Overview of Course Content
Part 1: Advanced Cyber Attacks in Online Learning
During the first week, participants will explore
- Attack vectors
- Attacks targeting websites, mobile devices and commonly used computer applications devices and commonly used computer applications
- Internal threats to learning institutions
Part 2: Protecting Data
During the second week, participants will learn
- Access controls to protect files on devices and in the cloud devices and in the cloud
- Techniques to prevent loss of critical data
- Data recovery tools and techniques
Part 3: Securing Online Communication and Learning Devices
In the third week, participants will explore
- Online anonymity and privacy
- Secure communication channels to use when engaging with peers and students remotely
- Ways of protecting devices from malware and unauthorised access
Part 4: Cybersecurity Concerns in Emerging Educational Technologies
In the final week, participants will
- Learning emerging technologies and their benefits
- Learn cyber risks posed by the technologies
- Develop a cybersecurity preparedness plan
Outcomes of this course
After completion of this course, the participant should be able to
- Outline the advanced cyber-attacks that may be encountered while teaching online and apply the appropriate mitigations.
- Employ various techniques to protect data created and processed by learning institutions from alteration, loss, and unauthorised access.
- Apply advanced techniques in online communication, personal security, and device security.
- Appraise the benefits of emerging technologies in digital learning and hot to use the securely.