Unit 4: Option 1
What are some primary-friendly “scam scenarios” that you could use in the classroom for encouraging students to critically think about mes..
Unit 3: option 1
We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave..
Unit 2: option 1
Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To what extent are you te..
Unit 5 Task
Share with us your top 5-10 code of ethics statements for using technology in the classroom or your professional workplace.
- Priv..
Unit 4 Task
Create or find a classroom resource that teaches students about creating strong passwords, passcodes, or passphrases.
https://usingtech..
Unit 3 Task
We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave..
Unit 2 Task
Explain what you think are some of the key differences between cyber security, cyber awareness, and cyber safety. To what extent are you t..
Task 5
Find a resource (a website, video or storybook) for teaching a topic related to cyber ethics and share this with the community. Provide a ..
Task 4
Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
https://www.expert..
Task 3
We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave..
Task 2
Share an activity idea or classroom resource that you have found online or created yourself that involves primary students exploring priva..
Unit 1 – Introduction
Hi everyone, my name is Katrina, I am a third year primary teacher student. I live in SA and I hope to gain more knowledge on Cyber Securi..
Unit 5: Option 2
Find a resource (a website, video or storybook) for teaching a topic related to cyber ethics and share this with the community. Provide a ..
Unit 4: option 2
Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
https://www.esafet..
Unit 3: option 1
- We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can l..
Unit 1: introduction
Hi my name is Tabatha Emerson, I am currently in 4th year of primary R-7. I live in SA and I hope to explore my creativity and learn about..
Unit 2: option 1
- Cyber security is about protecting yourself online, through things such as passwords, privacy settings and security software.
- Cyber..
TasK 5
- Use appropriate and safe sites for internet exploring.
- Abide by copyright laws and reference work taken from the internet.
- Preve..
Task 4
perfect passwords have awesome work sheets for creating difficult passwords.
Task 3
posting on social media, subscribing to a newsletter, leaving an online review, scammers.
You must be logged in to post a comment.