做厙輦⑹

Learning

Required Resources

  • Read article from IBM on
  • View and think about the network you have in your classroom.
  • Complete with the following modules:
    • Describe basic cyber security threats (21 mins)
    • Describe authentication and authorization (18 mins)
    • Describe device-based threats and security controls (17 mins)
  • View video on (5:57)

Additional Resources

  • (11:53)

Required Evidence

  • Create and submit a basic networking diagram for a classroom, include a few examples of each networked device (printer, computer, iPads). This can be done on , Microsoft Word, or Visio.
  • Submit a screenshot with evidence of the completed Microsoft training (the main screen of the training will show a green checkmark next to it)

Evidence Review Criteria

  • Criterion 1: Educator understands how a network is created.
  • Criterion 2: Educator understands basic cybersecurity and keeping their information safe.
0
0