After completion of this course, the participant should be able to:
- Outline the advanced cyber-attacks that may be encountered while teaching online and apply the appropriate mitigations.
- Employ various techniques to protect data created and processed by learning institutions from alteration, loss, and unauthorised access.
- Apply advanced techniques in online communication, personal security, and device security.
- Appraise the benefits of emerging technologies in digital learning and how to use them securely.