Updating search results...

Search Resources

62 Results

View
Selected filters:
  • security
Protecting Your Online Privacy: A Hands-On Workshop for Non-Techies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This resource guide was created as an accompaniment for a hands-on, three-hour workshop on the basics of online privacy and security in a Canadian context. The workshop is designed for young adults and adults with basic computer/phone/online skills: we assume participants know how to get online, how to do basic internet searches, and how to install simple tools and software on their devices. The workshop is most often taught in public library settings.

This guide provides:
- an overview of security and privacy
- information about key privacy technologies including ad blockers, tracking detection, basic encryption tools, secure messaging tools and password management
- some "advanced" information on Virtual Private Networks (VPNs), Tor, private email services, and more
- instructional guides for basic tools, customized for Windows, MacOS, Android, iOS and ChromeOS devices

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alliah Krahn
Andrea Budac
Dan Cockcroft
Kris Joseph
Michelle De Agostini
Quincy Hiscott
Date Added:
03/27/2018
Reading
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Date Added:
01/03/2018
Reading and Analyzing Text in the Context of a Societal Issue: Privacy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is designed for students in adult basic education grade level E (low and high adult secondary education). The purpose of this lesson is to develop student proficiency in reading and analyzing text. The lesson topic is the issue of an individual’s right to privacy as balanced with the government’s responsibility for security of its citizens.

Subject:
English Language Arts
Material Type:
Lesson
Date Added:
04/17/2016
SETDA Cybersecurity Policy Brief (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this policy brief provides the key points in cybersecurity advocacy. This document is designed to support state leaders engaged in state and federal advocacy, and to establish a focal point on the topic for the broader SETDA community.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/10/2022
SETDA Cybersecurity State Spotlight: Convening (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders convene and collaborate, to compensate for shortcomings in district cybersecurity expertise.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/24/2022
SETDA Cybersecurity State Spotlight: Incident Response Plan (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders encourage incident response plans to help districts prepare for inevitable cyber events.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/24/2022
SETDA Cybersecurity State Spotlight: Phishing and Awareness Training (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders provide phishing and awareness training to help districts identify vulnerabilities.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
10/24/2022
SETDA Cybersecurity State Spotlight: Procurement Practices (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

Developed through SETDA's Cybersecurity Collaborative, this best practice document spotlights some of the most promising K-12 cybersecurity work being done, and the states who are leading the way. Learn how state leaders establish procurement practices to help districts vet vendors more efficiently.

Subject:
Education
Educational Technology
Material Type:
Case Study
Date Added:
10/24/2022
SETDA K12 Cybersecurity Landscape Scan (March 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, a professional learning community of state edtech leaders and private sector partners focused on identifying key resources, assessing state-level K-12 cybersecurity advocacy efforts, and crafting policy recommendations.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
09/23/2022
Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unit covers common security concerns and safeguards, including firewalls, encryption, virus protection software and patterns, and programming for security. Additional topics include security of wireless networks, and concerns, mitigations, and regulations related to healthcare applications.

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Date Added:
09/26/2014
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/10/2018
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
11/14/2017
Security and Nigerians’ Education in the Digital Future
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Welcome to this exciting topic on security and Nigeria Education in the digital future. The OER is basically focused on projecting security and surveillance issues in education and what it might look like for the Nigerian context for the near future. I hope you find the information and resources useful.                                                       

Subject:
Arts and Humanities
Material Type:
Module
Author:
Chioma Ezegwu
Date Added:
01/14/2018
Social Science and the Iraq and Syrian Wars
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The wars in Iraq and Syria have changed the course of international relations in the 21st century. During these conflicts, hundreds of thousands have died and millions have been displaced. After 13 years, these conflicts continue with no end in sight. The central question of this course is: How do political science theories and methods help us understand the course of these wars? In this course, you will answer this question by integrating three elements: theory, data/description, and application of theory to data/description. The primary goal of this course is to bolster students' skills in using various social science methods to explain important variations in violent conflict.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Petersen, Roger
Date Added:
09/01/2016
Software Studio
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course on software engineering covers design and implementation of medium-scale software systems, using web applications as a platform. In the course, students learn the fundamentals of structuring a web application and writing modular code, with an emphasis on conceptual design to achieve clarity, simplicity, and modularity. Topics also include functional programming, relational databases, and security.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Jackson, Daniel
Date Added:
02/01/2013
Tips to secure your wireless network
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Here are a few tips on what to do after you plug in your wireless router.

Date Added:
12/13/2015
The United States in the Nuclear Age
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This subject examines the unique culture that developed in the United States after World War II. The dawn of the nuclear age and the ensuing Cold War fundamentally altered American politics and social life. It also led to a flowering of technological experimentation and rapid innovation in the sciences. Over the course of the term, students will explore how Americans responded to these changes, and how those responses continue to shape life in the US today.

Subject:
Arts and Humanities
History
U.S. History
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Horan, Caley
Date Added:
02/01/2016