This cluster of e-learning modules includes an introduction to many of the topics you will encounter later, with a second module focusing on the cyber threats that we all face. The third looks at the vulnerability of your own information, and the final module is a hacking game that looks at identification of threats and how to deal with them. By the end of this cluster, you will have learned about password security, the CIA (confidentiality, integrity and availability) of information, how to prioritise and protect information assets, and how to deal with malware and other threats.  Each e-learning module has a set of lesson plans to support you to deliver these topics in the classroom. You will find them by clicking on the Resources link at the bottom of the e-learning window. 

This set of e-learning modules focuses on some of the strategies used to deal with cyber threats, including the security of networks, encryption and its role in the transfer of information, and the psychology of cyber crime - the human factors that contribute to cyber threats.  Don't forget - lesson plans for all of the topics within these modules are in the Resources section in the e-learning modules. 

This final set of e-learning modules focus upon the ways in which secure practices can be put into place by individuals as well as within organisations, including schools. You will learn about how firewalls and security software work, and why they are important. You will also find out about identity theft and how to avoid it. Module 8 also looks at e-safety and the Ofsted requirements. Disaster recovery, risk assessment and risk management are addressed in this final section, and you will also find out more about legislation that governs cyber crime. Finally, the issues around social media and good practice are considered, as well as using the Cloud to back up important information.