Course Content
Digital Resources
Softwares and Programs where the main tools and software platforms used in VET are described, including Learning Management Systems (LMS) like Moodle, WordPress plugins such as Tutor LMS or LearnPress, and online meeting platforms like Zoom, Google Meet, and Jitsi. We will explore the key features, use cases, and considerations for choosing between free and paid options. Open Source and Open Access where we analyze the differences between open source software/platforms and open access, highlighting how these options support the sharing of knowledge and accessibility in education differently. The reasons why an institution might prefer one over the other, considering flexibility, cost, and customization, will be discussed. We will define the concept of Creative Commons, explaining how its licenses can be used to share educational resources legally and flexibly, promoting open access and the use of teaching materials.
0/4
Technical compatibilities
Hardware and equipment necessary to effectively access and manage VET platforms, from both the user's and administrator's perspective. This includes computer configurations, audio/video devices, and other essential equipment. We will look further into Software and Programs that enhance the online learning experience, such as collaboration tools, video editing software, and solutions for tests and assessments online.
0/3
Cybersecurity and Data Protection
Privacy and Data Protection in this section we discuss the safeguarding of sensitive information, focusing on legal requirements, ethical handling, and preventive measures against data breaches, by exploring methods to effectively manage and protect personal and institutional data. Cyber Security highlights the importance protecting educational systems from digital threats. It provides an overview of the strategies and technologies necessary to secure networks and devices used in VET environments. We examine common cyber threats and offer practical solutions for preventing unauthorized access and ensuring the continuity of educational operations.
0/3
Technology and Digital Resources

Data Protection in Action

Duration: 2 hours

Resources and Materials: Case studies on data breaches, GDPR and CCPA summaries, personal data inventory template (online research)

Target Group and Number of Participants: Educators, administrators, and IT staff, 10-20 participants

Learning Objectives and Goals: Understand key principles of GDPR and CCPA, identify personal data under these regulations, learn to protect and handle such data correctly

Expected Outcomes: Improved knowledge of data protection laws, ability to categorize and secure personal data appropriately

How to Do It:

  • Begin with a brief overview of GDPR and CCPA.
  • Break into small groups to discuss recent case studies of data breaches and the implications of these breaches.
  • Each group identifies types of personal data handled in their roles and applies data protection principles to these scenarios.
  • Groups present their findings and strategies for better data management.

Feedback: Conduct a feedback session to discuss the practical challenges faced during the exercise and gather suggestions for improving data protection practices.

Phishing Identification Workshop

Duration: 1 hour

Resources and Materials: Examples of phishing emails, anti-phishing checklist

Target Group and Number of Participants: All staff and students, 10-20 participants

Learning Objectives and Goals: Identify and react appropriately to phishing attempts

Expected Outcomes: Enhanced ability to recognize and report phishing attempts

How to Do It:

  • Presentation on the characteristics of phishing emails and the potential risks involved.
  • Distribute examples of phishing emails and have participants use a checklist to identify telltale signs.
  • Discussion on correct responses to phishing attempts and how to report them.

Feedback: Collect feedback through a short questionnaire on the clarity of the training and any additional areas needing coverage.

Secure Password Creation and Management

Duration: 1 hour

Resources and Materials: Guidelines on creating secure passwords, access to a password management tool

Target Group and Number of Participants: Staff and older students, 10-20 participants

Learning Objectives and Goals: Learn to create and manage strong, secure passwords

Expected Outcomes: Adoption of better password practices, increased use of password managers

How to Do It:

  • Start with a brief presentation on the importance of strong passwords.
  • Hands-on session with participants creating their own strong passwords following best practices.
  • Introduce a password manager, demonstrating how to store and manage passwords securely.

Feedback: End with a discussion on the ease of use of password managers and any barriers to their adoption.

Cybersecurity Role-Playing Game

Duration: 2 hours

Resources and Materials: Role-playing scenarios, cyber incident response checklist

Target Group and Number of Participants: IT team and interested staff members, 10-20 participants

Learning Objectives and Goals: Understand and react appropriately to different types of cyber threats

Expected Outcomes: Improved readiness and reaction strategies to cyber incidents

How to Do It:

  • Divide participants into groups and assign each a specific cyber threat scenario (e.g., ransomware attack, data breach).
  • Each group discusses and plans their response using the incident response checklist.
  • Groups present their strategies, followed by a feedback session on what could be improved in real situations.

Feedback: Gather feedback on the realism of the exercise and its effectiveness in preparing participants for actual cyber incidents.

Scroll to Top