With so much of our lives being online nowadays, we all need a deeper knowledge of the cybersecurity vulnerabilities and threats that are out there. The sphere of the classroom is no exception. This course is designed for teachers and students to become more familiar with the fields of cybersecurity, data privacy, and digital ethics.
This course will give participants a strong grounding in CyberSecurity threats and vulnerabilities. Course participants will carry out theoretical and practical exercises in this domain. Data privacy and The General Data Protection Regulation will also form an important part of this course, with a strong focus on its significance in the sector of education. Finally, Cyberethics will be investigated, particularly how students interact with smartphones and devices and know healthier ways to use smart devices and social media.
At the end of the course, participants will have a much greater practical knowledge of online threats, malware, and phishing attacks. They will deepen their knowledge of the practical significance of the GDPR and be more conscious of the ethical issues involved in a permanently connected world.
Concept by: Eddie Reilly
Participants to the course will learn to:
- Identify online threats and vulnerabilities;
- Become more conscious of CyberSecurity in the use of computers, tablets and smartphones;
- Deal effectively with malware, spam and phishing attacks;
- Develop more effective password practices;
- Understand and apply GDPR regulations correctly;
- Develop more healthy interactions with social media and smartphones;
- Communicate this knowledge to students;
- Understand CyberSecurity in the context of education.
Day 1 – Course Introduction
- Introduction to the course, the school, and the external week activities;
- Icebreaker activities;
- Presentations of the participants’ schools;
- Presentation on CyberSecurity, Ethics and Data Privacy;
- Group activity (Do’s and Don’t’s of CyberSecurity).
Day 2 – Whats are Phishing, social engineering, maleware and spam
- Phishing and Social Engineering (risks and good practices);
- Malware and Spam;
- Passwords and best practices.
Day 3 – What do you know about GDPR?
- GDPR for teachers and schools;
- Data Privacy quiz;
- Using infographics in the class.
Day 4 – Problems with using technological devices in classrooms
- Smart devices in the classroom;
- The social Dilemma (extended documentary and discussion on Cyber ethics);
- Basic website building and security.
Day 5 – Presentation and Feedback
- Project development;
- Presentations and group questions and feedback.
Day 6 – Course closure & external activities
- Course evaluation: round up of acquired competences, feedback, and discussion;
- Awarding of the course Certificate of Attendance;
- Excursion and other external cultural activities.
The schedule describes likely activities but may differ significantly based on the trainer delivering the specific session and the requests of the participants.
If you would like to discuss a specific topic, please indicate it at least 4 weeks in advance. Course modifications are subject to the trainer’s discretion.
The number and schedule of the cultural activities depend on the location, not the course; further information is available on each location webpage. The trainer will send you the definitive course schedule approximately two weeks before the course.