Loading...
NEW
917
0
Course code: 000258
School of Computer Science
Cyber Security for Educators
0.0
0 ratings
0 students
What this course about?

This module is designed to give a comprehensive overview of Cybersecurity for the educational realm. The outcome of this certification is to ensure that teachers and educational leadership teams have a solid understanding of the risks involved for students working online, and how they should identify and respond to such risks.

Who is this course for?
This module is developed for teachers and educational leadership teams who need to understand the international practices and experiences of Cybersecurity for educators, specifically ages (K12-).
Pre-course requirements
  • The requirement to form skills and abilities of safe and expedient behavior when working with computer programs and on the Internet, the ability to observe the norms of information ethics and law; ability to use information and communication technology tools to solve cognitive, communicative and organizational problems in compliance with the requirements of ergonomics, safety, hygiene, resource conservation, legal and ethical norms, norms of information security; understanding of the basic legal aspects of using computer programs and working on the Internet, etc.
What will you learn?
  • Recognise the potential security risks and drawbacks of students engaging in various online activities.
  • Develop and refresh teachers’ awareness and understanding of student protection to help keep students safe online.
  • Understand how to create effective plans to help protect students online, including supporting parents’ concerns.
  • Use various tools and techniques to secure and protect students with their online experiences.
  • Recognise practical ways to keep students safe, like child-friendly search engines, privacy settings, and parental controls.
  • Develop an awareness of online risks, like cyberbullying, inappropriate messages, sexual harassment, inappropriate websites, and online radicalisation, sharing (streaming) online and inappropriate use of social networking sites.
  • Recognise how to help students manage Internet safety risks, including speaking with the students about online content and activities
  • Understand the relevant legislation and ethical guidance for student safeguarding
  • Recognise the different types of online risks and signs of cyberbullying, to provide a suitable response for the students involved.
  • Recognise the key elements of Cybersecurity policies and procedures.
  • Track changes in children’s online behaviour, updating them on new developments/risks.
  • Understand a range of safety initiatives, such as awareness, strategies, and rules regulating online access and usage. Also, build children’s digital resilience through safety and privacy.
  • Understand how to use security policies and what resources are available.
  • Understand and apply the concepts and principles of ethical thinking to problems relating to computers and digital technologies.
  • Define the legal issues and be aware of what will happen when a student breaches cyber laws.
Industry-specific digital skills
Courses in this discipline
Course outline
  • 1.1 The use of the Internet
  • 1.2 The use of Social Media
  • 2.1 Risks of harm to students online
  • 2.2 Internet Safety Risks for students
  • 3.1 Risks of Social Media
  • 3.2 Navigating the Risks of Social Media
  • 3.3 Social Media: E-Safety
  • 3.4 Understand how different types of Social Media Apps may pose a risk
  • 4.1 Cyberbullying
  • 4.2 Online Advertising and Students
  • 4.3 Improper websites and videos
  • 4.4 Inappropriate messaging and sexual harassment
  • 4.5 Online Radicalisation
  • 4.6 Vulnerability and Victimhood
  • 4.7 Respond to the Risks of “Live Streaming
  • 5.1 Active Listening
  • 5.2 Confidence in Students
  • 5.3 Student Moods: The ups and downs of Adolescence
  • 5.4 Digital Citizenship
  • 5.5 Digital Resilience in Students
  • 6.1 Student Privacy, Monitoring & Trust
  • 6.2 Keeping students safe online
  • 6.3 Teaching Safe & Responsible Online Behaviour
  • 6.4 Discussing internet safety with students
  • 7.1 Classroom and Professional Development Resources
  • 8.1 Writing Policy Guidelines
  • 9.1 What are the important ethical issues in cybersecurity?
  • 9.2 Ethics Perspectives: Networked Communications
  • 10.1 Awareness & Guidelines
Upcoming sessions
Date Location Language Price Format
Currently, this course is conducted only in an intracorporate format.
Eni
Total
Eni
Endesa
Shell
Chevron
Gas Natural
Iberdrola
Eni
Inpex
Eni
Exonmobile
Frequently Asked Questions (FAQ)

Training can take place in 4 formats:

  • Self-paced
  • Blended learning
  • Instructor-led online (webinar)
  • Instructor-led offline (classroom)

Description of training formats:

  • Self-paced learning or e-Learning means you can learn in your own time and control the amount of material to consume. There is no need to complete the assignments and take the courses at the same time as other learners.
  • Blended learning or "hybrid learning" means you can combine Self-paced learning or e-Learning with traditional instructor-led classroom or webinar activities. This approach requires physical presence of both teacher and student in physical or virtual (webinars) classrooms or workshops. Webinar is a seminar or presentation that takes place on the internet, allowing participants in different locations to see and hear the presenter, ask questions, and sometimes answer polls.
  • Instructor-led training, or ILT, means that the learning can be delivered in a lecture or classroom format, as an interactive workshop, as a demonstration under the supervision and control of qualified trainer or instructor with the opportunity for learners to practice, or even virtually, using video-conferencing tools.

When forming groups of students, special attention is paid to important criteria - the same level of knowledge and interests among all students of the course, in order to maintain stable group dynamics during training.

Group dynamics is the development of a group in time, which is caused by the interaction of participants with each other and external influence on the group. In other words, these are the stages that the training group goes through in the process of communicating with the coach and among themselves.

The optimal group size for different types of training:

  • Self-paced / E-learning: 1
  • Instructor-led off-line (classroom): 6 – 12
  • Instructor-led on-line (webinar): 6 – 12
  • Blended learning: 6 – 12
  • Workshop: 6 – 12
  • On-the-job: 2 – 4
  • Simulator: 1 – 2

Feedback in the form of assessments and recommendations is given to students during the course of training with the participation of an instructor and is saved in the course card and student profile.

In order to control the quality of the services provided, students can evaluate the quality and training programme. Forms of assessment of the quality of training differ for courses with the participation of an instructor and those that are held in a self-paced format.

For courses with an instructor, start and end dates are indicated. At the same time, it is important to pay attention to the deadlines for passing tests, exams and practical tasks. If the specified deadlines are missed, the student may not be allowed to complete the entire course programme.

A personal account is a space for storing your training preferences, test and exam results, grades on completed training, as well as your individual plan for professional and personal development.

Users of the personal account have access to articles and blogs in specialized areas, as well as the ability to rate the completed training and leave comments under the articles and blogs of our instructors and technical authors

Registered users of a personal account can have various roles, including the role of a student, instructor or content developer. However, for all roles, except for the student role, you will need to go through an additional verification procedure to confirm your qualifications.

Based on the results of training, students are issued a certificate of training. All training certificates fall into three main categories:

  • Certificate of Attendance - students who successfully completed the course but did not pass the tests and exams can apply for a certificate of attendance.
  • Certificate of Completion - students who have successfully completed a course could apply for a Certificate of Completion, this type of certificate is often required for compliance training.
  • Verified Certificate - it is a verified certificate that is issued when students have passed exams under the supervision of a dedicated proctor.

You can always download a copy of your training certificate in PDF format in your personal account.

You will still have access to the course after completing it, provided that your account is active and not compromised and Tecedu is still licensed for the course. So if you want to review specific content in the course after completing it, or do it all over again, you can easily do so. In rare cases, instructors may remove their courses from the Tecedu marketplace, or we may need to remove a course from the platform for legal reasons.

During the training, you may encounter various forms of testing and knowledge testing. The most common assessment methods are:

  • preliminary (base-line assessment) - to determine the current level of knowledge and adapt the personal curriculum
  • intermediate - to check the progress of learning
  • final - to complete training and final assessment of knowledge and skills, can be in the form of a project, testing or practical exam

Travel to the place of full-time training is not included in the cost of training. Accommodation during full-time studies can be included in the full board tuition fees.

While Tecedu is not an accredited institution, we offer skills-based courses taught by real experts in their field, and every approved, paid course features a certificate of completion or attendance to document your accomplishment.

You can preview samples of the training materials and review key information about the course on our website. You can also review feedback and recommendations from students who already completed this course.

We want you to be happy, so almost all purchased courses can be returned within 30 days. If you are not satisfied with the course, you can request a refund, provided the request complies with our return policy.

The 30-day money back policy allows students to receive quality teaching services with minimal risk, we must also protect our teachers from fraud and provide them with a reasonable payment schedule. Payments are sent to instructors after 30 days, so we will not process refund requests received after the refund period.

We reserve the right, in our sole discretion, to limit or deny refund requests in cases where we believe there is refund abuse, including but not limited to the following:

  • A significant portion of the course has been consumed or downloaded by a student before the refund was requested.
  • Multiple refunds have been requested by a student for the same course.
  • Excessive refunds have been requested by a student.
  • Users whose account is blocked or access to courses is disabled due to violation of our Terms and Conditions or the Rules of Trust and Security.
  • We do not grant refunds for any subscription services.
  • These refund restrictions will be enforced to the extent permitted by applicable law.

We accept most international credit and debit cards like Visa, MasterCard, American Express, JCB and Discover. Bank Transfers also may be an option.

Smart Virtual Classroom (open digital / virtual classroom).

Conducting classes is based on the fact that the teacher demonstrates text, drawings, graphics, presentations on an interactive board, while the content appears in the student's electronic notebook. A specially designed digital notepad and pen are used to create and edit text and images that can be redirected to any surface via a projector.

Classes are live streamed online, automatically recorded and published on the Learning Portal, allowing you to save them for reuse anytime, anywhere, on any mobile device. This makes it possible not to miss classes and keep up with classes and keep up with the passage of new material.

Game Based Learning (learning using a virtual game environment)

Real-life training uses the principles of game organization, which allows future professionals to rehearse and hone their skills in a virtual emergency. Learning as a game provides an opportunity to establish a connection between the learning activity and real life.

The technology provides the following learning opportunities:

  • Focused on the needs of the user
  • Instant feedback
  • Independent decision making and choice of actions
  • Better assimilation and memorization of the material
  • Adaptive pace of learning tailored to the individual needs of the student
  • Better transfer of skills learned in a learning situation to real conditions

Basic principles of training:

  • A gradual increase in the level of difficulty in the game;
  • Using a simplified version of a problem situation;
  • Action in a variable gaming environment;
  • The right choice is made through experimentation.

The main advantages of Game Based Learning technology:

  • Low degree of physical risk and liability
  • Motivation to learn while receiving positive emotions from the process;
  • Practice - mirroring the real situation
  • Timely feedback
  • Choice of different playing roles
  • Learning in collaboration
  • Developing your own behavior strategy
Laboratory workshops using remote access technologies

Conducting practical classes online using remote access technologies for presentations, multimedia solutions and virtual reality:

  • Laboratory workshops that simulate the operation of expensive bench equipment in real production
  • Virtual experiment, which is visually indistinguishable from a remote real experiment performed
  • Virtual instruments, which are an exact copy of real instruments
  • Mathematical modeling to clarify the physical characteristics, chemical content of the investigated object or phenomenon.
Cyber Security for Educators
Language: English, Russian
Level: Intermediate
Request this course for your company in a in-house format