The Cyber Safety training is designed to provide classroom teachers, school administrators, IT specialists, library media specialists and school counselors with the knowledge and skills necessary to create awareness and provide education about digital citizenship to K-12 students. The training is appropriate for novice to advanced users of cyber technologies. Very little prior experience or knowledge is required. One day of face to face instruction will be scheduled for participants to attend after you have completed all 9 online modules following this introduction. The cost for this course is $250.00.
What is “personal information”? The outcome of this module is that given an online situation, you will be able to identify at risk personal information with at least 90% accuracy.
1. Search for your personal information online using free search services
2. Identify personal information in an online scenario that may put one at risk for predator contact or identity theft
3. Resend an email without revealing other persons’ email addresses
This generation has not known life without their devices. They use their technology for communication, research, entertainment, creative endeavors…in fact, their use reflects their self image. You can see it in their desktop, ringtones, opening screen on their phones, their social networking profile, the colors of their phone, computer, or their ipod. This is unlike the adults in their lives, who most likely have the windows desktop on their profile. But without consistent adult examples of smart use, they are at risk of misusing their devices or putting their safety in jeopardy. This module will help participants identify common misuses/risks of technology with 90% accuracy.
1. Define common uses of technology
2. Describe common misuses/risks and statistics regarding those activities
This module is currently being revised and will be available soon…
It will cover the following topics:
Commercial Exploitation of Children or Human Trafficking
Online Youth Recruitment by Gangs, Hate Groups and Terrorists
The number one activity for boys online is gaming and for girls is social networking. These activities may involve risks of which parents are unaware. This module will enable participants to be able to name at least one virtual world and game that is marketed toward tweens, teens, and young adults and define an avatar with 90% accuracy.
Define a virtual world
Define an avatar
Describe a crime within a virtual world
Describe a gaming crime
Although parents are concerned about the misuse of the computer, many of the activities that their children engage in are using other devices, such as their cell phones. Through the module, participants will identify the most common devices and how they are used by students with at least 90% accuracy.
Describe each of the following devices, the way they work and their uses/misuses
2. Camera Phones
3. Xbox or PlayStation Portable
4. Storage Devices
The use of filters, firewalls, and monitoring devices help support the measures put in place by the parents through use agreements and rules. Through this module, participants will list the basics for computer security and will explain how to utilize at least two solutions for parents to help protect their children while online with at least 90% accuracy.
1. Define procedures and tools for online security
2. Identify the steps suggested by GetNetWise.org to protect the user while online
3. Perform online computer security checks and manual searches for Typed URL’s, History, Favorites, Temporary internet files, Recent files, Graphics, Cookies
4. List the basic concepts for computer/browsing security
6. Anti-virus Protection
7. Anti Spyware Protection
8. Software Updates
The web has changed from a place to go get information to a place where users contribute information as well as get information. Applications like wiki’s, social networking sites, and blogs make this interaction possible. Children have particularly taken advantage of this interaction, but have not always been wise with what they post. Through this module, participants will describe two common Web 2.0 applications and their dangers or misuses with at least 90% accuracy.
1. Define the characteristics that comprise Web 2.0
2. Describe a blog
3. Describe a wiki
4. Describe a social networking site