This resource guide was created as an accompaniment for a hands-on, three-hour …
This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.
This guide provides: - an overview of security and privacy - information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management - some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more - instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices
This lesson is designed for students in adult basic education grade level …
This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.
This lesson is designed for students in adult basic education grade level …
This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.
Developed through SETDA's Cybersecurity Collaborative, this policy brief provides the key points …
Developed through SETDA's Cybersecurity Collaborative, this policy brief provides the key points in cybersecurity advocacy. This document is designed to support state leaders engaged in state and federal advocacy, and to establish a focal point on the topic for the broader SETDA community.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders convene and collaborate, to compensate for shortcomings in district cybersecurity expertise.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders encourage incident response plans to help districts prepare for inevitable cyber events.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders provide phishing and awareness training to help districts identify vulnerabilities.
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of …
Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders establish procurement practices to help districts vet vendors more efficiently.
The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, …
The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, a professional learning community of state edtech leaders and private sector partners focused on identifying key resources, assessing state-level K-12 cybersecurity advocacy efforts, and crafting policy recommendations.
This unit covers common security concerns and safeguards, including firewalls, encryption, virus …
This unit covers common security concerns and safeguards, including firewalls, encryption, virus protection software and patterns, and programming for security. Additional topics include security of wireless networks, and concerns, mitigations, and regulations related to healthcare applications.
Welcome to this exciting topic on security and Nigeria Education in the …
Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.
Welcome to this exciting topic on security and Nigeria Education in the …
Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.
Welcome to this exciting topic on security and Nigeria Education in the …
Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.
The wars in Iraq and Syria have changed the course of international …
The wars in Iraq and Syria have changed the course of international relations in the 21st century. During these conflicts, hundreds of thousands have died and millions have been displaced. After 13 years, these conflicts continue with no end in sight. The central question of this course is: How do political science theories and methods help us understand the course of these wars? In this course, you will answer this question by integrating three elements: theory, data/description, and application of theory to data/description. The primary goal of this course is to bolster students’ skills in using various social science methods to explain important variations in violent conflict.
This course on software engineering covers design and implementation of medium-scale software …
This course on software engineering covers design and implementation of medium-scale software systems, using web applications as a platform. In the course, students learn the fundamentals of structuring a web application and writing modular code, with an emphasis on conceptual design to achieve clarity, simplicity, and modularity. Topics also include functional programming, relational databases, and security.
This subject examines the unique culture that developed in the United States …
This subject examines the unique culture that developed in the United States after World War II. The dawn of the nuclear age and the ensuing Cold War fundamentally altered American politics and social life. It also led to a flowering of technological experimentation and rapid innovation in the sciences. Over the course of the term, students will explore how Americans responded to these changes, and how those responses continue to shape life in the US today.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.