This course is designed for teachers and special education specialists in order to identify their causes and manifestations, develop remedial programs and prepare a report on the child’s mental state (intelligence tests) and by comparing his mental abilities and academic achievement between reality and expected. In addition to the following:
1-Write a report on the child’s reading and writing skills using survey and standardized tests.
2-Writing a report on the child鈥檚 learning process, how he learned and what he learned, including the strengths and weaknesses, his reception of information, or his linking, and does he have difficulty in reasoning, remembering, imagining, paying attention, or what? Using the metered standards for this.
3-Identifying the causes of learning difficulties and knowing his and his family鈥檚 attitude towards them, and studying the physiological, emotional, environmental and psychological factors, through intended and unintended observation, case study and standardized measures for that purpose.
Candidates to understand the main concepts underlying the secure use of ICT in daily life and to use relevant techniques and applications to maintain a secure network connection, use the Internet safely and securely, and manage data and information appropriately.
On completion of this module the candidate will be able to:
Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft
Protect a computer, device, or network from malware and unauthorised access
Understand the types of networks, connection types, and network specific issues, including firewalls
Browse the World Wide Web; communicate on the Internet securely
Understand security issues related to communications, including e-mail and instant messaging
Back up and restore data appropriately and safely; securely dispose of data and devices
What are the benefits of this module?
Covers the key skills and main concepts relating to ICT, computers, devices, and software.
Certifies best practice in IT security
Developed with input from computer users, subject matter experts, and practising computer professionals from all over the world. This process ensures the relevance and range of module content
Overview:
| CATEGORY | SKILLSET |
|
Security Concepts |
路聽聽聽聽聽聽聽聽 Data Threats
路聽聽聽聽聽聽聽聽 Value of Information 路聽聽聽聽聽聽聽聽 Personal Security 路聽聽聽聽聽聽聽聽 File Security |
|
Malware |
路聽聽聽聽聽聽聽聽 Definition and Function
路聽聽聽聽聽聽聽聽 Types 路聽聽聽聽聽聽聽聽 Protection |
|
Network Security |
路聽聽聽聽聽聽聽聽 Networks
路聽聽聽聽聽聽聽聽 Network Connections 路聽聽聽聽聽聽聽聽 Wireless Security 路聽聽聽聽聽聽聽聽 Access Control |
|
Secure Web Use |
路聽聽聽聽聽聽聽聽 Web Browsing
路聽聽聽聽聽聽聽聽 Social Networking 路聽聽聽聽聽聽聽聽 Storage and Compression |
|
Communications |
路聽聽聽聽聽聽聽聽 E-mail
路聽聽聽聽聽聽聽聽 Instant Messaging |
|
Secure Data Management |
路聽聽聽聽聽聽聽聽 Securing and Backing up
路聽聽聽聽聽聽聽聽 Secure Destruction |