黑料网

Learning

Required Resources

  • Read article from IBM on
  • View and think about the network you have in your classroom.
  • Complete with the following modules:
    • 鈥淒escribe basic cyber security threats鈥 (21 mins)
    • 鈥淒escribe authentication and authorization鈥 (18 mins)
    • 鈥淒escribe device-based threats and security controls鈥 (17 mins)
  • View video on (5:57)

Additional Resources

  • (11:53)

Required Evidence

  • Create and submit a basic networking diagram for a classroom, include a few examples of each networked device (printer, computer, iPads). This can be done on , Microsoft Word, or Visio.
  • Submit a screenshot with evidence of the completed Microsoft training (the main screen of the training will show a green checkmark next to it)鈥嬧嬧嬧嬧嬧嬧

Evidence Review Criteria

  • Criterion 1: Educator understands how a network is created.
  • Criterion 2: Educator understands basic cybersecurity and keeping their information safe.
0
0