Loading...
  • Cyber/ Django Girl's

    Maximum 100 Girls
  • Start Date

    25 - 10 - 2024
  • Location

    51 Hill Station, Freetown
  • 10 Facilitators

    Profession, Friendly

Program Selection

Tech Connect

Pass Event On Cybersecurity Training for Teachers (CTT4) - April 1, 2024

  011:00 Am : 02:00 PM
  Introduction to Cyber Security

Week 1: Introduction to Cyber Security

Explore how the cyber space works Define cyber security and explore its importance Explore why cyber criminals target educational institutions Understand the CIA triad and its significance in cyber security
  10:30 Am - 12:00
  Cyber Threats

Week 2: Cyber Threats

Cover cyber security threats, such as malware, identity theft, and social engineering. Engage with practical case studies of real-life attacks
  10:30 Am - 12:00
  Cyber Threats

Week 2: Cyber Threats

Cover cyber security threats, such as malware, identity theft, and social engineering. Engage with practical case studies of real-life attacks
  45 minutes
  Outcomes of this Course

Course Contents

After completion of this course, the participant is expected to be able to: Understand cybersecurity and its relevance in digital learning Identify and mitigate various cybersecurity threats and attacks Outline various techniques that students can use to protect themselves when using technology Incorporate best cybersecurity practices through protective and preventive measures; and Demonstrate understanding of cybersecurity laws, acts and relevant regulatory organizations and bodies.
  09:15 Am - 10:00 Am
  Defending Against Cyber Threats

Week 3: Defending Against Cyber Threats

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500
  45 minutes
  Outcomes of this Course

Course Contents

After completion of this course, the participant is expected to be able to: Understand cybersecurity and its relevance in digital learning Identify and mitigate various cybersecurity threats and attacks Outline various techniques that students can use to protect themselves when using technology Incorporate best cybersecurity practices through protective and preventive measures; and Demonstrate understanding of cybersecurity laws, acts and relevant regulatory organizations and bodies.