Cybersecurity and Privacy
In this course, students shall understand different forms of cyberattacks, then examine the techniques used by engineers to protect networked systems. Students will further their knowledge by exploring preventative organizational policy, network designs, and software. Finally, students will explore the concept of digital footprints and develop their own ideas about protecting their data.
3
Chinese,English
Learning Outcomes
Rundown:
- Battle of the Binary: Distinguish cyberattacks and categorize cybersecurity mechanisms including firewalls, MAC address filtering, modular testing, and more
- Cybersecurity Card Game: Students will receive cards with different cyberattack and cybersecurity protocols; applying knowledge on cybersecurity, students need to devise strategies to win over opponents
- Data is the New Oil: Understand the indestructible nature of data, browse through privacy settings on own social media accounts to understand what digital dividends students are paying companies
- Developing Digital Immunity: Applying knowledge in cybersecurity and privacy, students will develop a set of enactable protection measures
our proprietary cloud-based learning platform. It is designed to work seamlessly with free creative and development tools in providing support for DECT education.
Provide DECT Professional TTT Training and Support for Teachers
Krystal’s Student Empowerment Programme (SEP) provides students the knowledge, skills and tools necessary to survive in the global digital economy, preparing them for excellence in their future careers.
Krystal OTP includes all the office tools needed to keep daily office tasks running efficiently and economically.
is a comprehensive program designed to equip individuals and citizens with essential digital competencies and soft skills to thrive in the digital economy.