CPE Credit Hours: 12
- Free, one-year TCEA membership for each participant ($49 value)
- TCEA digital badge
- TCEA certificate sent via email upon course completion
If you have any questions or need further information about registration or course content, please fill out this short form.
In this online, self-paced course, you will explore this important aspect of using computers and digital networks. In your role as an educator and/or campus technology support, you have access to data and systems that others may target, so it’s important that you understand the threats and risks to data. You will learn about tools used to secure systems and how to avoid attempts to trick you.
Why Learn with TCEA?
- Our courses are streamlined for efficient and lasting learning.
- We share ideas and resources that you won’t be able to find anywhere else.
- We also offer ideas and techniques based on years of experience in professional development, integrating educator feedback to always meet the needs of course participants.
Self-Paced Online Course
Network Security is a self-paced, online program. Participants can begin anytime and go at their own speed throughout the program.
Upon enrollment, you will receive a program invitation email from TCEA’s learning management system that will give you access to the self-paced course. Within the course, you will find modules that must be moved through in sequential order. The modules can be found below.
|Module 1||Defining Security||In this module, you will explore why it is important to maintain network security and best practices in safeguarding paper transcripts, devices, network access, and other digital records. You will explore the different types of cyber attacks, including brute force, side channel, and phishing.|
|Module 2||Securing Networks||Whether you are securing an enterprise network in a school or the consumer network in your own home, there are strategies and tools commonly used to secure devices and networks. In this module, you will learn about those tools and strategies.|
|Module 3||Proving Your Identity||One of the most important steps network managers take to maintain security is to ensure only authorized individuals are able to log on to the network. Passwords are, of course, the most familiar strategy for proving one’s identity. In this module, you will learn about methods for making passwords even more secure, as well as other ways to secure accounts.|
|Module 4||Avoiding Phishing||The easiest way to gain unauthorized access to data or a system is to trick a user into installing malware or revealing their credentials. Phishing is the term used to describe these strategies, which are surprisingly effective. After learning about how phishing works, you will be less likely to fall for its tricks.|
|Module 5||Building Good Habits||Network security is a multifarious and dynamic aspect of computing. In this final module, you will see how comprehensive security plans are organized and also explore how you can promote network security in different environments.|