Unit 5: Task
Share with us your top 5-10 code of ethics statements for using technology in the classroom or your professional workplace.
- Take care..
Unit 4: Task
Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
To teach students ..
Unit 3: Task
We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave..
Unit 2: Task
Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To what extent are you te..
task 5
My top 5 cyber ethics:
- being respectful- this ensures that anything you post won’t cause harm to anyone else
- online behaviour shou..
unit 4
I strongly believe that the future of cyber attacks will centre around identity theft. In this day an age nearly all sources of informatio..
task 3
A different way that information can be gathered from data using technology is the amount of likes a post gets on social media. This shows..
unit 2: task 1 cyber safety and awareness
An effective way that can teach students about cyber security as well as show them how be safe is to use hypothetical situations that focu..
Task 2: activity one
Some of the key differences between Cybersecurity, cyber safety and cyber awareness are like when you protect your home.
Cyber awarenss..
Task one:
Hi, this is Athena, a preservice teacher from NSW.
My learning outcome from this course is to be confident in cybersecurity.
I think..