Required Resources
- Read article from IBM on
- View and think about the network you have in your classroom.
- Complete with the following modules:
- 鈥淒escribe basic cyber security threats鈥 (21 mins)
- 鈥淒escribe authentication and authorization鈥 (18 mins)
- 鈥淒escribe device-based threats and security controls鈥 (17 mins)
- View video on (5:57)
Additional Resources
- (11:53)
Required Evidence
- Create and submit a basic networking diagram for a classroom, include a few examples of each networked device (printer, computer, iPads). This can be done on , Microsoft Word, or Visio.
- Submit a screenshot with evidence of the completed Microsoft training (the main screen of the training will show a green checkmark next to it)鈥嬧嬧嬧嬧嬧嬧
Evidence Review Criteria
- Criterion 1: Educator understands how a network is created.
- Criterion 2: Educator understands basic cybersecurity and keeping their information safe.
0
0