Self-organized learning is one of the modern learning strategies that rely on the student as a primary driver of the educational process, as he is responsible for setting goals and plans, and controlling the course of the educational process, for the purpose of developing the active and creative role of the student in the educational process.
This training course aims to qualify teachers scientifically and skillfully and provide them with the applied experiences necessary to work as a renewed teacher in the field of education. This course also reviews more than one of the active learning strategies.
Candidates to understand the main concepts underlying the secure use of ICT in daily life and to use relevant techniques and applications to maintain a secure network connection, use the Internet safely and securely, and manage data and information appropriately.
On completion of this module the candidate will be able to:
Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft
Protect a computer, device, or network from malware and unauthorised access
Understand the types of networks, connection types, and network specific issues, including firewalls
Browse the World Wide Web; communicate on the Internet securely
Understand security issues related to communications, including e-mail and instant messaging
Back up and restore data appropriately and safely; securely dispose of data and devices
What are the benefits of this module?
Covers the key skills and main concepts relating to ICT, computers, devices, and software.
Certifies best practice in IT security
Developed with input from computer users, subject matter experts, and practising computer professionals from all over the world. This process ensures the relevance and range of module content
Overview:
| CATEGORY | SKILLSET |
|
Security Concepts |
路聽聽聽聽聽聽聽聽 Data Threats
路聽聽聽聽聽聽聽聽 Value of Information 路聽聽聽聽聽聽聽聽 Personal Security 路聽聽聽聽聽聽聽聽 File Security |
|
Malware |
路聽聽聽聽聽聽聽聽 Definition and Function
路聽聽聽聽聽聽聽聽 Types 路聽聽聽聽聽聽聽聽 Protection |
|
Network Security |
路聽聽聽聽聽聽聽聽 Networks
路聽聽聽聽聽聽聽聽 Network Connections 路聽聽聽聽聽聽聽聽 Wireless Security 路聽聽聽聽聽聽聽聽 Access Control |
|
Secure Web Use |
路聽聽聽聽聽聽聽聽 Web Browsing
路聽聽聽聽聽聽聽聽 Social Networking 路聽聽聽聽聽聽聽聽 Storage and Compression |
|
Communications |
路聽聽聽聽聽聽聽聽 E-mail
路聽聽聽聽聽聽聽聽 Instant Messaging |
|
Secure Data Management |
路聽聽聽聽聽聽聽聽 Securing and Backing up
路聽聽聽聽聽聽聽聽 Secure Destruction |