RSS

Monthly Archives: July 2012

How-To prepare for giving a quality course

How-To prepare for giving a quality course

.

Wordle Logo quality courseThis logo was created with Wordle. You are authorized to copy it by providing credits to this blog!

.


Tip: NO TIME? Read ONLY the bold! Check out also my Wordle-Logo where the main keywords are present.

This blog aims to help people who start giving courses and/or would like to give courses one day, but others would certainly also find some new and interesting information to help improving their difficult tasks!

Introduction: What’s our role as Teachers, Educators, Instructors?

. teacherThe roles of Teachers, Educators and Instructors are the following and especially in networked learning environments:

          1. First of ALL: being BEST informed about 21st Century Education, a MUST! I precise!!! Your Professional Development MUST be up-to-date!
          2. Motivating the learners to learn
          3. Amplifying the learned
          4. Learning to learn, meaning: teaching that way that learners are being able to learn without a teacher (in the future, after school)
          5. Educating the learners to get competencies
          6. Amplifying the creativity of the learners. The world needs creative thinking people!
          7. Preparing the learners to get used to the 21st Century tools and to use them well; such as: Social Media, Office programs, Blogging
          8. Give the learners and yourself a challenge, challenges are great to achieve very difficult goals…
          9. Bring in some psychological tricks from marketing to make your learners curious about a certain topic
          10. Learning about the psychology of the sale and marketing would be a big profit for teachers and  learners! Check also http://www.destinationcrm.com/articles/Editorial/Magazine-Features/The-Psychology-of-the-Sale-53701.aspx
          11. Sell your product, that’s your to learn Topic for the learners. Be a good salesman!
          12. Educating the learners to Internet-Safety and to the basics of IT-Security is becoming a Must in 21st Century as we use e-Learning and “Bring Your Own Device” (Hashtag for Twitter = #BYOD)!
          13. We should educate the learners to become good e-Citizen, Digital Citizen
          14. We as Teachers, Educators and Instructors need to have latest updated 21st Century knowledge in Education and with Education Tools! Our Professional Development (PD) is very important to achieve the daily tasks! Check Twitter to know more about (lots of discussions…) https://twitter.com/i/#!/search/Professional%20Development%20(PD)?q=Professional+Development+%28PD%29
          15. Trying to become a perfectionist to bring over best results, investing 300% of personal work to make sure to get out at least 80%…
          16. What Makes a Master Teacher
          17. What is a 21st century teacher?
          18. Be prepared for Connected Learning

.

===> The aim of art is to represent not the outward appearance of things, but their inward significance. -Aristotle <===

.


.

. 

KEYWORDS FOR THIS FREE COURSE AND WHAT YOU WILL LEARN:

.

comp6_e0===> 21st Century Skills <===, Proactive Thinking, 21st Century Tools, motivation, engaging your learners (students), Learning to learn, respect, e-Citizen, Digital-Citizen, competencies, Professional Development (PD), Life-Long-Learning Strategies, Curation, How-To create a Book on WordPress, Critical Thinking, Quality Publishing, How-To use the 21st Century Tools, The SUCCES of our learners (students) depends on our knowledge, WE as teachers, professors, educators, instructors can always improve, WE as professionals are not allowed to have a “lazy bone attitude”, WE as professionals need to protect the reputation of our profession by providing quality content, Accessibility, Blogging, Online-Safety, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

===> The roots of education are bitter, but the fruit is sweet. -Aristotle <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

Take your time, please! There are a lot of information for some to learn; take it easy 😉

.

.


The Main Skills of a 21st Century Learner and Teacher

The quest to be a modern teacher or student is in full swing. First though, figure out if you have these important 21st century skills.

  • Develop proficiency and fluency with the tools of technology;
  • Build intentional cross-cultural connections and relationships with others so to pose and solve problems collaboratively and strengthen independent thought;
  • Design and share information for global communities to meet a variety of purposes;
  • Manageanalyze, and synthesize multiple streams of simultaneous information;
  • Createcritiqueanalyze, and evaluate multimedia texts;
  • Attend to the ethical responsibilities required by these complex environments.

First of ALL, please check these images as on my point of view they show BEST:

.

21st Century Skills

Image credits: Edudemic

.

.

education 3.0

Image Credit to: http://www.teachthought.com/learning/8-characteristics-of-education30/

.


Is your Professional Development Up-To-Date?

I think that “Is your Professional Development Up-To-Date?” is the first question which you need to ask yourselves! You can ONLY give BEST and QUALITY courses when knowing about the latest knowledge in a 21st Century Education. But HOW TO know this?

That’s a question I am getting asked very often from Teachers and Teacher-Students around the world through my Social Media presence on Twitter and I must say what I see on a global base doesn’t make me feel really happy! Lots of teachers around the globe are tweeting, which I encourage to do as much as possible by joining ALSO a so called “PLN“, a “Personal Learning Network“, but ONLY a few shows a real understanding, competencies, about what they are doing; even the so called “Edu-Stars” in certain countries!

Here is my selection of  BEST articles and Curation on HOW TO find out:

.

.

Future Work Skills

Future Work Skills Needed (A MUST Read!)

.

===> You will find the full article (FREE Course) here Is My Professional Development Up-To-Date? <===

.


How-To prepare for giving a good course

.

programmerman2

How-To prepare for giving a good quality course? That’s a question I got asked often from teachers and students in real life as well on the Internet from my “Personal Learning Network” (Hashtag on Twitter = #PLN), so I decided to share my knowledge through this blog and also giving practical advice about my lived adventures of giving courses and my evolution for giving better quality courses… We all make mistakes (especially when newbies…) and we have to learn from them; learning by doing and also the will to make it more perfect by a “Life Long Learning-Strategy”!

.

.

I suggest to you to read first:  [Start] Text from the website Assessment for Learning.

Introduction to Assessment for Learning

This professional learning module is designed for those who are unfamiliar with the background to Assessment for Learning. It provides information which answers the key questions about Assessment for learning, proposes some key ideas and asks teachers to reflect on their own classroom practice.

Click on the links below to explore further:

. [End Text from Assessment of Learning] . .

First of all, for whatever writing stuff and teaching activities, make a serious preparation by “brainstorming“. Let it go, let it flow and don’t take care about the order how you write down the stuff who is in your brain; it must first come out and you can later review it and trying to organize it… Below, e.g. you will see my thoughts and “brainstorming” for a new online course, it’s handwritten and not yet completely organized, but it contains the main idea and keywords and that’s the most important anyway…

===> Update (August 05, 2012): I got told about my handwriting that it is :((( I agree, most of the keywords were written while walking and on places where I didn’t have a solid underground to write properly 😉 Check below and read more, so you will understand, but really read it all, my critics back, sorry 😉 <====

.

Preparing-a-course-handwritten-notes-28.0.2012.

So, once written down as handwritten, for me the best and quickest way, you should have a look on how you could create Topics out from your keywords and best is to create Topics with a question mark! Actually to create this blog ALL my ideas were first ONLY in my brain and I wanted to use the above handwritten “brainstorming” to explain, but then, in the middle of writing the blog I got new ideas, found new stuff through “curation” and “serendipity” gave me new “brain food” to continue with it… So I decided to show you also my handwritten “brainstorming” and “keywords” for this blog, see below”…

.

brainstorming-handwritten-prepare-for-a-quality-course

..

You may even see some keywords represented twice, don’t worry; better bringing in something twice than not at all! Keep your concentration on what your brain tells you to bring out… PS: I hope you can read my handwritten notes; I keep every time a paper sheet in the shirt pocket and so I write notes down where ever I get the ideas (in the bus, while walking in the nature…). No, no… The other place what you think, I don’t, at least one taboo place, LOL…

.


1st Step: get organized

.

MENDELEY

.

.We were talking already about brainstorming by handwritten notices and curation, but I didn’t give you practical examples apart from the handwritten brainstorming, so let’s do this now… I will give you FREE resources which you can use for a best organization for your research, as you need to research first to find best adapted articles to give your courses:

.

.

.

.

There are different ways to collect the necessary information such as collecting, curating information by your own but you can do this also on a collective way (might be good to do it together with your students/learners…):

.

Read more:

.

.

.


Why should I use questions?

.

1ibdy1vf6wghd-n05dgl-aigainformation1By providing Topics as a question that will make people curious and it will allow you also to bring in your “critical thinking” which is very important for a quality course. Use also empathy and “emotional intelligence” to get your learners engaged in your course…

.

.


What else should I consider?

.

programmerman2

.

.

To make your course interesting to your learners  propose them also to make curation about the Topic they will have to learn, so they will get involved into the learning process by researching their own related resources

.

 “A picture is worth a thousand words”, so use pictures and multimedia to enhance the learning. Create a Pictures and multimedia library to enhance your worksheets and blogs… Make this library also available to your students and ask them also to help for building up that library

Some learners would be curious and they might also want to read some books, so prepare also a list of books and eBooks which they could retrieve in the school library; here again: involve your learners also to help building up that list

.

A list of books which I have read and which I recommend to any teaching person could get found on my blog https://gustmees.wordpress.com/2012/04/14/21st-century-howto-guide-for-teaching-people/ at the bottom of the blog. The presented books are in English, French and German (as I am multilingual…).

Let your learners blog about what they learned and let them Peer review their own blogs, read more here to understand the idea behind it Peer to Peer U – A New Model of Learning.

.

Why connected learning?


Connected learning is a necessity in this digital age. More and more of our students learning, attention, and access to information is taking place outside of classrooms and through online networks and exchanges. Connected learning, however, can help them cultivate the skills necessary for fulfilling adult lives and careers and that formal instruction alone could not afford. Check complete article here Connected Learning.

.

Free blogging resources:

.

For young kids choose first a safe blogging service where the blogs will not be public and where ONLY you as teacher, parents and kids have access; this to educate them first about blogging, Internet-Safety, e-Reputation, e-Citizenship, Digital-Citizenship, the dangers of Internet! Once they have the necessary skills you can switch over to the normal blogging services…

.

Create your courses on a “living way“, make them interesting and alive to your learners, show a bit humor as well, show your own motivation and your passion for your job…

Related links:

.

.

While blogging and/or creating a website there are also some rules to respect such as the right color schemes, check out below:

.

ColorMatch

Click image to access the FREE Tool…

.

Summary: Matching your web site colors isn’t always as easy as it should be. Colors that look good to one person may look terrible to someone else. Color Match is a web site tool that helps you to easily find a perfect color scheme generated from a base color then displays the matching HTML color codes.

.

You want certainly also to create some day online courses, aren’t you? Please check the links below who give you advice:

.

Years ago I created a blog 21st Century How-To Guide For Teaching-People who might be also helpful to you, just check it, please…

.

Be also informed about 21st Century applications, subscribe to my daily published “The Knol Infos Daily” and my curation:
.

.

Accept critics from your learners, how? Create a multiple choice poll where your learners can vote about the quality of your course, accept their critics and discuss with them what about you could change, example below…

.The poll below is multiple choice, so go for it please to let me know your meaning about this blog. Thank you in advance…

.

 

.


Don’t Forget The Copyright Laws…

balancelaw
.
.
.
When working together with your students and when they are publishing content (even yourself…), please take care about the copyright, you are not allowed to copy&paste content from Internet and text from books from other persons without their knowledge and their permission…
.
.
.
.
When writing a book, creating a presentation for your students and when teaching your students and asking them to make researches (on Internet and on books) you are not allowed to copy and paste from other web sites, nor copy from an existing book, be conscious and responsible about that, please… Respect other author’s property… Here below a non exhaustive list of laws in different countries…
.
.
Please help making this list bigger, when knowing other resources let me know and I will include them. Thanks in advance…
.

Remember the 4 C’s

.

.

The Four C’s: Making 21st Century Education Happen features educational leaders from Envision Schools (California), Catalina Foothills School District (Arizona) and Virginia Beach City Public Schools (Virginia). Each school profile focuses on a unique aspect of how 21st century skills can help prepare students for college or a career. This film highlights both the student perspective, as well as how educators are using the 4 C’s to create a collaborative environment. A presentation of EdLeader21 [edleader21.com] and the Pearson Foundation [pearsonfoundation.org].

.


Is your blog, web site created for best accessibility?

.

What is Accessibility? 

.

sharing icon[Start Text from Online College] The worlds of web design and online learning are interconnected in many ways. As an instructional designer, I work to ensure that courses are effective not only in terms of online navigation and working links, but also in the presentation of meaningful content and interaction. Not all websites are created equal – some have much more helpful layouts and information than others – and it’s a similar situation with online courses. Just as web designers consider the “user experience” when creating new web pages, you should considerlearner experience” when creating new materials for your online course. [End Text from Online College]

.

I suggest to use this tool to check for best Accessibility: “Wave” WAVE is a free web accessibility evaluation tool provided by WebAIM. It is used to aid humans in the web accessibility evaluation process. Rather than providing a complex technical report, WAVE shows the original web page with embedded icons and indicators that reveal the accessibility of that page.

Check also my curation here:

.

.

One can respect best accessibility knowledge and still have forgotten something (so did I…), here a screenshot from my test of this blog, check below to find out. So I really love that free service as it gives me best results… But it’s ONLY a tool, there is still more to consider as giving a transcript for published videos as well as a header for videos, which I still have to include also, later…

.

Accessibility Test

Click image to enlarge…

.


Check the links on your publication(s)!

programmerman2Once your blog and/or website published check ALL the inserted links to control if they are working correctly (broken link?) and ALSO if they are pointing to the RIGHT address! One wrong letter included in the URL could lead to direct YOUR visitors to a malicious website, take care!!! This is called “Typo Squatting” or “URL Hijacking“!

The bad guys created already domain names using these mistakes to infect your devices with malware!

.

.

Learn more:

.


Are you prepared in case of a break of Internet connection?

.

attention triangle iconIt certainly happens once to each teacher, educator, course instructor that in the middle of the course the Internet connexion was broken, not a real fun when one based its course ONLY on Internet, isn’t it!? But when we are well prepared we can continue our course also without the Internet connexion if necessary! But, how?

.

There are several freeware programs on the software market which allow us to copy complete websites with all the present links in HTML format and we need then only to burn it to a CD or DVD. One of those programs is HTTrack which I have been using since long…

.

snap2_a

.

[Start Text from HTTrack]

HTTrack is a free (GPL, libre/free software) and easy-to-use offline browser utility.

It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site’s relative link-structure. Simply open a page of the “mirrored” website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.

WinHTTrack is the Windows 2000/XP/Vista/Seven release of HTTrack, and WebHTTrack the Linux/Unix/BSD release. See the download page. [End Text from HTTrack]

.

Once the whole web site with all the links and its content are downloaded you only need to burn it to a CD or DVD or maybe to a Memory-Stick, your choice…

.

.


And what about IT-Security + Internet-Safety in a world of BYOD?

.

programmerman2I see strange words in that Topic there, what are You talking about there, could You explain more, please!? That is probably the questions you have, isn’t it? Most of teachers, educators and instructors are using Apple and Mac related devices and are not used to IT-Security, vulnerabilities and don’t even see the necessity of IT-Security in a world ofBring Your Own Device“, called also “BYOD” and/or “BYOT” (Bring Your Own Technology)! But in 21st Century YOU should, remember your responsibility against your learners and the society, you are the ones who should give BEST education to your learners to prepare them for the working world and there IT-Security plays a BIG role!

.

Learn IT-Security

Click image above to access the FREE courses about basic IT-Security and “BYOD”…

.

.

[Start Text from http://www.infoworld.com/t/hacking/microsoft-hackers-aiming-cross-platform-vulnerabilities-199126?utm_source=dlvr.it&utm_medium=twitterMore and more hackers are targeting the same application vulnerabilities on Macs and Windows PCs as a way to reap the financial benefits of writing cross-platform malware.

The trend involves exploiting vulnerabilities that go as far back as 2009 in Office documents. Other cross-platform, third-party technologies favored by hackers include Java, Adobe PDF and Adobe Flash, Microsoft security researcher Methusela Cebrian Ferrer said Tuesday in the company’s Malware Protection Center blog. [End Text from InfoWorld]

.

As this course is already very big, so I won’t bring in more information in here, instead check out please the following links where you will find the necessary information with Tips and advice:

.

.

By checking the above courses you will remark also that I used different “techniques” to present them, even that one is made with “cartoons”. Why? There are different types of learners and different age of learners, so one course could attract more attention to a certain targeted group as another one! Think about that also, when you don’t see that wanted success so show people these different styles of presentation and ask them which one they would prefer and if necessary adapt your courses to that style also. You will sometimes need to create courses in different presentation styles…

.


Make a list of possible questions that learners could ask, be prepared!

.

aigainformation1For new teachers this will be the hardest part, for “oldies” that would be easy anyway as they know already the questions which would get asked even before the course starts, experience… But anyway, I suggest to create a FAQ‘s list online, on the internal server and/or an a server where your blog is hosted. Why? You would have at any time and from anywhere where ever you are (and your learners) access to it to revise it, very important! I suggest also that you ask your students to help for creating such a FAQ’s list, engage them! They will learn to learn

.

Creating a FAQ’s list, but how? I am not used to that, what is your advice? There are different ways to create a FAQ’s list:

.

This list will be a great tool for yourself who saves you a lot of time when once created, show it to your learners and every time you would have access also to it: So once a question is asked, switch to that resource on Internet and/or on a local server…

.

So, after evaluation of some Tweeps (Twitter user) of my “PLN“, here below my FAQ’s with questions and answers I got asked already…

.

Graphic 0149

Q01: I looked over your blog, and it has a ton of info. A bit overwhelming for folks new to your site.

A01: Overwhelming, YES when one doesn’t know how to learn 😉 I suggest to read it like a book! Bookmark it and read it by chapters…

  • Learning-to-Learn
  • I consider later creating a WordPress-Book and bring in the whole in different chapters… But first the whole knowledge must come out to not lose the main ideas and then later it should be split into different chapters where one can even go deeper…
  • Here the link on How-To create a WordPress-Book for people who are interested…
Q02: between the lines a bit wider? I use an iPad… A02: I use the free version of WordPress and I don’t have influence on how WordPress converts it to iPad visibility, sorry. On a Laptop it looks OK, as I every time take care to leave enough space between the lines and also between the paragraphs to make it an easy read…
Q03: Lot of stuff. I loved that role of educator. Handwritings little bit messy. You got point! A03: Concerning the handwriting, YES it looks mess as I wrote most down by walking without having a solid underground to write, but ideas must come out when one gets them 😉
Q04: Concerning IT-Security, I use a Mac and other Apple devices, I don’t need to take care about IT-Security!

A04: Hahaha, a BIG laugh for that 😉 What’s about updating your knowledge base? Check here please to find out the necessity to take care about IT-Security:

Q05: I would like also to create HTML Tables like You but I am not an HTML programmer, any Online Tool to help? A05: Hi; You don’t need to have a lot of knowledge of HTML to create tables, check below for Online HTML Table Generators:

Q06:testA06:testQ07:testA07:testQ08:testA08:testQ09testA09:testQ10:testA10:test

.


Engage your learners into the learning process, How-To?

.

Chat icon

Propose them also a Twitter Chat concerning a certain Topic of your courses, they will get engaged and motivated also. And they will get used to Social Media… But make a professional preparation for your Twitter Chat, I have seen strange “pseudo Chats” from big companies (I don’t name them…) and such Chat’s missed definitely their goal and didn’t reach the audience wanted…

My proposition for organizing an professional Twitter Chat is to follow #lrnchat, where here the link of their Blog who explains in detail on How-To http://lrnchat.wordpress.com/. Enjoy to follow this Twitter Chat, you will learn a lot through that Chat and about how to run a Twitter Chat, BEST Practice 😉

.

You may check also the Twitter Chat #edchat, what is it? Check http://edchat.pbworks.com/w/page/219908/FrontPage and watch also the video, please. And here an excellent explication from its co-founder (@tomwhitbyHow does #Edchat connect educators?

.

You may also create videos with your learners, this will engage them even more, check for best practice here Engage ME!

.

..

Related links:

.


Why all these mentioned topics and why is this blog so big?

.attention triangle icon

        1. Personally I want that my learners will get the best education and that they also have a certain freedom of working themselves for their own knowledge acquisition.
        2. Getting learners engaged in a course makes learning more valuable for them, they will learn even more as you might realize…
        3. By providing a blog with a lot of information it’s like a “book“, bookmark it and find your resources which you need also later; ONLY one address.
        4. In 21st  Century we need to have a lot of digital knowledge and digital skills
        5. Creating a quality course needs a lot of things to think about
        6. Use your blog to create a real website if there are a lot of information to bring over, like I do with most of my blogs… Once the whole information brought down in the blog you can later create small blogs who include ONLY a part of the published knowledge and you can even create a book with WordPress where you bring in the different chapters. This is also possible with WordPress, check here: Write a Book
        7. Thus meaning, create first your main blog (as I did here…) and later on you create the chapters as a new blog (a short one…) and create then a “WordPress Book” where you detail the single chapters mentioned in your main blog…
        8. You may have a look here to see how YOU can use a WordPress-Book as I did it with my FREE courses about IT-Security in French already http://gustmeesfr.wordpress.com/

.


Final word: did YOU find out where YOU have to improve!?

.

Chat iconBTW: I learned a lot while creating this blog (mostly a website now…) and I know that myself I have to improve, and YOU!? Life Long Learning that’s what ALL of us who are involved in Education need to do, isn’t it!? I created this blog to give some guidelines to young teachers and educators which whom I am in contact in real world as well as on Internet and who asked me what is best preparation for a giving quality course… As I gave courses for eight (8) years to youth, primary schools, teachers from primary schools and mostly to adult and seniors, so this above is my experience and also my learned while preparing this blog.

Advice: What you should know absolutely is when giving courses to adults and seniors is that they are not anymore used to learn, the brain is not anymore that much ready to accept new “input” to learn, they don’t have anymore practice with learning! They are out of the learning process and their brain is more directed to “profit”, as they are in the working world 😉 So use, the “profitpsychological to get them involved with pleasure again to learn. My own experience has shown me that you will need about +/- 4-6 hours before you get them used again to learn really, before the brain switches to “back to school“!

.

I will accept also any constructive critics as also some more resources from you dear reader, nobody is perfect, so you might have more knowledge as I have… I will update this blog when getting new knowledge and also when getting new valuable resources from my readers and they will get mentioned as well in this blog then (if wished so)…

.

.

.

.

And don’t forget it, been involved in Education as a teacher, educator, instructor is not only a job! It’s a passion, love it and share your motivation with your learners…

.

.

.

.

.

Image and icon sources (all FREE):

.

.
.
.



Site Meter


.
.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

Cyber-Hygiene: ICT Hygiene for Population, Education and Business

.

Learning IT-Security

.

Read, think, learn and share over Social Media… Security is everyone’s responsibility! We are ALL responsible for Internet’s future!

.


===> “Nothing in life is to be feared. It is only to be understood.” Marie Curie <===


Cyber-Hygiene: Hygiene for ICT in Education and Business, sounds strange isn’t it? I will tell you about what it is, try to convince you why we should use it and getting used to it, it’s similar as Hygiene in real world…


Cyber-Hygiene: ICT Hygiene for Population, Education and Business

.

.

Create your own banner at mybannermaker.com!Make your own banner at MyBannerMaker.com!


.
PANDA Security Report April-June 2012
Click image to enlarge for best view and click here for the link to the PANDA report [pdf]
 


. 

KEYWORDS FOR THIS FREE COURSE and what you will learn:

.

3fy5eowy8suq3-1dw42q-womannursegeraldg.01Proactive Thinking, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

. .


We need to compare real world with virtual world to understand

.

vdujwtjyx3uq-252anv-p2pnicubuculei01When we talk about Hygiene in real life we mean taking our daily shower or bath, washing often enough the hands, brushing the teeth minimum twice a day and we must talk also about health; thus meaning: visiting the doctor regularly to avoid serious problems, especially up from a certain age… Hygiene means taking care of our body to have best health and also the responsibility not to infect other people because of bad hygiene and bad health! We need also to be informed about how to stay health by following hygiene tips provided by Education and also by the “Health Ministry”, where we find folders on different places and in 21st Century also now on Internet… We get also taught on practices which are dangerous… That’s the awareness about…

.

Computer Viruses and Threats

Click image above to access video

.

In real world our car needs some maintenance and technical control to make sure that there is no danger for other participants in traffic (pedestrians and drivers…), so the same in virtual world. Our computer is the “virtual car” who is driving on the “Data Highway” (Internet), it needs maintenance and especially care about IT-Security and safety

.

Check also the video below and be surprised…

.

This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online.

.

.

.

So, when working with a computer and “BYOD” (Bring Your Own Device), where “BYOD” is not only computers but also tablets and smartphones, we need to take care of them, whatever “Operating System” (OS) is installed! Otherwise if these devices don’t have the right maintenance and the right “Hygiene” they could infect other Internet users; whereby “Cyber-Hygiene” means here:

.

Check the video below, who explains best.

.

Mikko Hypponen: Fighting viruses, defending the net

.

.


National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”

.

Check also what CIO.GOV An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

.

.

We need to build up a Cyber-Hygiene Culture/How-To

.

community-jpegWe need to build up a Cyber-Hygiene Culture for a more secure Internet and in this culture we are ALL involved as Internet is a global Network and we could help a lot by using the “Social Medias” to this by sharing our good practices with others…

.

.

Learn more about “Social Media and its Influence” here: .

.
This Cyber-Culture-Hygiene could get build up by the already mentioned propositions in this blog and also from IT-Security Experts and people with very good knowledge about IT-Security on an volunteer-base as I did and still will doing as described in my following blog: 
.
.

Why should we do this?

.

The Internet will attract more hackers

Infographics source

The above Infographic is only an estimation, but I agree with it that Cyber-Crime will become more important as already NOW TV’s with mini-computer have vulnerabilities http://www.scoop.it/t/securite-pc-et-internet?tag=TV, the rest you could imagine yourself! You should think also on the raise of “Bring Your Own Device” (Hashtag = #BYOD), so there are more and more people using their own devices on work, devices who could represent a danger and risks for the Network the are connecting to if not well secured; switch on your Critical-Thinking please! We need a Proactive-Thinking!

.

25% BYOD Infected

Check the complete slideshow here

.

See the facts in reports of 2012 by professional companies here: .

Don’t forget that a security by 100% doesn’t exist and that in the future any fridge, TV, and other technical domestic device will include a mini-computer who can connect to Internet! And any mini-computer is vulnerable… By knowing NOW the facts we see the reality, we are well informed NOW and our Critical Thinking should make us understand that Cyber-Hygiene is a MUST!

.

IT-Security Training in any company

Check the complete slideshow here

.


We need new ideas how this Cyber-Hygiene-Culture could get build up

.

Mausi-interrogatifSome say that it is very difficult to build up a Cyber-Hygiene-Culture and they are right with it because persons need first to understand the “invisible threats” and “attacks” which are present! I invite you to read my “curation” about it here:

.

.
By having read these articles you will be able to understand the risks by using your critical thinking and you will be able to understand also why it is necessary to teach and to use a “Cyber-Hygiene” and also to share your new acquired knowledge with others…

.

Concerning new ideas, I share already since 2003-2004 a lot of ideas on How-To a “Cyber-Hygiene” could get used, please check here:

.

.


Is this “Cyber-Hygiene” advice only a help for Education?

.

Mausi-loupeAs already mentioned above and in the title of this blog, not ONLY for Education, but also for business and of course more then ever NOW also for the whole population as the majority of people around the world are using Internet and that in the future there will be more people using Internet and this certainly more with smartphones than with computers!!!

.

.

.

 

.

.

Any device connected to Internet needs to get protected, so also smartphones! Check also some FREE Apps here:

.

.


How could Cyber-Hygiene get introduced to Business?

.

community-jpegI suggest that the IT-Admin  of each company organizes meetings with the companies staff where he and the managers explain to the staff the dangers of “BYOD” and “BYOT” and that the technical staff elaborates also a strong “User-Policy” whereby any employee needs to check his device on the end of the week for updates and security updates! This event will take only between 15 min-30 minutes and should be a MUST! IT-Admin could block access to devices who are not conform to those mentioned Policy! Employees will so not only get used to IT-Security and Awareness on work, but will know so also the reflexes for at home in private life and by knowing these reflexes they will certainly also tell their children at home as well and probably also their acquaintances

.

25% BYOD Infected

Check the complete slideshow here

.

Related links:

.

..

Check the complete slideshow here

.


How could Cyber-Hygiene get introduced to the Population?

.

awareness_bg_gallery_display

.

Above screenshot shows you how Singapore acted very well, learn more http://www.scoop.it/t/securite-pc-et-internet?tag=Singapore%20marks%20cyber%20security%20awarenessYou could do similar, a call to action 😉 Read the article to learn more…

.

Read also my blogs “Ideas for a more secure Internet“:

.


 Learning By Doing Through A Game

I invite YOU ALSO to play the game below, YOU will learn the basics of Cyber Security by ===>LEARNing By Doing <===, enjoy it 😉

.

VOVALABS CyberSecurity Game

Click the image, please, to access the game.

.

Check also the link below, please, where YOU find the details:


What say the professionals?

..

.

An article from Forbes (7/14/2012) that you must read: “The threat is serious, and the time to prepare for it is now. The increasingly sophisticated  tools to change the world are in everyone’s hands as new technologies are introduced, but they are in the hands of criminals. It’s the wild west in this new technological frontier and we will see who outsmarts whom.

.

Goodman’s big idea is to have ordinary citizens around the world leverage these very same technologies for good, and to play a more prominent role in maintaining the safety and security of themselves and other citizens.


What did we learn and what we MUST learn for a more secure Internet

.

.

WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01 .

    • We are ALL responsible for a secure Internet!
    • Automatic Windows Update must be enabled
    • For Apple devices: ALL the updates must be installed also!
    • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
    • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

===> I created a new Hashtag#FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

. Stay tuned for next free courses and tutorials 😉 .


Site Meter

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

. .

Learning IT-Security

.

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn…

.

.

.

Keywords for this free course:

.

motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.

.


WHAT is The Pedagogy Of Education 3.0 And WHY Should WE Embrace It?

To make it very short, WE SHOULD embrace it as “mLEARNing” has more positive aspects as negative ones, please check below…

.

Education 3.0 and the pedagogy of Mobile-Learning

 

Click here to go to the original article ===> http://fr.slideshare.net/jgerst1111/education-30-and-the-pedagogy-of-mobile-learning <===

.

Check also my “Curation” about Mobile-Learning (mLearning):

.


What Teachers + Educators should learn about BYOD

TeacherMost of articles, blogs and Tweets written by educational people are showing the advantages of “Bring Your Own Device” (Hashtag for Twitter = #BYOD) and they embrace very well BYOD, which I do also; but…

.

There are some more things to consider such as:

  • A BYOD Policy in the campus, school…
  • Prepare for BYOD in your organization, thus meaning: training for ALL!
  • MDM: Mobile Device Management
  • Internal IT-Security Infrastructure
  • A special IT-Security Insurance

Read my complete curation about BYOD it here: http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD where you will find also best articles and blogs who describe at it best what BYOD is as well as blogs from teachers who explain the benefits for Education…

===> Read and learn also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===

Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:

Responsability as eCitizen (Digital Citizen) for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?

.

.

Principals: did you also think about your Schools, University reputation!? Imagine that there will be a data-breach, the Press would talk about and your reputation then!? You need to get protected by having a strong BYOD-Policy and a strong IT-Security infrastructure, think on that please…

Read more:

.

.

===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST 😉 <=== 


Suggestions for a good BYOD Policy

.

BYOD

.

..

.

We need to know and to understand first that “Nobody Is Perfect”, no OS (Operating System) is 100% secure and there are vulnerabilities present, which need to get updated asap! This is not ONLY the IT-Admin’s task and responsibility, but our own responsibility!

.

.

Read also:

.

 

 

BYOD is becoming a prevalent Information Security and IT Focus

Image source

..

.

===> There is a need to for a healthy Cyber-Culture, a Cyber-Hygiene introduction for a more secure Internet! Read more: Cyber-Hygiene <===

.


Why our responsibility?

.

Question mark iconThe IT-Admin’s responsibility is to keep secure the School’s Network and to keep it safe from Malware and attacks; if it’s a good IT-Admin with good IT-Security knowledge he will even block infected devices to access the school network, that’s his good right! So imagine that you give courses with BYOD Infrastructure and some devices are infected and the IT-Admin blocks those, your course couldn’t get held as not all of your learners can access the school network, not funny at all that situation, isn’t it?

.

Check the complete slideshow here

My suggestions to prevent this is to organize a weekly security day in school for any class where the learners together with the teachers control their devices for latest updates and antivirus updates to make sure that they all are secure and don’t represent a danger and risks for the school network! Check the image below and read also the complete report from McAfee…

.

Total Mobile Malware Samples in the Database

McAfee Threats Report: Second Quarter 2012 

I suggest also that some teachers with good IT-Security knowledge create a “Security Club” in school where they train the learners about “IT-Security” to become “Security Scouts“, people with good IT-Security knowledge who can help others to stay secure. You will build up a secure community and the “Security Scouts” will be proud about their title and their responsible function. YES, responsibility that’s the right word which needs to get spread! In 21st Century Learning IT-Security and Internet-Safety are a MUST and should get maintained! Give a help to create the new 21st Century Heroes, the “IT-Security Scouts“!

Find below my blogs and other resources on How-To:

.

  1. IT-Security Scouts
  2. 5 minutes tutorials on How-To get smart about IT-Security
  3. BYOD in education–TechNet Jump Start training to help your planning
  4. MDM: Mobile Device Management
  5. 6 Keys To A Flexible MDM Strategy
  6. BYOD-Security-Becomes-a-Pervasive-Issue
  7. Is BYOD a Nightmare for IT-Security
  8. Apple, Mac, iOS4, iPad, iPhone and (in)security…
  9. UK govt encourages insurers to reward good IT security

The Internal Security of the School Network

.

Attention iconText from Higher Education-Data Breach [Start]Institutions of higher learning need to think like businesses AND consider the enormous financial and reputational dangers of a data breach. Unlike many businesses, colleges and universities are under constant attack, from within as well as without. [End]

A School Network has also data bases where the information of the learners are stored and which needs to kept private! Most countries have even laws about Privacy where the head of school could get taken responsible by court for a data breach, thus meaning: the principal would face severe punishment by law if the private data of the school staff and the learners would be made public by a data breach due to no IT-Security Policy in School’s.

Best way is that the Principal and his staff talks together with the IT-Admin on How-To build up best protection, especially when using BYOD, as BYOD could be dangerous and security risks are present in the School NetworkThere is also to consider supplement costs because of new staff for IT-Security and the costs of the whole IT-Security Infrastructure…

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

UneducatedEmployees_IG_554

Click image to go to source and to learn more…

.

Read also and stay always informed about news of Cybersecurity:

.


Tips for the IT-Admin

.

Chat iconLot of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

.

.

.


Recommendations

.

sharing iconIt is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!

Parents could help their kids to achieve a weekly security task, reminding them about to do it by rewarding them and also by “punishing” them with a “Task-List“, check my FREE Online Google docs here:

.

Worksheets on Google Docs: 


What did we learn and what we must follow and respect!

..

 WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01

.

        • Automatic Windows Update must be enabled
        • For Apple devices: ALL the updates must be installed also!
        • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
        • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next course and tutorial…

.


Search Engine Submission – AddMe

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,