Transform learning by introducing students to SPIKE™ Prime, a versatile robotics set that builds confidence, critical thinking, and problem-solving skills. This course helps educators activate engaged learning in the classroom and foster curiosity through hands-on STEAM experiences. Equip your students with the tools and mindset to explore, create, and innovate as they complete exciting SPIKE™ Prime activities.
To participate in the course the following is required:
- One device with the programming app. Download the programming app for iOS, Chrome, Windows 10, and Android here.
- One device for online instruction
- LEGO® Education SPIKE™ Prime (45678)
What You’ll Learn
- Build a solid foundation in building and programming with SPIKE™ Prime
- Explore the language of LEGO Technic building elements
- Learn the basics of working with the Hub
- Connect to the Hub and write your first program
- Build a rhino robot and program it for the five basic movements
- Construct attachments for the Force, Color, and Distance sensors
Learn with TCEA?
- Our courses are streamlined for efficient and lasting learning.
- We share ideas and resources that you won’t be able to find anywhere else.
- We also offer ideas and techniques based on years of experience in professional development, integrating educator feedback to always meet the needs of course participants.
Self-Paced Online Course
SPIKE Prime Robotics is a self-paced, online program. Participants can begin anytime and go at their own speed throughout the program.
Upon enrollment, you will receive a program invitation email from TCEA’s learning management system that will give you access to the self-paced course. Within the course, you will find modules that must be moved through in sequential order.
Course Modules
Defining Security: In this module, you will explore why it is important to maintain network security and best practices in safeguarding paper transcripts, devices, network access, and other digital records. You will explore the different types of cyber attacks, including brute force, side channel, and phishing.
Securing Networks: Whether you are securing an enterprise network in a school or the consumer network in your own home, there are strategies and tools commonly used to secure devices and networks. In this module, you will learn about those tools and strategies.
Proving Your Identity: One of the most important steps network managers take to maintain security is to ensure only authorized individuals are able to log on to the network. Passwords are, of course, the most familiar strategy for proving one’s identity. In this module, you will learn about methods for making passwords even more secure, as well as other ways to secure accounts.
Avoiding Phishing: The easiest way to gain unauthorized access to data or a system is to trick a user into installing malware or revealing their credentials. Phishing is the term used to describe these strategies, which are surprisingly effective. After learning about how phishing works, you will be less likely to fall for its tricks.
Building Good Habits: Network security is a multifarious and dynamic aspect of computing. In this final module, you will see how comprehensive security plans are organized and also explore how you can promote network security in different environments.