Resources - Teaching Computer Courses

5 Coding Resources for Classrooms and Courses
·         The following resources should give teachers a great starting point for integrating code into the classroom. They are designed specifically to engage students with the processes of coding, requiring the teacher to be a facilitator and learner rather than a master coder. For the most part, tutorials have varying skill levels, so all students are working towards something uniquely challenging to them.

Why Phishing Works And How To Avoid Becoming a Victim
·        Phishing is a form of social engineering that attempts to steal sensitive information. An attacker’s goal is to compromise systems to obtain usernames, passwords, and other account and/or financial data. They most frequently accomplish phishing attacks via email. The attacker sends crafted emails to people within an organization.

10 Tips on How to Avoid a Phishing Scam
·        It’s 2013, what can you really do with two dollars? Maybe buy a pack of gum, snag two cheeseburgers off the dollar menu, create and host a phishing scam…wait, what?
·        Yes, it’s true. Two single dollar bills is all it costs for a hacker to create an email pretending to be from your trusted retailer or bank, asking for your login details, and instantaneously obtaining your confidential information. With over 260 million phishing emails sent every single day, there is a pretty good chance that one of these may land in your inbox. So, how do you make sure you aren’t one of the many to fall victim to a phishing or spoofing attack? We have identified 10 tips below to help defend against one

Password Do’s and Don’ts
·         Here are a few tips for creating strong passwords. Take a moment to review these, and consider strengthening some of your passwords if they fall short.

Web 2.0 Summary

Google Docs

10 Awesome Things You Can do With PowerPoint



No comments:

Post a Comment