How can we maximise the impact of tech interventions in schools?
Head of TechFuture Karine Barsam looks at the latest research on engaging young people in STEM, and how programme variety could be the key success.
Job vacancy: Communications and Marketing Director
A job opportunity has become available at the Tech Partnership for the role of Communications and Marketing Director. Closing date for applications is Tuesday 23 May.
TechFuture Girls club numbers up 70% in 3 years
Over 19,000 girls have explored tech education and careers through the Tech Partnership’s learning resource TechFuture Girls, a figure that has almost doubled in the last 3 years.
CPD for Teachers
The Tech Partnership has created a series of free online resources designed to help teachers to deliver the new computing curriculum, and to gain more knowledge about cyber security. The resources are accessible from the Tech Partnership Learning Hub.
Computing Curriculum modules
There are currently three e-learning modules available - introducing Computational Thinking, Algorithms and Principles of Programming. By working through the modules, teachers can gain confidence in the important concepts that underpin the Programmes of Study in Computing, and get ideas on how to explain them to students.
The resources were developed with support from technology company ARM, and in collaboration with e-learning specialists SpongeUK. They are suitable for teachers of all Key Stages.
Cyber Security modules
The Cyber Aware Teacher course and accreditation for primary and secondary school teachers was created in partnership with NAACE. This opportunity for continuing professional development (CPD) allows teachers to gain more knowledge about cyber security and share it with their students.
Each e-learning module has a set of lesson plans to support teachers to deliver these topics in the classroom. By completing the modules, teachers will have learned about vital areas of cyber security including:
- Password security
- CIA (confidentiality, integrity and availability) of information
- How to prioritise and protect information assets
- How to deal with malware and other threats
- and more