{"id":13106,"date":"2023-09-13T05:18:50","date_gmt":"2023-09-13T10:18:50","guid":{"rendered":"https:\/\/texascyber.org\/village\/lock-picking-village-copy\/"},"modified":"2023-09-14T19:07:22","modified_gmt":"2023-09-15T00:07:22","slug":"autoauto-village","status":"publish","type":"villages_post","link":"https:\/\/texascyber.org\/village\/autoauto-village\/","title":{"rendered":"Autonomous Cars Village"},"content":{"rendered":"

Autonomous Cars, and Cyber Security<\/p>\n

AutoAuto, with its cutting-edge approach to teaching Python and AI, presents an effective solution for incorporating cybersecurity education. Through hands-on, real-world projects, students using AutoAuto delve into cybersecurity principles. By programming self-driving cars\u2014either physical or virtual models\u2014they learn how to make these vehicles autonomous and protect them from potential cyber threats. The list of cyber lessons fulfills all related CSTA standards for middle and high school levels, which include: Cloud computing Cryptography Cyber threats (e.g., social engineering, phishing, and brute force attacks) What are data & data breaches Strong password generation.<\/p>\n","protected":false},"featured_media":13159,"parent":0,"menu_order":0,"template":"","format":"standard","acf":[],"yoast_head":"\nAutonomous Cars Village - Texas Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/texascyber.org\/village\/autoauto-village\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Autonomous Cars Village - Texas Cyber\" \/>\n<meta property=\"og:description\" content=\"Autonomous Cars, and Cyber Security AutoAuto, with its cutting-edge approach to teaching Python and AI, presents an effective solution for incorporating cybersecurity education. Through hands-on, real-world projects, students using AutoAuto delve into cybersecurity principles. By programming self-driving cars\u2014either physical or virtual models\u2014they learn how to make these vehicles autonomous and protect them from potential cyber […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/texascyber.org\/village\/autoauto-village\/\" \/>\n<meta property=\"og:site_name\" content=\"Texas Cyber\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/texascyber\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-15T00:07:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/09\/logo_main.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1228\" \/>\n\t<meta property=\"og:image:height\" content=\"709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@texascyber\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/texascyber.org\/village\/autoauto-village\/\",\"url\":\"https:\/\/texascyber.org\/village\/autoauto-village\/\",\"name\":\"Autonomous Cars Village - Texas Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/texascyber.org\/#website\"},\"datePublished\":\"2023-09-13T10:18:50+00:00\",\"dateModified\":\"2023-09-15T00:07:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/texascyber.org\/village\/autoauto-village\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/texascyber.org\/village\/autoauto-village\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/texascyber.org\/village\/autoauto-village\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/texascyber.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Autonomous Cars Village\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/texascyber.org\/#website\",\"url\":\"https:\/\/texascyber.org\/\",\"name\":\"Texas Cyber\",\"description\":\"Texas Cyber Summit\",\"publisher\":{\"@id\":\"https:\/\/texascyber.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/texascyber.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/texascyber.org\/#organization\",\"name\":\"Texascyber\",\"url\":\"https:\/\/texascyber.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"contentUrl\":\"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png\",\"width\":150,\"height\":150,\"caption\":\"Texascyber\"},\"image\":{\"@id\":\"https:\/\/texascyber.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/texascyber\",\"https:\/\/twitter.com\/texascyber\",\"https:\/\/www.instagram.com\/texascybersummit\/\",\"https:\/\/www.linkedin.com\/company\/texas-cyber\",\"https:\/\/www.youtube.com\/texascybersummit\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Autonomous Cars Village - Texas Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/texascyber.org\/village\/autoauto-village\/","og_locale":"en_US","og_type":"article","og_title":"Autonomous Cars Village - Texas Cyber","og_description":"Autonomous Cars, and Cyber Security AutoAuto, with its cutting-edge approach to teaching Python and AI, presents an effective solution for incorporating cybersecurity education. Through hands-on, real-world projects, students using AutoAuto delve into cybersecurity principles. By programming self-driving cars\u2014either physical or virtual models\u2014they learn how to make these vehicles autonomous and protect them from potential cyber […]","og_url":"https:\/\/texascyber.org\/village\/autoauto-village\/","og_site_name":"Texas Cyber","article_publisher":"https:\/\/facebook.com\/texascyber","article_modified_time":"2023-09-15T00:07:22+00:00","og_image":[{"width":1228,"height":709,"url":"https:\/\/texascyber.org\/wp-content\/uploads\/2023\/09\/logo_main.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@texascyber","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/texascyber.org\/village\/autoauto-village\/","url":"https:\/\/texascyber.org\/village\/autoauto-village\/","name":"Autonomous Cars Village - Texas Cyber","isPartOf":{"@id":"https:\/\/texascyber.org\/#website"},"datePublished":"2023-09-13T10:18:50+00:00","dateModified":"2023-09-15T00:07:22+00:00","breadcrumb":{"@id":"https:\/\/texascyber.org\/village\/autoauto-village\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/texascyber.org\/village\/autoauto-village\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/texascyber.org\/village\/autoauto-village\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/texascyber.org\/"},{"@type":"ListItem","position":2,"name":"Autonomous Cars Village"}]},{"@type":"WebSite","@id":"https:\/\/texascyber.org\/#website","url":"https:\/\/texascyber.org\/","name":"Texas Cyber","description":"Texas Cyber Summit","publisher":{"@id":"https:\/\/texascyber.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/texascyber.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/texascyber.org\/#organization","name":"Texascyber","url":"https:\/\/texascyber.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/","url":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","contentUrl":"https:\/\/texascyber.org\/wp-content\/uploads\/2021\/03\/Cyber-Summit-Logo1-e1620316415785.png","width":150,"height":150,"caption":"Texascyber"},"image":{"@id":"https:\/\/texascyber.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/texascyber","https:\/\/twitter.com\/texascyber","https:\/\/www.instagram.com\/texascybersummit\/","https:\/\/www.linkedin.com\/company\/texas-cyber","https:\/\/www.youtube.com\/texascybersummit"]}]}},"_links":{"self":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/villages_post\/13106"}],"collection":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/villages_post"}],"about":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/types\/villages_post"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media\/13159"}],"wp:attachment":[{"href":"https:\/\/texascyber.org\/wp-json\/wp\/v2\/media?parent=13106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}