

Security Vulnerability Types
  • Network Vulnerabilities. These are issues with a network's hardware or software that expose it to possible intrusion by an outside party. ...
  • Operating System Vulnerabilities. ...
  • Human Vulnerabilities. ...
  • Process Vulnerabilities.

What is the most common type of cyber threat? ›


Phishing is probably the most common form of cyber-attack, largely because it is easy to carry out, and surprisingly effective.

What are the biggest cybersecurity threats right now? ›

Those risks potentially include data theft, malware attacks, ransomware and even nation-state backed cyber espionage. But one of the most significant cybersecurity threats is also one of the most simple attacks that cyber criminals can carry out: phishing .

What type of prevention can be implemented to reduce or stop security threats? ›

Antivirus. Antivirus software is designed to detect, remove and prevent malware infections on a device or network. Though specifically created to eliminate viruses, antivirus software can also aid against spyware, adware and other malicious software.

What can you do to protect yourself from online threats? ›

Top 10 Ways to Protect Your Identity Online
  1. Use Strong Passwords. ...
  2. Look for Encryption. ...
  3. Install Security Suites. ...
  4. Turn on Web Browser Blacklisting. ...
  5. Avoid Phishing Scams. ...
  6. Get Private Data Protection. ...
  7. Password-Protect Your Wireless Router. ...
  8. Hide Your Personal Information.
25 Nov 2019

Why is it important to prevent cybercrime? ›

At an individual level, cyber security attacks can lead to identity theft and extortion attempts, which can do serious damage to that individual's life. We all rely on the safety of our data and personal information.

What is the conclusion of cyber security? ›

Organizations are finding themselves under the pressure of being forced to react quickly to the dynamically increasing number of cybersecurity threats. Since the attackers have been using an attack life cycle, organizations have also been forced to come up with a vulnerability management life cycle.

What are the things that you need to identify before developing a cyber security awareness program? ›

Identify Risks

The first step in an effective cybersecurity awareness program is to have an up-to-date view of your threat landscape, infrastructure and data ecosystem and an identification of your top risks.

Which is a best practice that can prevent viruses and other? ›

Using antivirus software is the best way to defend your computer against malicious code. If you think your computer is infected, run your antivirus software program. Ideally, your antivirus program will identify any malicious code on your computer and quarantine them so they no longer affect your system.

How can we improve information security? ›

Tips to Improve Data Security
  1. Protect the data itself, not just the perimeter. ...
  2. Pay attention to insider threats. ...
  3. Encrypt all devices. ...
  4. Testing your security. ...
  5. Delete redundant data. ...
  6. Spending more money and time on Cyber-security. ...
  7. Establish strong passwords. ...
  8. Update your programs regularly.
14 Sept 2022

What are the basic security principles? ›

Confidentiality, integrity, and availability (CIA) define the basic building blocks of any good security program when defining the goals for network, asset, information, and/or information system security and are commonly referred to collectively as the CIA triad.

What is the main goal of information security awareness and training? ›

The purpose of security awareness is to focus attention on security, creating sensitivity to the threats and vulnerabilities of computer systems and recognition of the need to protect data, information and systems.

What are the principles of cybersecurity explain your answers? ›

These cyber security principles are grouped into four key activities: govern, protect, detect and respond. Govern: Identifying and managing security risks. Protect: Implementing controls to reduce security risks. Detect: Detecting and understanding cyber security events to identify cyber security incidents.

Which of these is the most important priority of the information security organization? ›

The control policy is part of the information security strategy. Compliance with regulatory requirements, where relevant, is important, but ultimately, the safety of people has the highest priority.

What are the 5 benefits of using cyber security? ›

At its core, cyber security is about risk management.
Benefits of Investing in Cyber Security
  • Protection against external threats. ...
  • Protection against internal threats. ...
  • Regulation compliance. ...
  • Improved productivity. ...
  • Cost savings and value. ...
  • Brand trust and reputation.
15 Mar 2022

What is cyber security trying to achieve? ›

According to the Cyber Security & Infrastructure Security Agency (CISA), "Cyber security is the art of protecting networks, devices and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity and availability of information."

What is the first thing to learn in cyber security? ›

The first thing you need to tackle when it comes to cybersecurity is the basics of IT systems and networks, for example, the different types of networks available and their protocols. Once you are familiar with the fundamentals you can delve into the basics of networking traffic, security, and communication principles.

Can I learn cybersecurity on my own? ›

You can learn cybersecurity on your own, thanks to the multitude of online courses and learning resources available these days. For example, top schools such as MIT, Harvard, Stanford, and many others have open courseware that you can use to learn cybersecurity concepts from the best of the best instructors.

How do I start cybersecurity with no experience? ›

How to Get Into Cybersecurity With No Experience?
  1. Look at your current background and job role.
  2. IT Training Courses and Certifications For People With No Experience.
  3. Network and Use LinkedIn.
  4. Think Outside the Box.
  5. Keep a Close Eye on These Technologies.
  6. Salaries to Expect In Entry Level Position.

What teens should know about cybersecurity? ›

Teenagers must keep their devices and information secure, behave appropriately on social media and shared devices, and respect others' digital privacy on devices and online. Here are some ways they can protect their own – and their friends' – cybersecurity.

What is cyber security Awareness for students? ›

Never submit sensitive information like usernames, passwords, or credit card numbers through an HTTP website. Remember that your online activities can put other students at risk. Cyberattacks that originate on your computer can spread to other devices — even throughout the entire university system.

What is cyber security kids? ›

What is cyber security? Cyber security is the way through which individuals can protect their privacy and reduce their risk of being affected by cybercrime. It can also help to protect devices and services accessed online from theft or damage.

What are the 3 major types of cyber security? ›

Application security. Network security. Cloud security. Internet of Things (IoT) security.

What are the top 10 security threats? ›

In this article:
  • Malware attack.
  • Social engineering attacks.
  • Software supply chain attacks.
  • Advanced persistent threats (APT)
  • Distributed denial of service (DDoS)
  • Man-in-the-middle attack (MitM)
  • Password attacks.
1 Jun 2022

What are the 6 common types of threats? ›

The six types of security threat
  • Cybercrime. Cybercriminals' principal goal is to monetise their attacks. ...
  • Hacktivism. Hacktivists crave publicity. ...
  • Insiders. ...
  • Physical threats. ...
  • Terrorists. ...
  • Espionage.
25 Mar 2015

Can I teach myself cyber security? ›

You can learn cybersecurity on your own, thanks to the multitude of online courses and learning resources available these days. For example, top schools such as MIT, Harvard, Stanford, and many others have open courseware that you can use to learn cybersecurity concepts from the best of the best instructors.

How do I start cyber security from scratch? ›

While there are many subdisciplines in cybersecurity career paths, such as network security and risk management, many jobs share a common technical foundation. Generally, a bachelor's degree in computer science, programming, or engineering is a minimal requirement for an entry-level cybersecurity analyst job.

Is IT hard to learn cyber security? ›

No, cybersecurity isn't hard. Although there may be difficult concepts, like cryptography or areas that require more technical knowledge, cybersecurity is one of the few fields in the tech world that doesn't require a strong technical background.

Does cybersecurity require coding? ›

Do Cybersecurity Analysts Code? For most entry-level cybersecurity jobs, coding skills are not required. However, as cybersecurity professionals seek mid- or upper-level positions, coding may be necessary to advance in the field.

How can I learn cybersecurity for free? ›

5 Best Free Courses to learn Cyber Security in 2022
  1. Cyber Security Course for Beginners. ...
  2. Introduction to Cyber Attacks [Coursera Free Course for Audit] ...
  3. Staying Safe Online [Udemy Free Course] ...
  4. The Information Security Big Picture [Pluralsight free trial] ...
  5. Cyber Security [Free Udemy Course]

Is cyber security harder than coding? ›

Cyber security can sometimes be more difficult than programming because it includes many different elements, including programming itself. As a cyber security analyst , you must understand how to code, infiltrate code, and prevent infiltration. This is one of the most difficult aspects of cyber security.

What is the lowest paying cyber security job? ›

$44,000 is the 25th percentile. Salaries below this are outliers. $80,000 is the 75th percentile.

Which is better software development or cyber security? ›

They also differ in other aspects such as employment growth rate, salary, and job responsibilities. Although each job is lucrative and has a promising forecast concerning demand, the cyber security position offers better chances of getting hired in comparison to the software development one.

Is cybersecurity a lot of math? ›

Does cybersecurity involve math? The short answer is yes. Cybersecurity is a technical field in computer science, and potential job seekers will need strong analytical skills. It isn't a math-intensive field—not like astrophysics or engineering—but it requires comfort using certain math types.

Do you have to be smart to do cyber security? ›

Anyone can learn to become a cyber security expert with a basic level of intelligence and plenty of hard work.

Does cyber security require a lot of math? ›

The quickly growing field of cybersecurity is no exception. Entry-level careers require at least high-school level math and algebra, and highly technical security jobs require even more advanced math.

Which language is best for cyber security? ›

The top cybersecurity languages include Java, JavaScript, Python, SQL, PHP, PowerShell, and C.
  • Hackers often use Python to write malicious programs, exploits, and hacking scripts.
  • Python's frequent use of in-network programming makes it a popular choice for hackers.

Which language is used in cyber security? ›

Python is a useful programming language for cybersecurity professionals because it can perform a variety of cybersecurity functions, like malware analysis, penetration testing, and scanning.

Does cybersecurity have future? ›

By 2025, 60% of organizations will use cybersecurity risk as a primary determinant in conducting third-party transactions and business engagements. By 2025, 80% of enterprises will adopt a strategy to unify web, cloud services and private application access from a single vendor's security service edge platform.


1. Ethical Hacking in 12 Hours - Full Course - Learn to Hack!
(The Cyber Mentor)
2. Fighting Misinformation with Discovery Oriented Education, University at Buffalo, SUNY (4/28/2022)
(Interdisciplinary Research Group on Privacy)
3. Getting Into Cyber Security: 5 Skills You NEED to Learn
4. Cyber Security Full Course for Beginner
(My CS)
5. How to Learn Cyber Security Faster In 5 Simple Steps
6. Teaching cybersecurity to kids - Juan García #CyberCamp19 [English]
Top Articles
Latest Posts
Article information

Author: Otha Schamberger

Last Updated: 29/01/2023

Views: 5999

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.