{"id":22376,"date":"2024-05-13T13:16:51","date_gmt":"2024-05-13T17:16:51","guid":{"rendered":"https:\/\/knowledgeflow.org\/?post_type=resource&#038;p=22376"},"modified":"2024-07-12T17:20:54","modified_gmt":"2024-07-12T21:20:54","slug":"external-resources-with-links","status":"publish","type":"resource","link":"https:\/\/knowledgeflow.org\/es\/resource\/external-resources-with-links\/","title":{"rendered":"Recursos externos y enlaces \u00fatiles"},"content":{"rendered":"<style>.kb-row-layout-id22376_53d03d-d0 > .kt-row-column-wrap{align-content:center;}:where(.kb-row-layout-id22376_53d03d-d0 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:center;}.kb-row-layout-id22376_53d03d-d0 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-lg, 4rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id22376_53d03d-d0 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id22376_53d03d-d0 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-none, 0rem );row-gap:var(--global-kb-gap-none, 0rem );grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id22376_53d03d-d0 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id22376_53d03d-d0 alignfull has-theme-palette9-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-row kt-mobile-layout-row kt-row-valign-middle kb-theme-content-width\">\n<style>.kadence-column22376_a6e334-ce > .kt-inside-inner-col{display:flex;}.kadence-column22376_a6e334-ce > .kt-inside-inner-col{padding-top:0px;padding-bottom:0px;}.kadence-column22376_a6e334-ce > .kt-inside-inner-col,.kadence-column22376_a6e334-ce > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column22376_a6e334-ce > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column22376_a6e334-ce > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column22376_a6e334-ce > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column22376_a6e334-ce{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_a6e334-ce{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_a6e334-ce > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column22376_a6e334-ce > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column22376_a6e334-ce{text-align:left;}.kadence-column22376_a6e334-ce{position:relative;}@media all and (max-width: 1024px){.kadence-column22376_a6e334-ce > .kt-inside-inner-col{padding-top:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-md, 2rem);flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column22376_a6e334-ce{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_a6e334-ce{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_a6e334-ce > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column22376_a6e334-ce{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_a6e334-ce{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_a6e334-ce > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column22376_a6e334-ce > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media only screen and (min-width: 1025px) {n .kadence-column22376_a6e334-ce {n   align-items:flex-end;n }n}<\/style>\n<div class=\"wp-block-kadence-column kadence-column22376_a6e334-ce kb-section-dir-vertical inner-column-1\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading22376_159290-be, .wp-block-kadence-advancedheading.kt-adv-heading22376_159290-be[data-kb-block=\"kb-adv-heading22376_159290-be\"]{max-width:586px;line-height:1.2;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22376_159290-be mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22376_159290-be[data-kb-block=\"kb-adv-heading22376_159290-be\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22376_159290-be img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22376_159290-be[data-kb-block=\"kb-adv-heading22376_159290-be\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading22376_159290-be wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading22376_159290-be\">Comprehensive External Resources and Helpful Links<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22376_419f4a-c6, .wp-block-kadence-advancedheading.kt-adv-heading22376_419f4a-c6[data-kb-block=\"kb-adv-heading22376_419f4a-c6\"]{max-width:586px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22376_419f4a-c6 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22376_419f4a-c6[data-kb-block=\"kb-adv-heading22376_419f4a-c6\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22376_419f4a-c6 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22376_419f4a-c6[data-kb-block=\"kb-adv-heading22376_419f4a-c6\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22376_419f4a-c6 wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading22376_419f4a-c6\">Discover our collection of Comprehensive External Resources and Helpful Links, designed to provide you with valuable information and tools across various topics. Whether you&#8217;re seeking expert advice, educational materials, or practical tips, our curated selection ensures you have access to the best resources available. Enhance your knowledge and stay informed with our extensive library of trusted links.<br><br>Learn more ways to keep safe online! <br>Check out our available courses down below.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns22376_4805c5-3e{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns22376_4805c5-3e .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns22376_4805c5-3e\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;border-top-color:var(--global-palette2, #2B6CB0);border-top-style:solid;border-right-color:var(--global-palette2, #2B6CB0);border-right-style:solid;border-bottom-color:var(--global-palette2, #2B6CB0);border-bottom-style:solid;border-left-color:var(--global-palette2, #2B6CB0);border-left-style:solid;}.wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button:focus{color:var(--global-palette9, #ffffff);background:var(--global-palette1, #3182CE);border-top-color:#444444;border-top-style:solid;border-right-color:#444444;border-right-style:solid;border-bottom-color:#444444;border-bottom-style:solid;border-left-color:#444444;border-left-style:solid;}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button{border-top-color:var(--global-palette2, #2B6CB0);border-top-style:solid;border-right-color:var(--global-palette2, #2B6CB0);border-right-style:solid;border-bottom-color:var(--global-palette2, #2B6CB0);border-bottom-style:solid;border-left-color:var(--global-palette2, #2B6CB0);border-left-style:solid;}}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button:focus{border-top-color:#444444;border-top-style:solid;border-right-color:#444444;border-right-style:solid;border-bottom-color:#444444;border-bottom-style:solid;border-left-color:#444444;border-left-style:solid;}}@media all and (max-width: 767px){.wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button{border-top-color:var(--global-palette2, #2B6CB0);border-top-style:solid;border-right-color:var(--global-palette2, #2B6CB0);border-right-style:solid;border-bottom-color:var(--global-palette2, #2B6CB0);border-bottom-style:solid;border-left-color:var(--global-palette2, #2B6CB0);border-left-style:solid;}.wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn22376_ef09d4-36.kb-button:focus{border-top-color:#444444;border-top-style:solid;border-right-color:#444444;border-right-style:solid;border-bottom-color:#444444;border-bottom-style:solid;border-left-color:#444444;border-left-style:solid;}}<\/style><a class=\"kb-button kt-button button kb-btn22376_ef09d4-36 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/cybersafetyacademy.org\/?redirect=0\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"kt-btn-inner-text\">View All Courses<\/span><\/a><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column22376_5359f6-88 > .kt-inside-inner-col,.kadence-column22376_5359f6-88 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column22376_5359f6-88 > .kt-inside-inner-col{column-gap:0px;}.kadence-column22376_5359f6-88 > .kt-inside-inner-col{flex-direction:column;}.kadence-column22376_5359f6-88 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column22376_5359f6-88 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column22376_5359f6-88{text-align:left;}.kadence-column22376_5359f6-88{position:relative;}@media all and (max-width: 1024px){.kadence-column22376_5359f6-88 > .kt-inside-inner-col{padding-right:0px;flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column22376_5359f6-88 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column22376_5359f6-88 kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.kb-image22376_29583e-7b:not(.kb-image-is-ratio-size) .kb-img, .kb-image22376_29583e-7b.kb-image-is-ratio-size{padding-top:0px;padding-bottom:0px;}.kb-image22376_29583e-7b .kb-image-has-overlay:after{opacity:0.3;}.kb-image22376_29583e-7b img.kb-img, .kb-image22376_29583e-7b .kb-img img{object-position:50% 38%;}@media all and (max-width: 1024px){.kb-image22376_29583e-7b:not(.kb-image-is-ratio-size) .kb-img, .kb-image22376_29583e-7b.kb-image-is-ratio-size{padding-top:var(--global-kb-spacing-md, 2rem);padding-bottom:0px;}}<\/style>\n<figure class=\"wp-block-kadence-image kb-image22376_29583e-7b kb-image-is-ratio-size\"><div class=\"kb-is-ratio-image kb-image-ratio-square\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/07\/woman-writing-external-resources.png\" alt=\"woman looking up external resources\" class=\"kb-img wp-image-26834\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/07\/woman-writing-external-resources.png 500w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/07\/woman-writing-external-resources-300x300.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/07\/woman-writing-external-resources-100x100.png 100w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/07\/woman-writing-external-resources-150x150.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/07\/woman-writing-external-resources-12x12.png 12w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/div><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id22376_6a837b-61 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id22376_6a837b-61 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id22376_6a837b-61 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id22376_6a837b-61 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id22376_6a837b-61 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id22376_6a837b-61 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id22376_6a837b-61 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column22376_ffee51-75 > .kt-inside-inner-col,.kadence-column22376_ffee51-75 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column22376_ffee51-75 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column22376_ffee51-75 > .kt-inside-inner-col{flex-direction:column;}.kadence-column22376_ffee51-75 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column22376_ffee51-75 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column22376_ffee51-75{position:relative;}@media all and (max-width: 1024px){.kadence-column22376_ffee51-75 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column22376_ffee51-75 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column22376_ffee51-75\"><div class=\"kt-inside-inner-col\">\n<div id=\"tablepress-5-scroll-wrapper\" class=\"tablepress-scroll-wrapper\">\n<table id=\"tablepress-5\" class=\"tablepress tablepress-id-5 tablepress-responsive\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><span style=\"color:#FFFFFF;\"><strong>Title<\/strong><\/span><\/th><th class=\"column-2\"><span style=\"color:#FFFFFF;\"><strong>Description<\/strong><\/span><\/th><th class=\"column-3\"><span style=\"color:#FFFFFF;\"><strong>Content<\/strong><\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">\u00a0#CyberAMA KnowledgeFlow Video\u00a0<\/td><td class=\"column-2\">In this \u201cAsk Me Anything\u201d format we let the kids lead the discussion! Topics discussed included online gaming safety, handling online bullying, how to secure accounts with strong passwords and how to be #UnHackable.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.youtube.com\/watch?v=eeTWXoYnj9U&#038;t=5s&#038;ab_channel=KnowledgeFlowCybersafetyFoundation\" target=\"_blank\" rel=\"noopener\">https:\/\/www.youtube.com\/watch?v=eeTWXoYnj9U&amp;t=5s&amp;ab_channel=KnowledgeFlowCybersafetyFoundation<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">\u2018The Triumph of Doubt\u2019 digs into how dark money fuels mistrust of science<\/td><td class=\"column-2\">Former Obama and Clinton official David Michaels details how corrupt science becomes public policy \u2014 and where it\u2019s happening today. The Triumph of Doubt traces the ascendance of science-for-hire in American life and government, from its origins in the tobacco industry in the 1950s to its current manifestations across government, public policy, and even professional\u2026<\/td><td class=\"column-3\"><a href=\"https:\/\/stateimpact.npr.org\/pennsylvania\/2020\/04\/05\/the-triumph-of-doubt-digs-into-how-dark-money-fuels-mistrust-of-science\/\" target=\"_blank\" rel=\"noopener\">https:\/\/stateimpact.npr.org\/pennsylvania\/2020\/04\/05\/the-triumph-of-doubt-digs-into-how-dark-money-fuels-mistrust-of-science\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">\u201cFake News\u201d Is Not Simply False Information: A Concept Explication and Taxonomy of Online Content<\/td><td class=\"column-2\">This journal article explains how online \u201cfake news\u201d can be classified into 7 categories for developing automatic detections of false information.<\/td><td class=\"column-3\"><a href=\"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/0002764219878224\" target=\"_blank\" rel=\"noopener\">https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/0002764219878224<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">5 Steps for Vetting a News Source<\/td><td class=\"column-2\">The News Literacy Project explains the 5 steps you can take to vet a news source for signs of credibility. The News Literacy Project has also put this information into an excellent downloadable PDF.<\/td><td class=\"column-3\"><a href=\"https:\/\/newslit.org\/educators\/resources\/is-it-legit\/\" target=\"_blank\" rel=\"noopener\">https:\/\/newslit.org\/educators\/resources\/is-it-legit\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">A guide to life online for post secondary students<\/td><td class=\"column-2\">A guide to life online for post secondary students \u2013 Provided by Media Smarts<\/td><td class=\"column-3\"><a href=\"https:\/\/mediasmarts.ca\/sites\/default\/files\/guides\/on_the_loose.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/mediasmarts.ca\/sites\/default\/files\/guides\/on_the_loose.pdf<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">A Guide to Privacy and Access to Information in Ontario Schools<\/td><td class=\"column-2\">This guide provides answers to common questions about privacy and access to information in the school system. The goal is to provide Ontario\u2019s school board officials and education professionals with an understanding of their rights and obligations in relation to the privacy of, and access to, students\u2019 personal information.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.ipc.on.ca\/education\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ipc.on.ca\/education\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">A systematic review on fake news research<\/td><td class=\"column-2\">Although fake news creation and consumption are mutually related and can be changed to one another, this review indicates that a significant amount of research has primarily focused on news creation. To mitigate this research gap, a comprehensive survey of fake news research, conducted in the fields of computer and social sciences, through the lens\u2026<\/td><td class=\"column-3\"><a href=\"https:\/\/journals.plos.org\/plosone\/article?id=10.1371\/journal.pone.0260080\" target=\"_blank\" rel=\"noopener\">https:\/\/journals.plos.org\/plosone\/article?id=10.1371\/journal.pone.0260080<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">AAPI &#8211; Quebec\u00a0<\/td><td class=\"column-2\">This kit from the Information Access and Privacy Association of Quebec includes the teacher\u2019s notebook and the student\u2019s workbook. The teacher\u2019s notebook contains the objectives of the 10 activities, their approximate duration, the corrected activities and suggestions for the animation.<\/td><td class=\"column-3\"><a href=\"http:\/\/aapi.qc.ca\/troussepedagogique\/trousse-pedagogique\/\" target=\"_blank\" rel=\"noopener\">http:\/\/aapi.qc.ca\/troussepedagogique\/trousse-pedagogique\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Activities for distance learning<\/td><td class=\"column-2\">Activities for distance learning \u2013 Provided by Common Sense Media<\/td><td class=\"column-3\"><a href=\"https:\/\/www.commonsense.org\/education\/articles\/quick-digital-citizenship-activities-for-k-5-distance-learning\" target=\"_blank\" rel=\"noopener\">https:\/\/www.commonsense.org\/education\/articles\/quick-digital-citizenship-activities-for-k-5-distance-learning%20%20<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Activity sheets for kids<\/td><td class=\"column-2\">Activity sheets for kids \u2013 Provided by the Office of the Privacy Commissioner of Canada<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/t-v\/activ\/index\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/t-v\/activ\/index\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">AIC &#8211; Quebec<\/td><td class=\"column-2\">Check out what the Commission for Access to Information is doing to increase youth privacy in Quebec.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cai.gouv.qc.ca\/jeunes\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cai.gouv.qc.ca\/jeunes\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Band runner<\/td><td class=\"column-2\">Band runner \u2013 A fun game that puts your knowledge about online safety to the test by asking you to help characters make safe choices online.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.thinkuknow.co.uk\/8_10\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.thinkuknow.co.uk\/8_10\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Be Internet Awesome With Google\u00a0<\/td><td class=\"column-2\">This complete package from Google includes an engaging game, classroom curriculum and the Be Internet Awesome pledge. A great place for teachers and parents to start teaching kids about online safety. The Interland game is also available in French.<\/td><td class=\"column-3\"><a href=\"https:\/\/beinternetawesome.withgoogle.com\/en_us\/\" target=\"_blank\" rel=\"noopener\">https:\/\/beinternetawesome.withgoogle.com\/en_us\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Become a Cybersecurity Pro<\/td><td class=\"column-2\">If you are interested in pursuing a career in cybersecurity, here\u2019s your go-to guide to salaries, job markets, skills, and common interview questions.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.techrepublic.com\/article\/cheat-sheet-how-to-become-a-cybersecurity-pro\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.techrepublic.com\/article\/cheat-sheet-how-to-become-a-cybersecurity-pro\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">BuildingU Resources<\/td><td class=\"column-2\">Check out BuildingU\u2019s resources for high school students. Find funding options, internship opportunities and educational programs for high school students from around the globe.<\/td><td class=\"column-3\"><a href=\"https:\/\/building-u.com\/resources\/\" target=\"_blank\" rel=\"noopener\">https:\/\/building-u.com\/resources\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">CAFC: Fraud Prevention Month<\/td><td class=\"column-2\">For Fraud Prevention Month, the Canadian Anti-Fraud Centre has published important and helpful information about various scams and how to spot them.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.antifraudcentre-centreantifraude.ca\/features-vedette\/2021\/03\/fraud-prevention-fraude-eng.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/www.antifraudcentre-centreantifraude.ca\/features-vedette\/2021\/03\/fraud-prevention-fraude-eng.htm<\/a><\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">Canada Learning Code<\/td><td class=\"column-2\">Canada Learning Code allows children and adults to learn how to code. Canada Learning Code also provides the knowledge for educators to teach coding to their students. Sign up for workshops, programs, and classes to get started!<\/td><td class=\"column-3\"><a href=\"https:\/\/www.canadalearningcode.ca\/learning-with-us\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.canadalearningcode.ca\/learning-with-us\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">Canadian Anti-Fraud Centre<\/td><td class=\"column-2\">Visit the Canadian Anti-Fraud Centre (CAFC) site to learn about ongoing scams and how to protect yourself. If you or someone you know gets scammed, report it to the CAFC.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.antifraudcentre-centreantifraude.ca\/index-eng.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/www.antifraudcentre-centreantifraude.ca\/index-eng.htm<\/a><\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">CISCO NetAcademy<\/td><td class=\"column-2\">Cybersecurity courses developed by Cisco, from cloud and network security to cybersecurity essentials and IoT fundamentals.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.netacad.com\/courses\/cybersecurity\" target=\"_blank\" rel=\"noopener\">https:\/\/www.netacad.com\/courses\/cybersecurity<\/a><\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">CISCO Threat Builders<\/td><td class=\"column-2\">Are you ready to join the defense against cyberthreats? Play this game to avoid threats and join the CISCO Bureau of Cyber Intelligence!<\/td><td class=\"column-3\"><a href=\"https:\/\/security.umbrella.com\/threat-busters-game\" target=\"_blank\" rel=\"noopener\">https:\/\/security.umbrella.com\/threat-busters-game<\/a><\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">Code like a girl<\/td><td class=\"column-2\">Code like a girl \u2013 A space that celebrates Women in Technology and aims at reducing the gender gap in cybersecurity and tech careers.<\/td><td class=\"column-3\"><a href=\"https:\/\/code.likeagirl.io\/tagged\/cybersecurity\" target=\"_blank\" rel=\"noopener\">https:\/\/code.likeagirl.io\/tagged\/cybersecurity<\/a><\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">Common Sense Education\u00a0<\/td><td class=\"column-2\">At-home parent resources and classroom curriculum resources for all grades. This great source covers topics ranging from media sense to cyberbullying to privacy and security.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.commonsense.org\/education\/digital-citizenship\/curriculum\" target=\"_blank\" rel=\"noopener\">https:\/\/www.commonsense.org\/education\/digital-citizenship\/curriculum<\/a><\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">CTRL-F-Teaching-Resources<\/td><td class=\"column-2\">CTRL-F: Find the Facts is a program of CIVIX, which is a non-partisan registered Canadian charity dedicated to building the skills and habits of active and informed citizenship among school-aged youth. False and misleading information is rampant online, and people lack the skills and motivation to determine what to trust. To build the next generation\u2026<\/td><td class=\"column-3\"><a href=\"https:\/\/ctrl-f.ca\/\" target=\"_blank\" rel=\"noopener\">https:\/\/ctrl-f.ca\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">Cyber Academy for Kids<\/td><td class=\"column-2\">Internet Safety for Kids and Families has created this engaging Internet Safety Series for kids ages 7-10.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/for-kids\/cyber-academy\" target=\"_blank\" rel=\"noopener\">https:\/\/www.trendmicro.com\/internet-safety\/for-kids\/cyber-academy<\/a><\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">Cyber Mission<\/td><td class=\"column-2\">Created by the U.S. Department of defence this challenging series of games will test your cyber skills.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cybermission.tech\/#!\/page\/home\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cybermission.tech\/#!\/page\/home<\/a><\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">Cyber Safety Video Series<\/td><td class=\"column-2\">CYBER.ORG and the Cybersecurity and Infrastructure Security Agency (CISA) partnered to produce this cybersafety video series.<\/td><td class=\"column-3\"><a href=\"https:\/\/cyber.org\/cybersafety\" target=\"_blank\" rel=\"noopener\">https:\/\/cyber.org\/cybersafety<\/a><\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">Cybersafe work quizzes<\/td><td class=\"column-2\">CyberSafe has developed engaging and educational quizzes for your workplace. Increase your privacy today!<\/td><td class=\"column-3\"><a href=\"https:\/\/cybersafework.com\/cybersafe-work-quizzes\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cybersafework.com\/cybersafe-work-quizzes\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">Cybersafety posters<\/td><td class=\"column-2\">Check out these free posters on various cybersafety topics. Provided by Cyber Safe Work.<\/td><td class=\"column-3\"><a href=\"https:\/\/cybersafework.com\/free-security-posters\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cybersafework.com\/free-security-posters\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">CyberSecurED Privacy And Security In Education<\/td><td class=\"column-2\">This podcast series features discussion about the most pressing topics in cybersecurity in the educational sector. Thought provoking conversation with educators, administrators and security experts.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.youtube.com\/playlist?list=PL97f4k1ABQHREz6JPQXAp6Ob_QTd4IZow\" target=\"_blank\" rel=\"noopener\">https:\/\/www.youtube.com\/playlist?list=PL97f4k1ABQHREz6JPQXAp6Ob_QTd4IZow<\/a><\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">Cybersecurity Awareness Posters<\/td><td class=\"column-2\">Check out these cybersecurity posters for a fun way to remind yourself to stay cybersafe! Provided by Global Knowledge.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.globalknowledge.com\/ca-en\/topics\/cybersecurity\/cybersecurity-awareness-posters\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.globalknowledge.com\/ca-en\/topics\/cybersecurity\/cybersecurity-awareness-posters\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">Cybersecurity Careers<\/td><td class=\"column-2\">The cybersecurity job market is booming, but where to start? Comp TIA has detailed, actionable information for job seekers in this domain!<\/td><td class=\"column-3\"><a href=\"https:\/\/www.comptia.org\/blog\/the-top-9-jobs-in-cybersecurity\" target=\"_blank\" rel=\"noopener\">https:\/\/www.comptia.org\/blog\/the-top-9-jobs-in-cybersecurity<\/a><\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">Cybersecurity champion<\/td><td class=\"column-2\">Cybersecurity champion \u2013 Learn how to protect yourself, your family, and your devices with these tips and resources<\/td><td class=\"column-3\"><a href=\"https:\/\/staysafeonline.org\/resource\/rethink-cyber-safety-rules-tech-talk-teens-2017\/\" target=\"_blank\" rel=\"noopener\">https:\/\/staysafeonline.org\/resource\/rethink-cyber-safety-rules-tech-talk-teens-2017\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">Cybersecurity Games &#8211; Texas A&amp;M University<\/td><td class=\"column-2\">These exciting interactive games by Texas A&amp;M University will make you think about cybersecurity while battling various villains.<\/td><td class=\"column-3\"><a href=\"https:\/\/fightback.tamu.edu\/\" target=\"_blank\" rel=\"noopener\">https:\/\/fightback.tamu.edu\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">Cybersecurity Guide for Parents and Guardians &#8211; TMU<\/td><td class=\"column-2\">Parents\u2019 &amp; Guardians\u2019 Guide to Cybersecurity. Empowering your kids in a digital world.<\/td><td class=\"column-3\"><a href=\"https:\/\/cybersecurecatalyst.ca\/cybersecurity-for-parents-guardians\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cybersecurecatalyst.ca\/cybersecurity-for-parents-guardians\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">Cybersecurity Quizzes<\/td><td class=\"column-2\">Take these cybersecurity quizzes from the Federal Trade Commission to test your knowledge and work your way towards becoming #UnHackable!<\/td><td class=\"column-3\"><a href=\"https:\/\/www.ftc.gov\/business-guidance\/small-businesses\/cybersecurity\/quiz\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ftc.gov\/business-guidance\/small-businesses\/cybersecurity\/quiz<\/a><\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">Cybersecurity tips<\/td><td class=\"column-2\">This external resource provides helpful and understandable cybersafety tips on various topics.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.serene-risc.ca\/en\/cybersecurity-tips\" target=\"_blank\" rel=\"noopener\">https:\/\/www.serene-risc.ca\/en\/cybersecurity-tips<\/a><\/td>\n<\/tr>\n<tr class=\"row-38\">\n\t<td class=\"column-1\">Cybersecurity Workforce report<\/td><td class=\"column-2\">Workforce report \u2013 Detailed cybersecurity workforce report that features young, educated women ready to take charge.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.digitalthinktankictc.com\/reports\/empowering-women-in-the-digital-economy#intro\" target=\"_blank\" rel=\"noopener\">https:\/\/www.digitalthinktankictc.com\/reports\/empowering-women-in-the-digital-economy#intro<\/a><\/td>\n<\/tr>\n<tr class=\"row-39\">\n\t<td class=\"column-1\">CyberTitan<\/td><td class=\"column-2\">CyberTitan prepares middle and secondary school students with learning opportunities through hands-on simulated environments that develop the critical, digital skills necessary to pursue post-secondary education STEM programs.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cybertitan.ca\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cybertitan.ca\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-40\">\n\t<td class=\"column-1\">Cybrary: Career Development<\/td><td class=\"column-2\">The leading cybersecurity and IT career development platform. Find courses for professional certifications to help you down your career path.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cybrary.it\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cybrary.it\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-41\">\n\t<td class=\"column-1\">Dark Money: The Hidden History of the Billionaires Behind the Rise of the Radical Right<\/td><td class=\"column-2\">Jane Mayer discusses in this powerful, meticulously reported history, a network of exceedingly wealthy people with extreme libertarian views bankrolled a systematic, step-by-step plan to fundamentally alter the American political system.<\/td><td class=\"column-3\"><a href=\"https:\/\/www.amazon.ca\/Dark-Money-History-Billionaires-Radical\/dp\/0307947904\" target=\"_blank\" rel=\"noopener\">https:\/\/www.amazon.ca\/Dark-Money-History-Billionaires-Radical\/dp\/0307947904<\/a><\/td>\n<\/tr>\n<tr class=\"row-42\">\n\t<td class=\"column-1\">Digital and media literacy<\/td><td class=\"column-2\">This collection of resources explores many aspects of digital and media literacy. From the basics, to how youth engage with different media, to issues they may encounter. Provided by Media Smarts.<\/td><td class=\"column-3\"><a href=\"https:\/\/mediasmarts.ca\/digital-media-literacy\" target=\"_blank\" rel=\"noopener\">https:\/\/mediasmarts.ca\/digital-media-literacy<\/a><\/td>\n<\/tr>\n<tr class=\"row-43\">\n\t<td class=\"column-1\">Digital and media literacy for parents<\/td><td class=\"column-2\">Keep your family cybersafe with Media Smarts\u2019 interactive games, parental safety guides, workshops, and more.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/mediasmarts.ca\/parents\" target=\"_blank\" rel=\"noopener\">https:\/\/mediasmarts.ca\/parents<\/a><\/td>\n<\/tr>\n<tr class=\"row-44\">\n\t<td class=\"column-1\">Digital and media literacy for teachers<\/td><td class=\"column-2\">This external site provides lesson plans and other resources to improve students\u2019 digital literacy. Provided by Media Smarts.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/mediasmarts.ca\/teacher-resources\" target=\"_blank\" rel=\"noopener\">https:\/\/mediasmarts.ca\/teacher-resources<\/a><\/td>\n<\/tr>\n<tr class=\"row-45\">\n\t<td class=\"column-1\">Digital citizenship for kids<\/td><td class=\"column-2\">Just as good citizenship is more than not breaking the law, digital citizenship is more than just avoiding harms online. Digital Citizenship Utah has complied examples of how kids have used technology for good.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/digcitutah.com\/resources-library\/digital-citizenship-kids\/\" target=\"_blank\" rel=\"noopener\">https:\/\/digcitutah.com\/resources-library\/digital-citizenship-kids\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-46\">\n\t<td class=\"column-1\">Digital Citizenship Teaching Resources<\/td><td class=\"column-2\">This external site provides engaging and helpful teaching resources to bring cybersafety education into the classroom from K-12.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.commonsense.org\/education\/digital-citizenship\" target=\"_blank\" rel=\"noopener\">https:\/\/www.commonsense.org\/education\/digital-citizenship<\/a><\/td>\n<\/tr>\n<tr class=\"row-47\">\n\t<td class=\"column-1\">Digital Literacy Interactive Games<\/td><td class=\"column-2\">Series of 6 interactive games \u2013 Provided by Common Sense Media<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.commonsense.org\/education\/digital-passport\" target=\"_blank\" rel=\"noopener\">https:\/\/www.commonsense.org\/education\/digital-passport<\/a><\/td>\n<\/tr>\n<tr class=\"row-48\">\n\t<td class=\"column-1\">Digital Principles Game<\/td><td class=\"column-2\">Do you have what it takes to complete the quest for digital principles? Make your way through the digital realm by answering questions, and collect coins to win points! Characters on the way will help you choose your answer \u2013 but be careful, not all of them are as nice as they seem.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/digital-principles#videogame\" target=\"_blank\" rel=\"noopener\">https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/digital-principles#videogame<\/a><\/td>\n<\/tr>\n<tr class=\"row-49\">\n\t<td class=\"column-1\">Disinformation: The Nature of Facts and Lies in the Post-Truth Era<\/td><td class=\"column-2\">Donald A. Barclay\u2019s novel demonstrates how the emergence of digital technology into everyday life has knitted together a number of seemingly loosely related forces-historical, psychological, economic, and culture-to create the post-truth culture. Readers will better understand how we got to where we now are, see how we can move beyond a culture in which facts\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.amazon.ca\/Disinformation-Nature-Facts-Lies-Post-Truth\/dp\/1538144085\" target=\"_blank\" rel=\"noopener\">https:\/\/www.amazon.ca\/Disinformation-Nature-Facts-Lies-Post-Truth\/dp\/1538144085<\/a><\/td>\n<\/tr>\n<tr class=\"row-50\">\n\t<td class=\"column-1\">Doubt is Their Product: How Industry&#8217;s Assault on Science Threatens Your Health<\/td><td class=\"column-2\">David Michaels reveals how the tobacco industry\u2019s dishonest tactics spawned a multimillion dollar industry that is dismantling public health safeguards. Product defense consultants, he argues, have increasingly skewed the scientific literature, manufactured and magnified scientific uncertainty, and influenced policy decisions to the advantage of polluters and the manufacturers of dangerous products.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.amazon.ca\/Doubt-Their-Product-Industrys-Threatens\/dp\/019530067X\" target=\"_blank\" rel=\"noopener\">https:\/\/www.amazon.ca\/Doubt-Their-Product-Industrys-Threatens\/dp\/019530067X<\/a><\/td>\n<\/tr>\n<tr class=\"row-51\">\n\t<td class=\"column-1\">E-Safety guide<\/td><td class=\"column-2\">E-Safety guide \u2013 Learn about the latest games, apps, and social media, including how to protect your information and report inappropriate content.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.esafety.gov.au\/key-issues\/esafety-guide\" target=\"_blank\" rel=\"noopener\">https:\/\/www.esafety.gov.au\/key-issues\/esafety-guide<\/a><\/td>\n<\/tr>\n<tr class=\"row-52\">\n\t<td class=\"column-1\">Educational games<\/td><td class=\"column-2\">Educational games \u2013 Provided by Media Smarts<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/mediasmarts.ca\/digital-media-literacy\/educational-games\" target=\"_blank\" rel=\"noopener\">https:\/\/mediasmarts.ca\/digital-media-literacy\/educational-games<\/a><\/td>\n<\/tr>\n<tr class=\"row-53\">\n\t<td class=\"column-1\">\u00c9duquer \u00e0 la cybers\u00e9curit\u00e9<\/td><td class=\"column-2\">Cette formation a \u00e9t\u00e9 d\u00e9velopp\u00e9e en collaboration avec terry cutler, un expert canadien de la cybers\u00e9curit\u00e9 reconnu mondialement et cybernb,\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cadre21.org\/groupe-de-cours\/eduquer-a-la-cybersecurite\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cadre21.org\/groupe-de-cours\/eduquer-a-la-cybersecurite\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-54\">\n\t<td class=\"column-1\">GetCyberSafe Workbook<\/td><td class=\"column-2\">This printable workbook is loaded with fun activities for kids. All cybersafe resources are available here in both English and French.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.getcybersafe.gc.ca\/sites\/default\/files\/2022-03\/workbook-getcybersafeagency-e.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.getcybersafe.gc.ca\/sites\/default\/files\/2022-03\/workbook-getcybersafeagency-e.pdf<\/a><\/td>\n<\/tr>\n<tr class=\"row-55\">\n\t<td class=\"column-1\">Girl security: Empowering Education<\/td><td class=\"column-2\">Girl Security aims at preparing girls, women, and gender minorities for national security through informed learning and training. Learn how you can improve your cybersecurity today!<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/girlsecurity.thinkific.com\/courses\/finding-your-cybersecurity-superpowers-with-girl-security-and-microsoft-security\" target=\"_blank\" rel=\"noopener\">https:\/\/girlsecurity.thinkific.com\/courses\/finding-your-cybersecurity-superpowers-with-girl-security-and-microsoft-security<\/a><\/td>\n<\/tr>\n<tr class=\"row-56\">\n\t<td class=\"column-1\">Government of Canada: Fraud and Scams<\/td><td class=\"column-2\">The Government of Canada has provided a range information on fraud and scams. Learn about ongoing scams, how to avoid them and how you can get involved with Fraud Prevention Month.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.competitionbureau.gc.ca\/eic\/site\/cb-bc.nsf\/eng\/h_00122.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.competitionbureau.gc.ca\/eic\/site\/cb-bc.nsf\/eng\/h_00122.html<\/a><\/td>\n<\/tr>\n<tr class=\"row-57\">\n\t<td class=\"column-1\">Hackergals<\/td><td class=\"column-2\">Hackergal is a charitable organization that inspires girls across Canada to explore the opportunities to code, create, and become the leaders of tomorrow.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/hackergal.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/hackergal.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-58\">\n\t<td class=\"column-1\">Help a sister up<\/td><td class=\"column-2\">Help a sister up \u2013 An initiative to promote and support women in cybersecurity. Get connected to the group today!<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.linkedin.com\/groups\/8622480\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.linkedin.com\/groups\/8622480\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-59\">\n\t<td class=\"column-1\">How cyber savvy are you?<\/td><td class=\"column-2\">How cyber savvy are you? \u2013 Test your knowledge about the cyber security risks you face every day with this quiz from Media Smarts.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/mediasmarts.ca\/sites\/default\/files\/games\/cyber-security-quiz\/index_en.html\" target=\"_blank\" rel=\"noopener\">https:\/\/mediasmarts.ca\/sites\/default\/files\/games\/cyber-security-quiz\/index_en.html<\/a><\/td>\n<\/tr>\n<tr class=\"row-60\">\n\t<td class=\"column-1\">How to identify misinformation, disinformation, and malinformation<\/td><td class=\"column-2\">From the Canadian Centre for Cyber Security, this awareness document outlines the types of false information and what businesses and individuals can do to investigate further and protect themselves against MDM.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/how-identify-misinformation-disinformation-and-malinformation-itsap00300\" target=\"_blank\" rel=\"noopener\">https:\/\/cyber.gc.ca\/en\/guidance\/how-identify-misinformation-disinformation-and-malinformation-itsap00300<\/a><\/td>\n<\/tr>\n<tr class=\"row-61\">\n\t<td class=\"column-1\">How to Spot Fake News<\/td><td class=\"column-2\">Critical thinking is a key skill in media and information literacy, and the mission of libraries is to educate and advocate its importance. IFLA has made this infographic with eight simple steps (based on FactCheck.org\u2019s 2016 article How to Spot Fake News) to discover the verifiability of a given news-piece in front of you. Download,\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/guides.library.txstate.edu\/c.php?g=184587&#038;p=4831089\" target=\"_blank\" rel=\"noopener\">https:\/\/guides.library.txstate.edu\/c.php?g=184587&amp;p=4831089<\/a><\/td>\n<\/tr>\n<tr class=\"row-62\">\n\t<td class=\"column-1\">IBM Cybersecurity SkillsBuild<\/td><td class=\"column-2\">IBM\u2019s repository of cybersecurity resources including a quiz to test your current know-how, training courses for students, career planning resources, and a cyber breach experience game called \u201cTerminal\u201d.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.ibm.com\/skills\/topics\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ibm.com\/skills\/topics\/cybersecurity\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-63\">\n\t<td class=\"column-1\">ICTC Digital Literacy Education and skills<\/td><td class=\"column-2\">The ICTC provides educators, employers, and students the resources they need to build digital literacy skills.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/etalentcanada.ca\/for-educators\/programs\/jump-starting-digital-careers-jdc\" target=\"_blank\" rel=\"noopener\">https:\/\/etalentcanada.ca\/for-educators\/programs\/jump-starting-digital-careers-jdc<\/a><\/td>\n<\/tr>\n<tr class=\"row-64\">\n\t<td class=\"column-1\">ICTC Jump-Starting Digital Careers<\/td><td class=\"column-2\">This summary highlights ICTC\u2019s approach to jump starting digital careers through it\u2019s K-12 offerings.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/knowledgeflow.org\/resource\/ictc-jump-starting-digital-careers\/\">https:\/\/knowledgeflow.org\/resource\/ictc-jump-starting-digital-careers\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-65\">\n\t<td class=\"column-1\">Identity Theft and fraud<\/td><td class=\"column-2\">Learn about identity theft and fraud from the Canadian Anti-Fraud Centre. Always report scams and fraud to the CAFC.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.antifraudcentre-centreantifraude.ca\/scams-fraudes\/identity-identite-eng.htm\" target=\"_blank\" rel=\"noopener\">https:\/\/www.antifraudcentre-centreantifraude.ca\/scams-fraudes\/identity-identite-eng.htm<\/a><\/td>\n<\/tr>\n<tr class=\"row-66\">\n\t<td class=\"column-1\">Interland game for kids<\/td><td class=\"column-2\">This engaging and interactive game by Be Internet Awesome allows users to learn about cybersafety while collecting points and earning badges.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/beinternetawesome.withgoogle.com\/en_us\/interland\" target=\"_blank\" rel=\"noopener\">https:\/\/beinternetawesome.withgoogle.com\/en_us\/interland<\/a><\/td>\n<\/tr>\n<tr class=\"row-67\">\n\t<td class=\"column-1\">Internet hangman<\/td><td class=\"column-2\">Internet hangman \u2013 A classic game that allows you to have fun and learn at the same time about cybersecurity and cybersafety.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.quia.com\/hm\/40647.html?AP_rand=801908084&#038;playHTML=1\" target=\"_blank\" rel=\"noopener\">https:\/\/www.quia.com\/hm\/40647.html?AP_rand=801908084&amp;playHTML=1<\/a><\/td>\n<\/tr>\n<tr class=\"row-68\">\n\t<td class=\"column-1\">Internet Safety for Kids and Families<\/td><td class=\"column-2\">Internet Safety for Kids and Families by Trend Micro. Includes resources for kids and parents, blog posts, webinars, tip sheets, and more.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.trendmicro.com\/internet-safety\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.trendmicro.com\/internet-safety\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-69\">\n\t<td class=\"column-1\">KnowBe4 &#8211; Children&#8217;s Interactive Activity Kit<\/td><td class=\"column-2\">This interactive children\u2019s activity kit comes with a video and a workbook filled with pictures, games, and activities focused on cybersecurity.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.knowbe4.com\/cybersecurity-activity-kit\" target=\"_blank\" rel=\"noopener\">https:\/\/www.knowbe4.com\/cybersecurity-activity-kit<\/a><\/td>\n<\/tr>\n<tr class=\"row-70\">\n\t<td class=\"column-1\">Lesson Plans and Activities &#8211; OIPC Alberta\u00a0<\/td><td class=\"column-2\">Lesson Plans and Activities for K-12 Education. These resources were developed with Canada\u2019s federal, provincial and territorial privacy commissioners.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/oipc.ab.ca\/resource\/lesson-plans\/\" target=\"_blank\" rel=\"noopener\">https:\/\/oipc.ab.ca\/resource\/lesson-plans\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-71\">\n\t<td class=\"column-1\">Media Smarts for Parents<\/td><td class=\"column-2\">Get a better understanding of the various activities kids and teens love to do online and learn comprehensive strategies and tips to help them.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/mediasmarts.ca\/parents\" target=\"_blank\" rel=\"noopener\">https:\/\/mediasmarts.ca\/parents<\/a><\/td>\n<\/tr>\n<tr class=\"row-72\">\n\t<td class=\"column-1\">National Initiative For Cybersecurity Careers and studies<\/td><td class=\"column-2\">Are you a high school student looking for education and\/or a career in cybersecurity? Check out the NICCS\u2019 information on how you can get there!<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/niccs.cisa.gov\/education-training\" target=\"_blank\" rel=\"noopener\">https:\/\/niccs.cisa.gov\/education-training<\/a><\/td>\n<\/tr>\n<tr class=\"row-73\">\n\t<td class=\"column-1\">Need help now<\/td><td class=\"column-2\">NeedHelpNow is designed to provide youth with practical steps to regain control over the situation and stay safe online.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/needhelpnow.ca\/app\/en\/downloadable_resources-youth\" target=\"_blank\" rel=\"noopener\">https:\/\/needhelpnow.ca\/app\/en\/downloadable_resources-youth<\/a><\/td>\n<\/tr>\n<tr class=\"row-74\">\n\t<td class=\"column-1\">Online Banking Tutorial &#8211; BMO<\/td><td class=\"column-2\">Discover the advantages of managing your BMO finances from the comfort of your own home. Get step-by-step guidance on setting up accounts, making transactions, and staying safe online. Whether you\u2019re new to banking or looking to streamline your finances, this guide will give you the tools you need to navigate the world of online banking\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/bmodemos.com\/en\/home\" target=\"_blank\" rel=\"noopener\">https:\/\/bmodemos.com\/en\/home<\/a><\/td>\n<\/tr>\n<tr class=\"row-75\">\n\t<td class=\"column-1\">Online Banking Tutorial &#8211; CIBC<\/td><td class=\"column-2\">Discover the advantages of managing your CIBC finances from the comfort of your own home. Get step-by-step guidance on setting up accounts, making transactions, and staying safe online. Whether you\u2019re new to banking or looking to streamline your finances, this guide will give you the tools you need to navigate the world of online banking\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cibc.com\/en\/personal-banking\/ways-to-bank\/how-to-guides-digital-banking.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cibc.com\/en\/personal-banking\/ways-to-bank\/how-to-guides-digital-banking.html<\/a><\/td>\n<\/tr>\n<tr class=\"row-76\">\n\t<td class=\"column-1\">Online Banking Tutorial &#8211; NBC<\/td><td class=\"column-2\">Discover the advantages of managing your NBC finances from the comfort of your own home. Get step-by-step guidance on setting up accounts, making transactions, and staying safe online. Whether you\u2019re new to banking or looking to streamline your finances, this guide will give you the tools you need to navigate the world of online banking\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.nbc.ca\/personal\/accounts\/online.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.nbc.ca\/personal\/accounts\/online.html<\/a><\/td>\n<\/tr>\n<tr class=\"row-77\">\n\t<td class=\"column-1\">Online Banking Tutorial &#8211; RBC<\/td><td class=\"column-2\">Discover the advantages of managing your RBC finances from the comfort of your own home. Get step-by-step guidance on setting up accounts, making transactions, and staying safe online. Whether you\u2019re new to banking or looking to streamline your finances, this guide will give you the tools you need to navigate the world of online banking\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.rbcroyalbank.com\/ways-to-bank\/tutorials\/index.html#top-page-content-5\" target=\"_blank\" rel=\"noopener\">https:\/\/www.rbcroyalbank.com\/ways-to-bank\/tutorials\/index.html#top-page-content-5<\/a><\/td>\n<\/tr>\n<tr class=\"row-78\">\n\t<td class=\"column-1\">Online Banking Tutorial &#8211; Scotiabank<\/td><td class=\"column-2\">Discover the advantages of managing your Scotiabank finances from the comfort of your own home. Get step-by-step guidance on setting up accounts, making transactions, and staying safe online. Whether you\u2019re new to banking or looking to streamline your finances, this guide will give you the tools you need to navigate the world of online banking\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.scotiabank.com\/ca\/en\/personal\/bank-your-way\/digital-banking-guide.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.scotiabank.com\/ca\/en\/personal\/bank-your-way\/digital-banking-guide.html<\/a><\/td>\n<\/tr>\n<tr class=\"row-79\">\n\t<td class=\"column-1\">Online Banking Tutorial &#8211; TD<\/td><td class=\"column-2\">Discover the advantages of managing your TD finances from the comfort of your own home. Get step-by-step guidance on setting up accounts, making transactions, and staying safe online. Whether you\u2019re new to banking or looking to streamline your finances, this guide will give you the tools you need to navigate the world of online banking\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.td.com\/us\/en\/personal-banking\/online-banking-made-easy\" target=\"_blank\" rel=\"noopener\">https:\/\/www.td.com\/us\/en\/personal-banking\/online-banking-made-easy<\/a><\/td>\n<\/tr>\n<tr class=\"row-80\">\n\t<td class=\"column-1\">Online Gaming Safety<\/td><td class=\"column-2\">This video, made by the Office of the Privacy Commissioner of Canada, helps you stay safe when online gaming.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/technology\/mobile-and-digital-devices\/digital-devices\/video_gaming\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/privacy-topics\/technology\/mobile-and-digital-devices\/digital-devices\/video_gaming\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-81\">\n\t<td class=\"column-1\">Online Safety Basics<\/td><td class=\"column-2\">This external resource features helpful guides and tips to ensure you and your loved ones are staying safe online.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/staysafeonline.org\/stay-safe-online\/\" target=\"_blank\" rel=\"noopener\">https:\/\/staysafeonline.org\/stay-safe-online\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-82\">\n\t<td class=\"column-1\">Ontario College of Teachers &#8211; Student privacy<\/td><td class=\"column-2\">This article, from the Magazine of the Ontario College of Teachers, gives helpful and important information about teachers\u2019 obligations to student privacy.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/professionallyspeaking.oct.ca\/march_2008\/privacy.asp\" target=\"_blank\" rel=\"noopener\">https:\/\/professionallyspeaking.oct.ca\/march_2008\/privacy.asp<\/a><\/td>\n<\/tr>\n<tr class=\"row-83\">\n\t<td class=\"column-1\">PicoCTF &#8211; Computer Security Education Program<\/td><td class=\"column-2\">Picoctf is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts at Carnegie Mellon University.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/picoctf.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/picoctf.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-84\">\n\t<td class=\"column-1\">Privacy activity sheets<\/td><td class=\"column-2\">Privacy activity sheets \u2013 Provided by the International Association of Privacy Professionals<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/t-v\/activ\/index\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/t-v\/activ\/index\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-85\">\n\t<td class=\"column-1\">Privacy and Kids &#8211; OPCC<\/td><td class=\"column-2\">Explore these resources for parents and teachers to find educational cybersafety activities, lesson plans, posters, and more. Provided by the Office of the Privacy Commissioner of Canada<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/information-and-advice-for-individuals\/privacy-and-kids\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/privacy-topics\/information-and-advice-for-individuals\/privacy-and-kids\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-86\">\n\t<td class=\"column-1\">Privacy Educators Program\u00a0<\/td><td class=\"column-2\">Created by the Fordham Centre on Law and Information Policy this robust resource includes a teacher training manual and complete lesson plans for middle school students. It also includes a handbook for schools and parents.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.fordham.edu\/school-of-law\/centers-and-institutes\/fordham-clip\/privacy-education\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fordham.edu\/school-of-law\/centers-and-institutes\/fordham-clip\/privacy-education\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-87\">\n\t<td class=\"column-1\">Privacy Lesson Plans for Teachers<\/td><td class=\"column-2\">These lesson plans, for students in grades 6-12 , allow you to introduce cybersafety education into your classroom. Provided by the Office of the Privacy Commissioner of Canada.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/resources-for-teachers\/lesson-plans-for-the-classroom\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/resources-for-teachers\/lesson-plans-for-the-classroom\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-88\">\n\t<td class=\"column-1\">Privacy reporting<\/td><td class=\"column-2\">Learn where and how to report a privacy concern with this resource from the Office of the Privacy Commissioner of Canada.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/report-a-concern\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/report-a-concern\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-89\">\n\t<td class=\"column-1\">Privacy Resources for Teachers<\/td><td class=\"column-2\">View these resources for teachers! Provided by the Office of the Privacy Commissioner of Canada. Activity sheets, videos, lesson plans and more for students in grades 4-12.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/resources-for-teachers\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/resources-for-teachers\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-90\">\n\t<td class=\"column-1\">RCMP: Anti-Fraud Month<\/td><td class=\"column-2\">March is anti-fraud month! The Royal Canadian Mounted Police has shared tips on how to recognize fraud and scams.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.rcmp-grc.gc.ca\/en\/news\/2021\/march-is-fraud-month-scams-happen-year-know-do\" target=\"_blank\" rel=\"noopener\">https:\/\/www.rcmp-grc.gc.ca\/en\/news\/2021\/march-is-fraud-month-scams-happen-year-know-do<\/a><\/td>\n<\/tr>\n<tr class=\"row-91\">\n\t<td class=\"column-1\">Ready, Set, Bank: Banking Tutorials<\/td><td class=\"column-2\">Ready, Set, Bank gives people everywhere the tools and confidence to start banking online. Their videos guide learners through every step of the process, with overviews and step-by-step tutorials to help them manage their finances electronically. They have organized the learning content into 5 short video courses so you can go through each one at\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.readysetbank.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.readysetbank.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-92\">\n\t<td class=\"column-1\">Research note: Fighting misinformation or fighting for information?<\/td><td class=\"column-2\">This essay questions whether individuals and groups should be working towards fighting misinformation or supporting the acceptance of reliable information.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/misinforeview.hks.harvard.edu\/article\/research-note-fighting-misinformation-or-fighting-for-information\/\" target=\"_blank\" rel=\"noopener\">https:\/\/misinforeview.hks.harvard.edu\/article\/research-note-fighting-misinformation-or-fighting-for-information\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-93\">\n\t<td class=\"column-1\">Resolution on E-Learning Platforms<\/td><td class=\"column-2\">Connected classrooms pose a risk to children\u2019s privacy due to inappropriate data processing, opaque decision-making, and misuse of learning analytics. This can have long-term consequences and fail to account for children\u2019s evolving capacities.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"http:\/\/www.globalprivacyassembly.org\/wp-content\/uploads\/2019\/03\/dewg-resolution-adopted-20180918.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/www.globalprivacyassembly.org\/wp-content\/uploads\/2019\/03\/dewg-resolution-adopted-20180918.pdf<\/a><\/td>\n<\/tr>\n<tr class=\"row-94\">\n\t<td class=\"column-1\">Restricted Intelligence<\/td><td class=\"column-2\">An entertaining video series that follows hapless office workers whose misadventures teach the importance of workplace cybersecurity.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.restrictedintelligence.co.uk\/products\/restricted-intelligence\" target=\"_blank\" rel=\"noopener\">https:\/\/www.restrictedintelligence.co.uk\/products\/restricted-intelligence<\/a><\/td>\n<\/tr>\n<tr class=\"row-95\">\n\t<td class=\"column-1\">Safe Online Surfing By The FBI\u00a0<\/td><td class=\"column-2\">Fun and interactive games for the K-8 crowd on topics like computer health, personal information and online safety.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/sos.fbi.gov\/en\/\" target=\"_blank\" rel=\"noopener\">https:\/\/sos.fbi.gov\/en\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-96\">\n\t<td class=\"column-1\">Safety in the digital world<\/td><td class=\"column-2\">Internet Matters provides guides and resources for families and teachers to ensure every child is staying safe online.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.internetmatters.org\/about-us\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.internetmatters.org\/about-us\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-97\">\n\t<td class=\"column-1\">Sans Institute &#8211; Cyber Aces<\/td><td class=\"column-2\">An online course that teaches the core concepts needed to assess and protect information security systems. Developed by the Sans Institute.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cyberaces.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cyberaces.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-98\">\n\t<td class=\"column-1\">School Privacy Information<\/td><td class=\"column-2\">This external resource provides a guide for school boards, educators, and administrators to follow regarding student information privacy.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.ipc.on.ca\/education\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ipc.on.ca\/education\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-99\">\n\t<td class=\"column-1\">Secure Passcodes with Python &#8211; Lesson Plan by Canada Learning Code<\/td><td class=\"column-2\">Why is having a strong password important? Strong passwords help protect your information and identity. As phishing and social hacking become quite common, we need a way to generate secure passwords that we can still remember!<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.canadalearningcode.ca\/lessons\/code-words-with-python\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.canadalearningcode.ca\/lessons\/code-words-with-python\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-100\">\n\t<td class=\"column-1\">Security Awareness Training<\/td><td class=\"column-2\">Get involved in security awareness training with the SANS institute. Attend online or in-person in Las Vegas! August 2023.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.sans.org\/cyber-security-training-events\/security-awareness-summit-2023\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.sans.org\/cyber-security-training-events\/security-awareness-summit-2023\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-101\">\n\t<td class=\"column-1\">Security education companion<\/td><td class=\"column-2\">This external resource provides free cybersafety education materials about passwords, malware, and general privacy.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/sec.eff.org\/topics\" target=\"_blank\" rel=\"noopener\">https:\/\/sec.eff.org\/topics<\/a><\/td>\n<\/tr>\n<tr class=\"row-102\">\n\t<td class=\"column-1\">Small business security<\/td><td class=\"column-2\">Visit these resources to learn about cybersecurity for businesses. Provided by the National Cyber Security Alliance, Facebook, and MediaPRO.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/staysafeonline.org\/resources\/cybersecurity-for-business\/\" target=\"_blank\" rel=\"noopener\">https:\/\/staysafeonline.org\/resources\/cybersecurity-for-business\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-103\">\n\t<td class=\"column-1\">Social media guide<\/td><td class=\"column-2\">This social media guide includes tips and resources to help you safely navigate the world of social media.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Social%2520Media%2520Guide_0.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Social%2520Media%2520Guide_0.pdf<\/a><\/td>\n<\/tr>\n<tr class=\"row-104\">\n\t<td class=\"column-1\">Social Media Guide for parents<\/td><td class=\"column-2\">Young Minds has provided a guide with tips for parents when discussing social media with their children. Young Minds also has other resources on their site for more mental health support for children.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.youngminds.org.uk\/parent\/a-z-guide\/social-media\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.youngminds.org.uk\/parent\/a-z-guide\/social-media\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-105\">\n\t<td class=\"column-1\">STEM Fellowship Program<\/td><td class=\"column-2\">The STEM Fellowship program fosters inclusion and diversity in STEM fields by creating mentorship and research opportunities for students from traditionally underrepresented communities in STEM.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/stemfellowship.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/stemfellowship.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-106\">\n\t<td class=\"column-1\">Stopping identity theft<\/td><td class=\"column-2\">This helpful resource from the Office of the Privacy Commissioner of Canada provides information about protecting yourself from identity theft, what to do if you become victim, and other tips.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/identities\/identity-theft\/guide_idt\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/privacy-topics\/identities\/identity-theft\/guide_idt\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-107\">\n\t<td class=\"column-1\">Student data privacy<\/td><td class=\"column-2\">Prepare your students for success in a connected world with resources from Common Sense Media.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.commonsense.org\/education\" target=\"_blank\" rel=\"noopener\">https:\/\/www.commonsense.org\/education<\/a><\/td>\n<\/tr>\n<tr class=\"row-108\">\n\t<td class=\"column-1\">Student privacy matters<\/td><td class=\"column-2\">The Parent Coalition for Student Privacy provides useful information for parents and teachers to protect students\u2019 online privacy. Note: This organization is American, and advice with regard to laws and legislation may differ from Canadian privacy regulations.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/studentprivacymatters.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/studentprivacymatters.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-109\">\n\t<td class=\"column-1\">Student privacy toolkit<\/td><td class=\"column-2\">The student privacy toolkit, provided by the Parent Coalition for Student Privacy, gives parents and educators helpful information about how they can keep their children safe online. Note: As this is an American organization, mentions of privacy laws may differ than privacy laws in Canada.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/studentprivacymatters.org\/toolkit\/\" target=\"_blank\" rel=\"noopener\">https:\/\/studentprivacymatters.org\/toolkit\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-110\">\n\t<td class=\"column-1\">Teaching privacy online<\/td><td class=\"column-2\">This external site provides information about various online threats and internet safety, as well as teaching resources to bring cybersafety education into the classroom. Provided by the Parent Coalition for Student Privacy.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/teachingprivacy.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/teachingprivacy.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-111\">\n\t<td class=\"column-1\">The CRAAP Test<\/td><td class=\"column-2\">CRAAP Test is helpful for the educator and the teacher to find out whether the source related to academics is authentic or not. The CRAAP Test is the acronym for Currency, Relevance, Authority, Accuracy, and Purpose. It is not easy to find out whether the source is trustworthy to use as a tool of research\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/craaptest.net\/\" target=\"_blank\" rel=\"noopener\">https:\/\/craaptest.net\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-112\">\n\t<td class=\"column-1\">The Crash Course &#8211; Computer Science<\/td><td class=\"column-2\">Want to get up to speed on in-depth cybersecurity quickly? Crash Course Computer Science will inform and engage you in just over ten minutes!<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.youtube.com\/watch?v=bPVaOlJ6ln0\" target=\"_blank\" rel=\"noopener\">https:\/\/www.youtube.com\/watch?v=bPVaOlJ6ln0<\/a><\/td>\n<\/tr>\n<tr class=\"row-113\">\n\t<td class=\"column-1\">The disaster of misinformation: a review of research in social media<\/td><td class=\"column-2\">This journal article examines how social media has been used to spread misinformation, particularly in disaster news, health, and politics.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC8853081\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC8853081\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-114\">\n\t<td class=\"column-1\">The Disinformation Playbook<\/td><td class=\"column-2\">This article shines a light on how some corporations use a set of tactics to distort the truth about the safety of their products.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.ucsusa.org\/resources\/disinformation-playbook\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ucsusa.org\/resources\/disinformation-playbook<\/a><\/td>\n<\/tr>\n<tr class=\"row-115\">\n\t<td class=\"column-1\">The Office of the Privacy Commissioner of Canada (OPC)\u00a0<\/td><td class=\"column-2\">Information, tools and other resources\u2014including the graphic novel Social Smarts: Nothing Personal!\u2014 developed to help educators, parents, librarians, and other adults engage with kids about privacy.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/awareness-campaigns-and-events\/privacy-education-for-kids\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-116\">\n\t<td class=\"column-1\">The spreading of misinformation online<\/td><td class=\"column-2\">This journal article uses a quantitative analysis for Facebook to study how misinformation of scientific news and conspiracy theories spreads and creates polarized communities.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.pnas.org\/doi\/10.1073\/pnas.1517441113\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pnas.org\/doi\/10.1073\/pnas.1517441113<\/a><\/td>\n<\/tr>\n<tr class=\"row-117\">\n\t<td class=\"column-1\">Tips for choosing passwords<\/td><td class=\"column-2\">Tips for choosing passwords<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.priv.gc.ca\/media\/4959\/info_pw_eng.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.priv.gc.ca\/media\/4959\/info_pw_eng.pdf<\/a><\/td>\n<\/tr>\n<tr class=\"row-118\">\n\t<td class=\"column-1\">Toolkits for Student Privacy<\/td><td class=\"column-2\">The Parent Coalition for Student Privacy has prepared toolkits for parents and teachers to guide student privacy practices.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.ipc.on.ca\/education\/special-topics\/privacy-in-the-networked-classroom-and-the-use-of-online-educational-services\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ipc.on.ca\/education\/special-topics\/privacy-in-the-networked-classroom-and-the-use-of-online-educational-services\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-119\">\n\t<td class=\"column-1\">Trend Micro &#8211; Data Centre Attack<\/td><td class=\"column-2\">A choose-your-own-adventure game where you play the role of a CISO making tough decisions for a hospital as you try and avoid a major crisis.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"http:\/\/datacenterattacks.trendmicro.com\/\" target=\"_blank\" rel=\"noopener\">http:\/\/datacenterattacks.trendmicro.com\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-120\">\n\t<td class=\"column-1\">Trend Micro &#8211; Targeted Attack<\/td><td class=\"column-2\">In this choose-your-own-adventure game, you must make tough choices to keep your company on-budget and safe as you launch a revolutionary product.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"http:\/\/targetedattacks.trendmicro.com\/index.html\" target=\"_blank\" rel=\"noopener\">http:\/\/targetedattacks.trendmicro.com\/index.html<\/a><\/td>\n<\/tr>\n<tr class=\"row-121\">\n\t<td class=\"column-1\">What Is Fake News?<\/td><td class=\"column-2\">This guide was developed in concert with Fighting Fake News: Tips for Aspiring Truth Detectives, a presentation on fake news delivered by Sociology Professor Erin Steuter and Librarian Jeff Lilburn on 3 February 2017. The presentation covered current examples of fake news, why fake news is on the rise, and how it has political consequences.\u2026<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/libraryguides.mta.ca\/fake_news\" target=\"_blank\" rel=\"noopener\">https:\/\/libraryguides.mta.ca\/fake_news<\/a><\/td>\n<\/tr>\n<tr class=\"row-122\">\n\t<td class=\"column-1\">Women in Cybersecurity<\/td><td class=\"column-2\">WICYS \u2013 A global community of women dedicated to bringing talented women together to celebrate and foster their passion of cybersecurity.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/www.wicys.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.wicys.org\/<\/a><\/td>\n<\/tr>\n<tr class=\"row-123\">\n\t<td class=\"column-1\">Young Adults Fraud Prevention Toolkit<\/td><td class=\"column-2\">This toolkit, created by the Canadian Anti-Fraud Centre, highlights the most prevalent scams targeting young adults, how to spot them and what to do if you receive one or become the victim of one.<br \/>\n<br \/>\n<\/td><td class=\"column-3\"><a href=\"https:\/\/knowledgeflow.org\/resource\/young-adults-fraud-prevention-toolkit\/\">https:\/\/knowledgeflow.org\/resource\/young-adults-fraud-prevention-toolkit\/<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<!-- #tablepress-5 from cache --><\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id22376_3d09c5-c8{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id22376_3d09c5-c8 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id22376_3d09c5-c8 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id22376_3d09c5-c8 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id22376_3d09c5-c8 > .kt-row-layout-overlay{opacity:0.50;background-color:var(--global-palette9, #ffffff);}@media all and (max-width: 1024px){.kb-row-layout-id22376_3d09c5-c8 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id22376_3d09c5-c8 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id22376_3d09c5-c8 alignfull has-theme-palette7-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column22376_e26824-38 > .kt-inside-inner-col{display:flex;}.kadence-column22376_e26824-38 > .kt-inside-inner-col{padding-bottom:0px;}.kadence-column22376_e26824-38 > .kt-inside-inner-col,.kadence-column22376_e26824-38 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column22376_e26824-38 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column22376_e26824-38 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column22376_e26824-38 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column22376_e26824-38{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_e26824-38{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_e26824-38 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column22376_e26824-38 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column22376_e26824-38{text-align:center;}.kadence-column22376_e26824-38{position:relative;}.kadence-column22376_e26824-38, .kt-inside-inner-col > .kadence-column22376_e26824-38:not(.specificity){margin-bottom:0px;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column22376_e26824-38{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_e26824-38{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_e26824-38 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column22376_e26824-38 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column22376_e26824-38{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_e26824-38{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column22376_e26824-38 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column22376_e26824-38 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column22376_e26824-38 kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading22376_289923-ab, .wp-block-kadence-advancedheading.kt-adv-heading22376_289923-ab[data-kb-block=\"kb-adv-heading22376_289923-ab\"]{padding-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:400;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading22376_289923-ab mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22376_289923-ab[data-kb-block=\"kb-adv-heading22376_289923-ab\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22376_289923-ab img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22376_289923-ab[data-kb-block=\"kb-adv-heading22376_289923-ab\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading22376_289923-ab wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading22376_289923-ab\">Resources<\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22376_637984-cb, .wp-block-kadence-advancedheading.kt-adv-heading22376_637984-cb[data-kb-block=\"kb-adv-heading22376_637984-cb\"]{padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;font-size:var(--global-kb-font-size-xxl, 4rem);line-height:1;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22376_637984-cb mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22376_637984-cb[data-kb-block=\"kb-adv-heading22376_637984-cb\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22376_637984-cb img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22376_637984-cb[data-kb-block=\"kb-adv-heading22376_637984-cb\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h1 class=\"kt-adv-heading22376_637984-cb wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading22376_637984-cb\">View our other tipsheets<\/h1>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading22376_6bf9d6-b8, .wp-block-kadence-advancedheading.kt-adv-heading22376_6bf9d6-b8[data-kb-block=\"kb-adv-heading22376_6bf9d6-b8\"]{max-width:896px;margin-right:auto;margin-left:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading22376_6bf9d6-b8 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading22376_6bf9d6-b8[data-kb-block=\"kb-adv-heading22376_6bf9d6-b8\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading22376_6bf9d6-b8 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading22376_6bf9d6-b8[data-kb-block=\"kb-adv-heading22376_6bf9d6-b8\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading22376_6bf9d6-b8 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading22376_6bf9d6-b8\">Explore our resources on cybersafety, privacy protection, and educational content tailored for everyone. Our collection of tipsheets covers essential topics in cybersecurity, ensuring users of all backgrounds can navigate the digital world securely. Whether you&#8217;re safeguarding personal information, learning about privacy best practices, or seeking educational resources, our page equips you with practical insights to stay safe online. Dive into our resources and enhance your digital resilience today.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kt-btns22376_47caf3-b7, .site .entry-content .wp-block-kadence-advancedbtn.kt-btns22376_47caf3-b7, .wp-block-kadence-advancedbtn.kb-btns22376_47caf3-b7, .site .entry-content .wp-block-kadence-advancedbtn.kb-btns22376_47caf3-b7{margin-bottom:0px;}.wp-block-kadence-advancedbtn.kb-btns22376_47caf3-b7{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns22376_47caf3-b7 .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns22376_47caf3-b7\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn22376_adfd5c-41.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn22376_adfd5c-41.kb-button{margin-top:var(--global-kb-spacing-sm, 1.5rem);}.wp-block-kadence-advancedbtn .kb-btn22376_adfd5c-41.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn22376_adfd5c-41.kb-button:focus{background:var(--global-palette1, #3182CE);}<\/style><a class=\"kb-button kt-button button kb-btn22376_adfd5c-41 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/resources\/?_filter_type=tip-sheets\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"kt-btn-inner-text\">View Resources<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Tanto si es usted un padre que quiere proteger a sus hijos en Internet como si es un educador que busca materiales para debatir en clase o un particular que quiere mejorar su propia seguridad digital, esta tabla le ofrece recursos esenciales para todos. Incluye enlaces directos a gu\u00edas educativas, herramientas inform\u00e1ticas y consejos de expertos sobre c\u00f3mo mantener la seguridad en Internet.<\/p>","protected":false},"featured_media":16802,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"resource-type":[457],"topic":[548,573,568,549,569,541,540,544,539,546,572,542],"resource-initiative":[],"class_list":["post-22376","resource","type-resource","status-publish","format-standard","has-post-thumbnail","hentry","resource-type-sites-articles","topic-anti-disinformation","topic-artifical-intelligence","topic-cyberbullying","topic-cybersecurity-careers-and-education","topic-device-security","topic-document-and-communication-security","topic-online-privacy-and-security","topic-online-safety-for-children-and-parents","topic-scams-and-fraud-awareness","topic-sextortion-and-trafficking","topic-social-media","topic-video-conferencing-and-messaging-apps"],"acf":[],"taxonomy_info":{"resource-type":[{"value":457,"label":"Sites\/Articles"}],"topic":[{"value":548,"label":"Anti-disinformation"},{"value":573,"label":"Artifical Intelligence"},{"value":568,"label":"Cyberbullying"},{"value":549,"label":"Cybersecurity Careers and Education"},{"value":569,"label":"Device Security"},{"value":541,"label":"Document and Communication Security"},{"value":540,"label":"Online Privacy and Security"},{"value":544,"label":"Online Safety for Children and Parents"},{"value":539,"label":"Scams and Fraud Awareness"},{"value":546,"label":"Sextortion and Trafficking"},{"value":572,"label":"Social Media"},{"value":542,"label":"Video Conferencing and Messaging Apps"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/01\/SitesArticles-1024x256.png",1024,256,true],"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource\/22376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/resource"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource\/22376\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media\/16802"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=22376"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource-type?post=22376"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/topic?post=22376"},{"taxonomy":"resource-initiative","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource-initiative?post=22376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}