STEM.Cyber.Game-Tech.Med-Tech.

  • VRTA

    The (VRTA) teaches STEM by doing using real-world tools, technology & simulation. The VRTA focuses on providing (CTE) Career & Technical Education training skills to learners age 10+ that are interested in Python Programming, Robotics, Automation, Autonomous, Gamification, Cybersecurity, Design Thinking & Innovation.

    Programming: Use our interactive coding courses to learn the Python programming language from scratch. Our tool checks your code as you complete tasks, letting you know immediately if you understand the concepts.

    Robotics: Program a 3-axis robotic arm, an autonomous vehicle that uses LIDAR, and participate in our Block-based & Python based Self-Guided Robotics competitions.

  • Cyber

    Cyber-Security: Use the Cisco Net Academy network simulation tools such as Packet Tracer, Wireshark, Bash Shell and other tools to learn how to build local area networks and harden them against cyber attacks.

    BREACH TTX is a card and turn-based simulation game built in Unity built to deliver Cybersecurity Awareness Training to your existing workforce and to train the workforce of tomorrow. This revolutionary experience can be played solo or in a local cooperative up to 6 people. The educational content has been designed using publicly available information from Public Safety Canada and the Cybersecurity and Infrastructure Security Agency (CISA).

  • Emerging Technologies

    Game-Tech: Unlock Your Inner Creative and Access Unreal Engine on your Chromebook, Laptop, Desktop. No Downloading.

    Med-Tech: InspireTech in collaboration with Canadore College partnered on the Mirai Project Health & Wellness Innovation Leaning Modules. These were designed to test your skills out and create innovative solutions to real-world problems facing the aging population.

Learn More About Our Course Offerings Below!

  • Python 1. Basics in Python: Get started with Python. Write your first piece of Python code! Learn about data types, comments, the print function, and much more.

    Python 2. Beginner Data Types & Variables: Get started with Python datatypes. Learn about integers, adding, multiplying, modulo, booleans, variables, and much more.

    Python 3. Strings & String Manipulation: Get crafty as you learn how strings work in Python programming. In this section we go over indexing, slicing, concatenation, and much more.

    Python 4. Control Flow: Get crafty as you learn how control flow works in Python programming. In this section we go over if, else, else if, and much more.

    Python 5. Lists & Dictionaries: Get crafty as you learn how lists and dictionaries work in Python programming. Learn how to store lots of data into one variable.

    Python 6. Functions: Learn how to combine pieces of code into functions! Functions are blocks of code that are created to do tasks that are very repetitive! They help keep your code looking clean and readable.

    Python 7. Loops: Learn how to use for and while loops in Python to loop through utterable objects or until boolean condition is false. Use built in Python functionality such as the range function to assist you.

  • Beginner course: Robot in a maze

    Intermediate course: Robot soccer

    Advanced course: Robot field with paintball cannon

  • Learn to program the 3 Point Robot to drive through a maze and develop your code to have it work autonomously.

  • Pick & Place Challenge – Instruct a 3-Axis robotic arm to pick up objects and place them safely in a container.

  • Ubuntu Shell Simulator: Experiment with the features of the Ubuntu Shell simulator.

    Packet Tracer: Experiment with the features of the Packet Tracer simulator.

    Math & Physics Simulator: Experiment with the features of the Math & Physics simulator. Utilize a virtual math whiteboard that allows for interactive problem solving amongst teachers and students.

  • BREACH-TTX is a card and turn-based simulation experience built to deliver Cybersecurity Awareness Training & Digital citizenship training to learners in grade 7+ or to your existing workforce. It can be played solo or in a local cooperative style. The co-op mode will allow for a group of employees or students; up to 6 in total to engage with the training as a team. The educational content has been designed using publicly available information from the Cybersecurity and Infrastructure Security Agency (CISA) & Public Safety Canada.

  • IOT Essentials Packet Tracer 1.1.1.8 – Deploying & Cabling Devices: Learn to deploy and cable network devices.

    IOT Essentials Packet Tracer 1.1.2.5 – Create a Network Using Packet Tracer: Build a Simple Network.

    IOT Essentials Packet Tracer 1.2.2.1 – Adding IoT Devices to a Smart Home: Explore the Existing Smart Home Network.

    IOT Essentials Packet Tracer 1.2.2.3 – Connect & Monitor IoT Devices: Connect IoT Devices to the Wireless Network.

    IOT Essentials Packet Tracer 4.1.1.6 – Explore the Smart Home: Explore the Smart Home.

    IOT Essentials Packet Tracer 5.1.2.6 – Configure Wireless Security: Create a home network with a secure wireless router.

  • IOT Essentials Lab 2.1.3.6 – Setting Up a Virtualized Server Entrainment: Prepare a Computer for Virtualization Environment by Installing VirtualBox.

    IOT Essentials Lab 2.1.3.7 – Basic Python Programming: Launch VirtualBox and Enter the I2IoT server VM.

    IOT Essentials Lab 2.1.3.8 – Create a Simple Game with Python IDLE: Create a Simple Game with Python IDLE.

    IOT Essentials Lab 2.2.2.5 – Setting Up PL-App with the Raspberry Pi: Set up a Raspberry Pi board as a PL-App device.

    IOT Essentials Lab 2.2.2.6 – Using a PL-App Notebook: Learn how to interact with PL-App notebooks using keyboard shortcuts.

  • Cyber Security Packet Tracer 1.5.3.5 – Creating a Cyber World: Learn how to configure the FTP Server.

    Cyber Security Packet Tracer 1.5.3.6 – Communicating in a Cyber World: Learn how to upload and download files using FTP.

    Cyber Security Packet Tracer 2.5.2.7 – Using File & Data Integrity Checks: Learn how to verify the integrity of critical files using HMAC.

    Cyber Security Packet Tracer 3.3.2.7 – WEP WPA2 PSK WPA2 RADIUS: Learn how to configure WEP for healthcare at home.

    Cyber Security Packet Tracer 4.3.3.3 – Configuring VPN Transport Mode: Learn how to configure the VPN Client within Metropolis.

    Cyber Security Packet Tracer 4.3.3.4 – Configuring VPN Tunnel Mode: Sending unencrypted FTP Traffic.

    Cyber Security Packet Tracer 6.2.3.8 – Router & Switch Redundancy: Observe a Network Failover with Redundant Routers.

    Cyber Security Packet Tracer 6.2.4.4 – Router & Switch Resilience: Hardening the IOS Configuration.

    Cyber Security Packet Tracer 7.4.2.4 – Server Firewalls & Router ACLs: Connect to the Web Server.

    Cyber Security Packet Tracer 8.3.1.3 – Skills Integrated Challenge: Configure a wireless router, upload and download files using FTP.

  • Cyber Security Lab 1.3.1.6 – Explore Social Engineering Techniques: Explore social engineering techniques.

    Cyber Security Lab 1.5.3.4 – Exploring the World of Cybersecurity Professionals: Explore the security features used by organizations like Google and Cisco to keep your data safe.

    Cyber Security Lab 2.5.2.5 – Authentication Authorization Accounting: Install and configure security controls when performing account management, based on best practices.

    Cyber Security Lab 3.3.1.9 – Detecting Threats & Vulnerabilities: Use Nmap, a port scanner, and network mapping tool to detect threats and vulnerabilities on a system.

    Cyber Security Lab 4.3.2.3 – Using Steganography: Use steganography to hide a document within a JPEG file.

    Cyber Security Lab 5.1.2.4 – Password Cracking: Learn how to use a password cracking tool to recover a user’s password.

    Cyber Security Lab 5.2.2.4 – Using Digital Signatures: Work to understand the concepts behind digital signatures.

    Cyber Security Lab 5.4.3.4 – Use Wireshark to Compare Telnet & SSH Traffic: Use Wireshark to capture web browser traffic.

    Cyber Security Lab 7.1.1.6 – Hardening a Linux System: Demonstrate the use of a security auditing tool to harden a Linux system.

  • Networking Essentials Packet Tracer 3.3.3 – Deploy Devices: In this activity, you will deploy multiple devices.

    Networking Essentials Packet Tracer 3.3.4 – Deploy & Cable Devices: In this lesson, you will learn to deploy and cable network devices.

    Networking Essentials Packet Tracer 3.4.3 – Configure End Devices: In this lesson, you will learn to configure various end devices in Packet Tracer.

    Networking Essentials Packet Tracer 3.5.1 – Create a Simple Network: In this activity, you will build a simple network in Packet Tracer.

    Networking Essentials Packet Tracer 8.1.2 – Connect to a Web Server: In this activity, you will observe how packets are sent across the internet using IP addresses.

    Networking Essentials Packet Tracer 9.2.5 – Configure DHCP on a Wireless Router: Learn how to connect 3 PCs to a wireless router.

    Networking Essentials Packet Tracer 10.2.3 – Examine NAT on a Wireless Router: Learn to examine NAT configurations on routers and examine traffic that crosses the network.

    Networking Essentials Packet Tracer 11.1.6 – The Client Interaction: Observe the client interaction between server and PC.

    Networking Essentials Packet Tracer 12.3.3 – Observe Web Requests: View the client/server traffic sent from a PC to a web server when requesting web services.

    Networking Essentials Packet Tracer 12.4.4 – Use FTP Services: Upload and download a file from an FTP server.

    Networking Essentials Packet Tracer 12.5.4 – Use Telenet & SSH: In this activity, you will establish a remote connection to a router using Telnet and SSH.

    Networking Essentials Packet Tracer 15.2.3 – Social Engineering: In this lab, you will research examples of social engineering.

    Networking Essentials Packet Tracer 16.2.4 – Configure Basic Wireless Security: In this lesson, you will learn how to configure basic wireless security using WPA2 Personal.

    Networking Essentials Packet Tracer 17.5.1 – Compare In-Band Access: Learn how to establish an out-of-band and an in-band connection

    Networking Essentials Packet Tracer 18.2.6 – Navigate the IOS: In this activity, you will learn to establish basic connections, access the CLI, and explore help.

    Networking Essentials Packet Tracer 18.3.3 – Use Cisco IOS Show Commands: In this lesson, learn how to use Cisco IOS show commands.

    Networking Essentials Packet Tracer 19.1.4 – Implement Basic Connectivity: In this activity, you will learn how to perform a basic configuration on S1 and S2.

    Networking Essentials Packet Tracer 19.2.4 – Configure Initial Router Settings: In this activity, you will learn how to verify the default router configuration.

    Networking Essentials Packet Tracer 19.3.6 – Configure SSH: In this activity, you will learn how to secure passwords.

    Networking Essentials Packet Tracer 20.3.6 – Use the Ping Command: Use the ping command to identify an incorrect configuration on a PC.

    Networking Essentials Packet Tracer 20.4.3 – Troubleshoot a Wireless Connection: Learn how to identify and correct any misconfiguration of a wireless device.

    Networking Essentials Packet Tracer 20.7.1 – Skills Integration Challenge: In this activity, you will learn how to configure IP addresses.

  • Networking Essentials Lab 4.5.8 – Trace a Route: Determine network connectivity to a destination host.

    Networking Essentials Lab 10.4.7 – Identify IPv6 Addresses: Practice with Different Types of IPv6 Addresses.

  • Access Epic Games Unreal Engine 5.2 on your Chromebook along with the Rube Goldberg Learning Kit.