New generation of student cyber innovators showcase ideas to employers
Tech Partnership degree students from across the UK showcased their ideas last week to tackle the growing threat of cyberattacks.
Have your say: Digital User Experience (UX) Professional degree apprenticeship
The Tech Partnership has published the draft standard for the Degree Apprenticeship in Digital User Experience (UX), and is asking for input from employers and other interested parties. Deadline is 7 April.
Leeds City Region teachers CPD - last chance to book
"It looks amazing and just the type of thing to inspire kids and complement KS3." Free CPD sessions under way in Leeds City Region. Book now to secure places on remaining March sessions.
CPD for Teachers
The Tech Partnership has created a series of free online resources designed to help teachers to deliver the new computing curriculum, and to gain more knowledge about cyber security. The resources are accessible from the Tech Partnership Learning Hub.
Computing Curriculum modules
There are currently three e-learning modules available - introducing Computational Thinking, Algorithms and Principles of Programming. By working through the modules, teachers can gain confidence in the important concepts that underpin the Programmes of Study in Computing, and get ideas on how to explain them to students.
The resources were developed with support from technology company ARM, and in collaboration with e-learning specialists SpongeUK. They are suitable for teachers of all Key Stages.
Cyber Security modules
The Cyber Aware Teacher course and accreditation for primary and secondary school teachers was created in partnership with NAACE. This opportunity for continuing professional development (CPD) allows teachers to gain more knowledge about cyber security and share it with their students.
Each e-learning module has a set of lesson plans to support teachers to deliver these topics in the classroom. By completing the modules, teachers will have learned about vital areas of cyber security including:
- Password security
- CIA (confidentiality, integrity and availability) of information
- How to prioritise and protect information assets
- How to deal with malware and other threats
- and more