Please ensure Javascript is enabled for purposes of website accessibility

Overview of Course Content

Part 1: Advanced Cyber Attacks in Online Learning

During the first week, participants will explore

  1. Attack vectors
  2. Attacks targeting websites, mobile devices and commonly used computer applications devices and commonly used computer applications
  3. Internal threats to learning institutions

Part 2: Protecting Data

During the second week, participants will learn

  1. Access controls to protect files on devices and in the cloud devices and in the cloud
  2. Techniques to prevent loss of critical data
  3. Data recovery tools and techniques

Part 3: Securing Online Communication and Learning Devices

In the third week, participants will explore

  1. Online anonymity and privacy
  2. Secure communication channels to use when engaging with peers and students remotely
  3. Ways of protecting devices from malware and unauthorised access

Part 4: Cybersecurity Concerns in Emerging Educational Technologies

In the final week, participants will

  1. Learning emerging technologies and their benefits
  2. Learn cyber risks posed by the technologies
  3. Develop a cybersecurity preparedness plan

 

Outcomes of this course

After completion of this course, the participant should be able to

  • Outline the advanced cyber-attacks that may be encountered while teaching online and apply the appropriate mitigations.
  • Employ various techniques to protect data created and processed by learning institutions from alteration, loss, and unauthorised access.
  • Apply advanced techniques in online communication, personal security, and device security.
  • Appraise the benefits of emerging technologies in digital learning and how to use securely.

 

Licence

Icon for the Creative Commons Attribution-ShareAlike 4.0 International License

Advanced Cybersecurity Training for Teachers Copyright © 2023 by Commonwealth of Learning (COL) is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book