SlideShare a Scribd company logo
Copyright © 2014CyberSecurity Malaysia
CyberSecurity Malaysia
CyberSAFE Ambassador Program
2
Program Objectives
To become CSM CyberSAFE Ambassador and roll out
CyberSAFE programs and activities in schools
To educate school students to be become responsible
digital citizen and cyber safety savvy.
Ambassador
Students
Copyright © 2014CyberSecurity Malaysia
3
Program Roadmap
Ambassador Students
Securing the
computer lab
promoting my
school to the world
CyberSAFE
Ambassador
Development
Stage 1
CyberSAFE
@
Schools
Stage 2
School Project
& Community
Engagement
Stage 3
Copyright © 2014CyberSecurity Malaysia
4
Program Lessons
Lesson 1 Introduction to CyberSAFE Website
Lesson 2 Power Search Using Google
Lesson 3 Secure the Computer
Lesson 4 Secure the Human
Lesson 5 WiFi Network Security
Lesson 6 Facebook Security
CSM CyberSAFE
Ambassador Program
Copyright © 2014CyberSecurity Malaysia
5
Program Timeline
DAY 1 DAY 2 DAY 3
0900 - 1030 Introduction,
Admin & Logistic
Lesson 3
Secure the Computer
Lesson 6
Facebook Security
1030 - 1100 Coffee Break
1100 - 1300 Lesson 1
Intro CyberSAFE Portal
Lesson 4
Secure the Human
Presentation
1300 - 1400 Lunch Break
1400 - 1600 Lesson 2
Power Search Google
Lesson 5
WiFi Network Security
Presentation
1600 - 1630 Coffee Break
1630 - 1700 Individual Assignment Individual Assignment End of Class
6
Program Requirements
1
2
3
Venue
Computer
Internet
Copyright © 2014CyberSecurity Malaysia
7
Roles & Responsibilities
1
2
3
Organiser
Trainers
Participants
Copyright © 2014CyberSecurity Malaysia
8
Participant Activity
1
2
3
Presentation Delivery
Select Presentation Topic
Presentation Slide Design
Copyright © 2014CyberSecurity Malaysia
9
Useful Resources
General
Resources
Information
Technology
Resources
Language
Resources
Copyright © 2014CyberSecurity Malaysia
10
We now accept the fact that learning is a lifelong process of keeping abreast of
change. And the most pressing task is to teach people how to learn - Peter Drucker
Copyright © 2013 CyberSecurity Malaysia 11

More Related Content

Similar to 00 introduction to cyber safe ambassador program

Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Marc Lijour, OCT, BSc, MBA
 
Nasr zayed.cv 03052015
Nasr zayed.cv 03052015Nasr zayed.cv 03052015
Nasr zayed.cv 03052015
NaSr Zayed
 
Aventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber security
Aventis School of Management
 
Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0
The World Bank
 
Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013
Zoraini Wati Abas, EdD
 
History of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumarHistory of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumar
Sivakumar R D .
 
AVBENAKE Chris CV
AVBENAKE Chris CVAVBENAKE Chris CV
AVBENAKE Chris CV
Chris Avbenake
 
AAUA E-learning Platform Training.
AAUA  E-learning Platform Training.AAUA  E-learning Platform Training.
AAUA E-learning Platform Training.
Rafiat Aliyu
 
Connecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile DevicesConnecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile Devices
JamesDiffin
 
Managing Multiple Project Priorities
Managing Multiple Project PrioritiesManaging Multiple Project Priorities
Managing Multiple Project Priorities
Mike KEPPELL
 
Navigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney InstituteNavigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney Institute
stephan Ridgway
 
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Professor Abd Karim Alias
 
Report%20 Mix#2 2003 Ver
Report%20 Mix#2 2003 VerReport%20 Mix#2 2003 Ver
Report%20 Mix#2 2003 Ver
Kumton Suttiraksiri
 
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Leanne Isaacson
 
120329 isba the way forward web version
120329 isba the way forward   web version120329 isba the way forward   web version
120329 isba the way forward web version
Mark S. Steed
 
EdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom ProjectEdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom Project
Hazril Hafiz
 
Globalised online learning (shift 9 mheb)
Globalised online learning (shift 9 mheb)Globalised online learning (shift 9 mheb)
Globalised online learning (shift 9 mheb)
Professor Abd Karim Alias
 
Future of Education (E-Learning with Mobile Technology)
Future of Education (E-Learning with Mobile Technology)Future of Education (E-Learning with Mobile Technology)
Future of Education (E-Learning with Mobile Technology)
Rodney Toh
 
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Abbas Shahid Baqir
 
Google Education on Air Keynote: Dave Ryan Buaron
Google Education on Air Keynote: Dave Ryan BuaronGoogle Education on Air Keynote: Dave Ryan Buaron
Google Education on Air Keynote: Dave Ryan Buaron
Ryan Buaron
 

Similar to 00 introduction to cyber safe ambassador program (20)

Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
Transformative Pedagoy - Cisco webinar with Dr Lance Ford -Feb 10, 2015
 
Nasr zayed.cv 03052015
Nasr zayed.cv 03052015Nasr zayed.cv 03052015
Nasr zayed.cv 03052015
 
Aventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber securityAventis grad diploma in digital forensic & cyber security
Aventis grad diploma in digital forensic & cyber security
 
Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0Meruvian Seamless Education Program Overview v1.0
Meruvian Seamless Education Program Overview v1.0
 
Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013Usbi incorporating 21st century skills to engage learners 2013
Usbi incorporating 21st century skills to engage learners 2013
 
History of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumarHistory of E-learning - R.D.sivakumar
History of E-learning - R.D.sivakumar
 
AVBENAKE Chris CV
AVBENAKE Chris CVAVBENAKE Chris CV
AVBENAKE Chris CV
 
AAUA E-learning Platform Training.
AAUA  E-learning Platform Training.AAUA  E-learning Platform Training.
AAUA E-learning Platform Training.
 
Connecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile DevicesConnecting, Engaging and Motivating Learners with Mobile Devices
Connecting, Engaging and Motivating Learners with Mobile Devices
 
Managing Multiple Project Priorities
Managing Multiple Project PrioritiesManaging Multiple Project Priorities
Managing Multiple Project Priorities
 
Navigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney InstituteNavigating a Connected Future: eLearning @ Sydney Institute
Navigating a Connected Future: eLearning @ Sydney Institute
 
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
Globalised Online Learning — Malaysia Education Blueprint (Shift 9)
 
Report%20 Mix#2 2003 Ver
Report%20 Mix#2 2003 VerReport%20 Mix#2 2003 Ver
Report%20 Mix#2 2003 Ver
 
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...
 
120329 isba the way forward web version
120329 isba the way forward   web version120329 isba the way forward   web version
120329 isba the way forward web version
 
EdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom ProjectEdTech - Integrating Technology in Classroom Project
EdTech - Integrating Technology in Classroom Project
 
Globalised online learning (shift 9 mheb)
Globalised online learning (shift 9 mheb)Globalised online learning (shift 9 mheb)
Globalised online learning (shift 9 mheb)
 
Future of Education (E-Learning with Mobile Technology)
Future of Education (E-Learning with Mobile Technology)Future of Education (E-Learning with Mobile Technology)
Future of Education (E-Learning with Mobile Technology)
 
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
 
Google Education on Air Keynote: Dave Ryan Buaron
Google Education on Air Keynote: Dave Ryan BuaronGoogle Education on Air Keynote: Dave Ryan Buaron
Google Education on Air Keynote: Dave Ryan Buaron
 

More from Ministry of Education Malaysia

Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014
Ministry of Education Malaysia
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
Ministry of Education Malaysia
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
Ministry of Education Malaysia
 
Fail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMKFail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMK
Ministry of Education Malaysia
 
Panduan Fail Meja
Panduan Fail MejaPanduan Fail Meja
Modul 1 Scratch
Modul 1 ScratchModul 1 Scratch
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
Ministry of Education Malaysia
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
Ministry of Education Malaysia
 
Hack me now, hack me then @ btp
Hack me now, hack me then @ btpHack me now, hack me then @ btp
Hack me now, hack me then @ btp
Ministry of Education Malaysia
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
Ministry of Education Malaysia
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
Ministry of Education Malaysia
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
Ministry of Education Malaysia
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
Ministry of Education Malaysia
 
02 power search using google
02 power search using google02 power search using google
02 power search using google
Ministry of Education Malaysia
 
Mtg v5.0 full pdf bm
Mtg v5.0 full pdf bmMtg v5.0 full pdf bm
Mtg v5.0 full pdf bm
Ministry of Education Malaysia
 
Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014 Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014
Ministry of Education Malaysia
 
Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7
Ministry of Education Malaysia
 
Pembentangan TMK
Pembentangan TMKPembentangan TMK
Makna "PLuG TMK"...
Makna "PLuG TMK"...Makna "PLuG TMK"...
Makna "PLuG TMK"...
Ministry of Education Malaysia
 

More from Ministry of Education Malaysia (20)

Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014Borang permohonan guru cemerlang 2014
Borang permohonan guru cemerlang 2014
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja - Panduan Penyediaan
Fail Meja - Panduan PenyediaanFail Meja - Panduan Penyediaan
Fail Meja - Panduan Penyediaan
 
Fail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMKFail Meja Ketua Panitia TMK
Fail Meja Ketua Panitia TMK
 
Panduan Fail Meja
Panduan Fail MejaPanduan Fail Meja
Panduan Fail Meja
 
Modul 1 Scratch
Modul 1 ScratchModul 1 Scratch
Modul 1 Scratch
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program00 introduction to cyber safe ambassador program
00 introduction to cyber safe ambassador program
 
Hack me now, hack me then @ btp
Hack me now, hack me then @ btpHack me now, hack me then @ btp
Hack me now, hack me then @ btp
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
02 power search using google
02 power search using google02 power search using google
02 power search using google
 
Manual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLEManual Panduan Membina Laman FROG VLE
Manual Panduan Membina Laman FROG VLE
 
Mtg v5.0 full pdf bm
Mtg v5.0 full pdf bmMtg v5.0 full pdf bm
Mtg v5.0 full pdf bm
 
Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014 Takwim Penggal Persekolahan 2014
Takwim Penggal Persekolahan 2014
 
Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7Hari ke-4: Pembentangan Kumpulan 7
Hari ke-4: Pembentangan Kumpulan 7
 
Pembentangan TMK
Pembentangan TMKPembentangan TMK
Pembentangan TMK
 
Makna "PLuG TMK"...
Makna "PLuG TMK"...Makna "PLuG TMK"...
Makna "PLuG TMK"...
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

00 introduction to cyber safe ambassador program

Editor's Notes

  1. Welcome! This program is a collaboration between Bahagian Teknologi Pendidikan (BTP), Kementerian Pendidikan Malaysia and CyberSecurity Malaysia (CSM) to raise security awareness among students. The program was officiated by Tan Sri Dato’ Muhyiddin Yassin, Minister of Kementerian Pendidikan Malaysia during the launching of CyberSAFE in School program in 2010 at Kota Marudu Sabah. CyberSAFE ambassador program comprises of six lessons on security awareness and one presentation session in order to develop competencies to become CyberSAFE ambassador. Lets begin our lessons!
  2. The objectives of this program are 1) To become BTP CSM CyberSAFE Ambassador and roll out CyberSAFE programs and activities in schools In order to increase security awareness among students , the role of CyberSAFE ambassador is critical to roll out CyberSAFE programs and activities in schools. This program will train the participants on various aspect of security awareness so that the participants will have sufficient knowledge to become CyberSAFE ambassador. 2) To educate school students to become responsible digital citizen and cyber safety savvy Upon completion of this program, the trained participant will assume the role of CyberSAFE ambassador to impart the CyberSAFE messages to students so that they will become responsible digital citizen and cyber safety savvy.
  3. This program comprises of three stages: Stage 1 - CyberSAFE Ambassador Development The participants will be trained to be CyberSAFE Ambassador which responsible to conduct CyberSAFE Program in their respective schools. This program will disseminate sufficient knowledge, skillset and toolset in cyber safety to the future CyberSAFE Ambassador. Stage 2 - CyberSAFE in Schools The trained participants will relay CyberSAFE message to their students at schools in various format such as speaking engagement (seminar, workshop, talks ) and interactive (treasure hunt, quiz, competition). The main objective is to educate our young generation to be cyber safety savvy. Stage 3 - School Project & Community Engagement There are many potential activities can be organised in order to get active participation from students such as securing the computer lab - to ensure the safe environment in computer lab promoting my school to the world - to positively use of internet
  4. Lesson 1 - Introduction to CyberSAFE Website This lesson will introduce the cyber safety resources website i.e. CyberSAFE website which contains guideline, tips and tricks, video, games and many more. Lesson 2 - Power Search Using Google Participants will learn the internet searching skills to find information on the internet. This lesson teaches the interesting search techniques by using Google search engine. Information is power! Lesson 3 - Secure the Computer It is important for us to secure our computer from malicious attacks. This lesson highlights 10 common mistakes made by computer users in securing their computers. Take notes on how to mitigate the potential threats so that we can protect our computers. Lesson 4 - Secure the Human This lesson exposes the most vulnerable parameter in the security defenses i.e. the computer users. Learn how cyber criminals take advantage of users’ ignorance, interests and trust to compromise our online accounts and computers. Lesson 5 - WiFi Network Security The lesson highlights the flaws in WiFi networks so that we understand the potential threats at WiFi hotspots. Lesson 6 - Facebook Security Learn on how to secure our Facebook account so that our personal info can be protected. We will discuss clickjacking, survey scam and privacy setting.
  5. This program timeline can be adjusted based on case-by-case situation. Our main objective is to has very conducive learning environment in this program. The trainer will seek the common ground on the realistic schedule before commencing the lessons.
  6. The program requirements are as follows 1) Venue classroom setup for maximum of 30 participants classroom is expected for learning environment i.e. cool temperature, sufficient numbers of desks and chairs, electrical power points, microphone, external audio speaker, high resolution projector and white screen) classroom person-in-charge for setting up the class based on requirement 2) Computer there are two options - organiser provides the computer or participants bring own laptop. Windows operating systems - Win XP, Win Vista or Win 7 admin user rights is expected - to install, remove application and to change the configuration Google Chrome as the standard web browser 3) Internet high speed internet connection is highly anticipated for this program bring own wireless broadband is most welcome in order to avoid disappointment if possible – no content filtering mechanism.
  7. In order to have a conducive learning environment for this program, there are roles and responsibility to be assumed by the organiser, trainer(s) and participants. Without clear understanding of our roles and responsibilities, the program will end up with unpleasant circumstances. 1) The roles and responsibilities for the ORGANISER coordinate the program - schedule, trainers, participants, venues program requirements - for TRAINERS (microphones, high resolution projector, white screen, 3-points power extension) - for PARTICIPANT (computer, wireless broadband/wireless card, program materials) - for venue ( classroom setup, power points, high speed WiFi network) resourceful and dedicated person-in-charge to ensure the smooth coordination 2) The roles and responsibilities for the TRAINER(S) communicate with the organiser - coordination (travelling, venue, material, participants) verify all requirements are met with organiser facilitate the participants to digest the materials evaluate the participants achievement 3) The roles and responsibilities for the PARTICIPANTS be serious to learn this material in this program - try not to be a joker in the class no disruption during this program - turn off mobile phone or put in silent mode be on time for every lesson - class will commence as scheduled get ready with program materials, your laptop is ON and internet access is working refer to USEFUL RESOURCES slide for references - terminology , foundation knowledge be proactive and think before you ask - be independent learner
  8. In this program, the participants are expected to conduct 5-minutes presentation before the class at the end of program. The presentation will be evaluated by the trainer(s) in terms of core message development and delivery creativity in slide design and slideware literacy oral communication and presentation competency effort to complete the activity 1) Select Presentation Topic Please consult with the trainer(s) for selection of presentation topic. The nature of this program, we welcome any topics within the following domains how to use antivirus, antispyware and antirootkit software how to use social media , clouds application , online tools how to use Windows-based utility tools , built-in Windows tools how to use web browsers, add-on for web browser 2) Select Slide Design Presentation slide must contains title slide, objectives slide, table of contents slide, intro to tool / application / software slide, features slide, benefit slide, how-to-use slide and conclusion slide. No limit on the number of slides. 3) Presentation Delivery This is a short presentation session. Therefore, the participant is expected to present the presentation content only. No welcome speech and question and answer session. We are not expected entertainment but the slide contents and presentation delivery.
  9. In this program, we are expected to be independent learners. Therefore, spoon-feed type of learners are not welcome in this program. Be proactive! The following are the useful resources : 1) General Resources Wikipedia - http://en.wikipedia.org/ eHow - http://www.ehow.com/ 2) Information Technology Resources Computer Glossary - http://whatis.techtarget.com/ HowStuffWorks (Computer) - http://computer.howstuffworks.com/ Microsoft Windows - http://windows.microsoft.com/en-US/windows/home Microsoft Safety & Security Center - http://www.microsoft.com/security/default.aspx Security Glossary - http://www.sans.org/security-resources/glossary-of-terms/ 3) Language Resources Local Language Translation Tool - http://www.citcat.com/ Dictionary.com - http://dictionary.reference.com/ Merriam-Webster - http://www.merriam-webster.com/dictionary.htm Please refer to this slide for terms and terminology networking and security concept Microsoft products
  10. Crucial Advice The world has dramatically moving in tremendous speed. New innovation and technological advancement require us to unlearn everything we knew. There is no such things as timeless knowledge in information technology domain. Some of our knowledge may be considered as outdated due to it can not be applied in today's reality. However, some of us may think otherwise. The following are three common dogma among us “I have PHD in IT!” In information technology, those who spend their time, attention and energy in specific technology are those who are adept in that technology. Paper qualification is not the parameter to address the specialization in technology. There is a case when the individual who do not possess any paper qualification is the expert of certain specific knowledge domain . “I’m to old for these stuffs” We are not product of circumstances but we are the product of our own choices. We have the choice to choose to learn new stuffs or the choice to be ignorance person. Therefore, we had to choose wisely. “It’s not related to my job scope” If we are exercise creative muscles in our brain, we will find how to make it relevant to our daily life routine. Think – make it relevant or make it irrelevant! Learning is a lifelong journey regardless who we are, what we have and how busy we are. Now lets start our journey to understand about cyber safety.