Why Did We Develop This Course                       

The internet continues to expand everyday bringing convenience, access to information and tools. What we don’t notice as clearly is that threats are increasing along with it. We are surrounded by risks and need to be aware and knowledgeable.

In this course though, learners will understand how to avoid, or even deal with internet threats. This would help safeguard against hackers who may steal your identity and harm you. Through this program, we aim to provide a simple playlist of videos that teach you how to deal with internet threats.

                                                                        

Who is it for?

This course is mainly made for school administrators or parents to purchase on behalf of youth in school or at home

    

What you will learn

After the completion of the course, the learner will be guided through a step-by-step process to avoid common security issues while being connected online.

                           


Course Curriculum

  • 1

    PreTest

    • Internet Safety Pretest

  • 2

    How to Prevent Phishing

    • How to Prevent Phishing

    • Unit Summary

    • Complete

    • Case Study

    • Quotes

  • 3

    How to Have a Strong Password

    • How to Have a Strong Password

    • Unit Summary

    • Complete

    • Case Study

  • 4

    Importance of Privacy Settings

    • Importance of Privacy Settings

    • Unit Summary

    • Complete

    • Quotes

  • 5

    Useful Software for Online Protection

    • Useful Software for Online Protection

    • Unit Summary

    • Complete

  • 6

    How to Detect an Untrustworthy Website

    • How to Detect an Untrustworthy Website

    • Unit Summary

    • Complete

    • Quotes

  • 7

    4 Tips on How to Keep Your Device Secure

    • 4 Tips on How to Keep Your Device Secure

    • Unit Summary

    • Build Your Action Plan

    • Complete

    • Quotes

  • 8

    4 Steps on How to Avoid and Handle Identity Theft

    • 4 Steps on How to Avoid and Handle Identity Theft

    • Unit Summary

    • Build Youe Action Plan

    • complete

    • Quotes

  • 9

    Ignore or Report a Cyber Bully

    • Ignore or Report a Cyber Bully

    • Unit Summary

    • Build Your Action Plan

    • Complete

    • Case Study

    • Quotes

  • 10

    Types of Virus Threats

    • Types of Virus Threats

    • Unit Summary

    • Build Your Action Plan

    • Complete

  • 11

    Reasons Why You Shouldn’t Interact With Strangers

    • Reasons Why You Shouldn’t Interact With Strangers

    • Unit Summary

    • Build Your Action Plan

    • Complete

  • 12

    Post Test

    • PostTest

 

Doing mistakes is part of the learning process, but don't do the same mistakes that others have learnt from. 

Take this course to save time, money and pain so you can focus on your own learnings.