{"id":31821,"date":"2025-06-13T16:21:10","date_gmt":"2025-06-13T20:21:10","guid":{"rendered":"https:\/\/knowledgeflow.org\/?post_type=initiative&#038;p=31821"},"modified":"2025-06-24T16:47:50","modified_gmt":"2025-06-24T20:47:50","slug":"cyberbyters","status":"publish","type":"initiative","link":"https:\/\/knowledgeflow.org\/uk\/initiative\/cyberbyters\/","title":{"rendered":"CyberByters"},"content":{"rendered":"<style>.kb-row-layout-id31821_b20d03-c0 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_b20d03-c0 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_b20d03-c0 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-none, 0rem );max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:80px;padding-bottom:80px;grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id31821_b20d03-c0{background-color:rgba(163,197,206,0.09);}.kb-row-layout-id31821_b20d03-c0 > .kt-row-layout-overlay{opacity:0.30;}.kb-row-layout-id31821_b20d03-c0{z-index:1475;position:relative;}.kb-row-layout-id31821_b20d03-c0 .kt-row-layout-bottom-sep{height:100px;}.kb-row-layout-id31821_b20d03-c0 .kt-row-layout-bottom-sep svg{width:100%;}.kb-row-layout-id31821_b20d03-c0 .kt-row-layout-bottom-sep svg{fill:#ffffff!important;}@media all and (max-width: 1024px){.kb-row-layout-id31821_b20d03-c0 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 1024px){.kb-row-layout-id31821_b20d03-c0 .kt-row-layout-bottom-sep{height:px;}}@media all and (max-width: 1024px){.kb-row-layout-id31821_b20d03-c0 .kt-row-layout-bottom-sep svg{width:%;}}@media all and (max-width: 767px){.kb-row-layout-id31821_b20d03-c0 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_b20d03-c0 .kt-row-layout-bottom-sep{height:px;}.kb-row-layout-id31821_b20d03-c0 .kt-row-layout-bottom-sep svg{width:%;}}.kb-row-layout-id31821_b20d03-c0 {z-index: 10;}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_b20d03-c0 alignfull kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column31821_0c493e-ac > .kt-inside-inner-col{display:flex;}.kadence-column31821_0c493e-ac > .kt-inside-inner-col,.kadence-column31821_0c493e-ac > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_0c493e-ac > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_0c493e-ac > .kt-inside-inner-col{flex-direction:column;align-items:flex-start;}.kadence-column31821_0c493e-ac > .kt-inside-inner-col > .kb-image-is-ratio-size{align-self:stretch;}.kadence-column31821_0c493e-ac > .kt-inside-inner-col > .wp-block-kadence-advancedgallery{align-self:stretch;}.kadence-column31821_0c493e-ac > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_0c493e-ac > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_0c493e-ac{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_0c493e-ac > .kt-inside-inner-col{flex-direction:column;justify-content:center;align-items:flex-start;}}@media all and (max-width: 767px){.kadence-column31821_0c493e-ac > .kt-inside-inner-col{flex-direction:column;justify-content:center;align-items:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_0c493e-ac inner-column-1\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26, .wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26[data-kb-block=\"kb-adv-heading31821_1c4181-26\"]{padding-top:0px;margin-top:0px;margin-bottom:var(--global-kb-spacing-md, 2rem);text-align:left;font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26[data-kb-block=\"kb-adv-heading31821_1c4181-26\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26[data-kb-block=\"kb-adv-heading31821_1c4181-26\"] img.kb-inline-image{width:150px;vertical-align:baseline;}@media all and (max-width: 1024px){.wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26, .wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26[data-kb-block=\"kb-adv-heading31821_1c4181-26\"]{font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3;}}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26, .wp-block-kadence-advancedheading.kt-adv-heading31821_1c4181-26[data-kb-block=\"kb-adv-heading31821_1c4181-26\"]{font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3;}}<\/style>\n<p class=\"kt-adv-heading31821_1c4181-26 wp-block-kadence-advancedheading has-theme-palette-1-color has-text-color\" data-kb-block=\"kb-adv-heading31821_1c4181-26\">For Teachers<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92, .wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92[data-kb-block=\"kb-adv-heading31821_86583a-92\"]{max-width:960px;margin-top:0em;margin-bottom:0em;text-align:left;font-size:72px;line-height:1.1;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92[data-kb-block=\"kb-adv-heading31821_86583a-92\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92[data-kb-block=\"kb-adv-heading31821_86583a-92\"] img.kb-inline-image{width:150px;vertical-align:baseline;}@media all and (max-width: 1024px){.wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92, .wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92[data-kb-block=\"kb-adv-heading31821_86583a-92\"]{font-size:42px;line-height:1.1;}}@media all and (max-width: 767px){.wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92, .wp-block-kadence-advancedheading.kt-adv-heading31821_86583a-92[data-kb-block=\"kb-adv-heading31821_86583a-92\"]{font-size:28px;line-height:1.1;}}<\/style>\n<h1 class=\"kt-adv-heading31821_86583a-92 wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading31821_86583a-92\">CyberByters<\/h1>\n\n\n\n<p class=\"has-text-align-left\" style=\"padding-top:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60)\"><strong>Help your students explore, achieve, and thrive in the digital world.<\/strong><br>Support learners at every stage as they build skills to stay safe, think critically, and grow with confidence online. Along the way, students can earn certificates to celebrate their progress, and you can feel confident guiding them through each step.<\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column31821_2e1de8-60 > .kt-inside-inner-col,.kadence-column31821_2e1de8-60 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_2e1de8-60 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_2e1de8-60 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_2e1de8-60 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_2e1de8-60 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_2e1de8-60{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_2e1de8-60 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_2e1de8-60 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_2e1de8-60\"><div class=\"kt-inside-inner-col\"><style>.kb-image31821_1090a9-8e.kb-image-is-ratio-size, .kb-image31821_1090a9-8e .kb-image-is-ratio-size{max-width:466px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image31821_1090a9-8e.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image31821_1090a9-8e .kb-image-is-ratio-size{align-self:unset;}.kb-image31821_1090a9-8e{max-width:466px;}.image-is-svg.kb-image31821_1090a9-8e{-webkit-flex:0 1 100%;flex:0 1 100%;}.image-is-svg.kb-image31821_1090a9-8e img{width:100%;}.kb-image31821_1090a9-8e .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image31821_1090a9-8e size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"1024\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Untitled-design-28-732x1024.png\" alt=\"\" class=\"kb-img wp-image-32048\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Untitled-design-28-732x1024.png 732w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Untitled-design-28-214x300.png 214w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Untitled-design-28-768x1075.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Untitled-design-28-9x12.png 9w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Untitled-design-28-600x840.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Untitled-design-28.png 893w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id31821_fbd8ad-ee > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_fbd8ad-ee > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_fbd8ad-ee > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-lg, 4rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_fbd8ad-ee > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_fbd8ad-ee > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31821_fbd8ad-ee > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_fbd8ad-ee alignfull has-theme-palette9-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-row kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column31821_f84ac6-05 > .kt-inside-inner-col{padding-top:0px;padding-right:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);padding-left:var(--global-kb-spacing-lg, 3rem);}.kadence-column31821_f84ac6-05 > .kt-inside-inner-col,.kadence-column31821_f84ac6-05 > .kt-inside-inner-col:before{border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;}.kadence-column31821_f84ac6-05 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_f84ac6-05 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_f84ac6-05 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_f84ac6-05 > .kt-inside-inner-col{background-color:var(--global-palette8, #F7FAFC);}.kadence-column31821_f84ac6-05 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_f84ac6-05{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_f84ac6-05 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_f84ac6-05 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_f84ac6-05\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap{column-gap:var(--global-kb-gap-sm, 1rem);row-gap:var(--global-kb-gap-sm, 1rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);}.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap{grid-template-columns:repeat(3, minmax(0, 1fr));}.kb-row-layout-id31821_218ef1-cf > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap{column-gap:var(--global-kb-gap-sm, 1rem);grid-template-columns:repeat(3, minmax(0, 1fr));}}@media all and (max-width: 1024px){.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id31821_218ef1-cf{margin-top:var(--global-kb-spacing-xs, 1rem);}.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap{column-gap:var(--global-kb-gap-none, 0rem );row-gap:var(--global-kb-gap-sm, 1rem);padding-top:0px;padding-right:0px;padding-bottom:0px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_218ef1-cf > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_218ef1-cf alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-3-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kt-inner-column-height-full\">\n<style>.kadence-column31821_fe734b-62 > .kt-inside-inner-col,.kadence-column31821_fe734b-62 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_fe734b-62 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_fe734b-62 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_fe734b-62 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_fe734b-62 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_fe734b-62{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_fe734b-62 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_fe734b-62 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_fe734b-62\"><div class=\"kt-inside-inner-col\"><style>.kt-info-box31821_5171dc-7e{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_5171dc-7e{height:auto;align-self:stretch;}.kt-info-box31821_5171dc-7e .kt-blocks-info-box-link-wrap{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_5171dc-7e .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box31821_5171dc-7e .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;background:var(--global-palette9, #ffffff);padding-top:var(--global-kb-spacing-md, 2rem);padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);}.kt-info-box31821_5171dc-7e .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box31821_5171dc-7e .kt-info-svg-icon-flip, .kt-info-box31821_5171dc-7e .kt-blocks-info-box-number{font-size:50px;}.kt-info-box31821_5171dc-7e .kt-blocks-info-box-media{color:var(--global-palette3, #1A202C);background:var(--global-palette7, #EDF2F7);border-radius:10px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:10px;padding-right:10px;padding-bottom:10px;padding-left:10px;}.kt-info-box31821_5171dc-7e .kt-blocks-info-box-media-container{margin-top:0px;margin-right:15px;margin-bottom:0px;margin-left:15px;}.kt-info-box31821_5171dc-7e .kt-blocks-info-box-media .kadence-info-box-image-intrisic img{border-radius:10px;}.kt-info-box31821_5171dc-7e .kt-infobox-textcontent h3.kt-blocks-info-box-title{color:var(--global-palette3, #1A202C);font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3em;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_5171dc-7e .kt-infobox-textcontent .kt-blocks-info-box-text{color:var(--global-palette5, #4A5568);}.wp-block-kadence-infobox.kt-info-box31821_5171dc-7e .kt-blocks-info-box-text{font-size:var(--global-kb-font-size-sm, 0.9rem);}.kt-info-box31821_5171dc-7e .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}@media all and (max-width: 1024px){.kt-info-box31821_5171dc-7e .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);}}@media all and (max-width: 767px){.kt-info-box31821_5171dc-7e .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box31821_5171dc-7e\"><span class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-top kt-info-halign-center\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-icon-container kt-info-icon-animate-none\"><div class=\"kadence-info-box-icon-inner-container\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_check kt-info-svg-icon\"><svg viewBox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"20 6 9 17 4 12\"\/><\/svg><\/span><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><h3 class=\"kt-blocks-info-box-title\">Plug-and-Play Lesson Plans<\/h3><p class=\"kt-blocks-info-box-text\">Assign a CyberByters course for your class in <strong>Google Classroom,<\/strong> or your school LMS. No setup required, just choose the course and decide which activities to use.<\/p><\/div><\/span><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column31821_c4d62b-4b > .kt-inside-inner-col,.kadence-column31821_c4d62b-4b > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_c4d62b-4b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_c4d62b-4b > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_c4d62b-4b > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_c4d62b-4b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_c4d62b-4b{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_c4d62b-4b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_c4d62b-4b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_c4d62b-4b\"><div class=\"kt-inside-inner-col\"><style>.kt-info-box31821_9b5173-7e{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_9b5173-7e{height:auto;align-self:stretch;}.kt-info-box31821_9b5173-7e .kt-blocks-info-box-link-wrap{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_9b5173-7e .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box31821_9b5173-7e .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;background:var(--global-palette9, #ffffff);padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);}.kt-info-box31821_9b5173-7e .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box31821_9b5173-7e .kt-info-svg-icon-flip, .kt-info-box31821_9b5173-7e .kt-blocks-info-box-number{font-size:50px;}.kt-info-box31821_9b5173-7e .kt-blocks-info-box-media{color:var(--global-palette3, #1A202C);background:var(--global-palette7, #EDF2F7);border-radius:200px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:20px;padding-right:20px;padding-bottom:20px;padding-left:20px;}.kt-info-box31821_9b5173-7e .kt-blocks-info-box-media-container{margin-top:0px;margin-right:15px;margin-bottom:10px;margin-left:15px;}.kt-info-box31821_9b5173-7e .kt-blocks-info-box-media .kadence-info-box-image-intrisic img{border-radius:200px;}.kt-info-box31821_9b5173-7e .kt-infobox-textcontent h3.kt-blocks-info-box-title{color:var(--global-palette3, #1A202C);font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3em;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:5px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_9b5173-7e .kt-infobox-textcontent .kt-blocks-info-box-text{color:var(--global-palette5, #4A5568);}.wp-block-kadence-infobox.kt-info-box31821_9b5173-7e .kt-blocks-info-box-text{font-size:var(--global-kb-font-size-sm, 0.9rem);}.kt-info-box31821_9b5173-7e .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}@media all and (max-width: 1024px){.kt-info-box31821_9b5173-7e .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);}}@media all and (max-width: 767px){.kt-info-box31821_9b5173-7e .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box31821_9b5173-7e\"><span class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-top kt-info-halign-center\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-icon-container kt-info-icon-animate-none\"><div class=\"kadence-info-box-icon-inner-container\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_locked kt-info-svg-icon\"><svg viewBox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M3 0c-1.1 0-2 .9-2 2v1h-1v4h6v-4h-1v-1c0-1.1-.9-2-2-2zm0 1c.56 0 1 .44 1 1v1h-2v-1c0-.56.44-1 1-1z\" transform=\"translate(1)\"\/><\/svg><\/span><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><h3 class=\"kt-blocks-info-box-title\">Student Privacy<\/h3><p class=\"kt-blocks-info-box-text\">Courses are web-based and do not require students to create individual accounts, so no personal data is collected or tracked. Teachers manage progress and completion securely through their own LMS, ensuring a simple, anonymous, and student-friendly experience.<br><\/p><\/div><\/span><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column31821_eb4d94-af > .kt-inside-inner-col,.kadence-column31821_eb4d94-af > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_eb4d94-af > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_eb4d94-af > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_eb4d94-af > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_eb4d94-af > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_eb4d94-af{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_eb4d94-af > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_eb4d94-af > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_eb4d94-af\"><div class=\"kt-inside-inner-col\"><style>.kt-info-box31821_07d4f5-8a{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_07d4f5-8a{height:auto;align-self:stretch;}.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-link-wrap{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_07d4f5-8a .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;background:var(--global-palette9, #ffffff);padding-top:var(--global-kb-spacing-md, 2rem);padding-right:var(--global-kb-spacing-md, 2rem);padding-bottom:var(--global-kb-spacing-md, 2rem);padding-left:var(--global-kb-spacing-md, 2rem);}.kt-info-box31821_07d4f5-8a .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box31821_07d4f5-8a .kt-info-svg-icon-flip, .kt-info-box31821_07d4f5-8a .kt-blocks-info-box-number{font-size:50px;}.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-media{color:var(--global-palette3, #1A202C);background:var(--global-palette7, #EDF2F7);border-radius:10px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:10px;padding-right:10px;padding-bottom:10px;padding-left:10px;}.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-media-container{margin-top:0px;margin-right:15px;margin-bottom:0px;margin-left:15px;}.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-media .kadence-info-box-image-intrisic img{border-radius:10px;}.kt-info-box31821_07d4f5-8a .kt-infobox-textcontent h3.kt-blocks-info-box-title{color:var(--global-palette3, #1A202C);font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3em;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_07d4f5-8a .kt-infobox-textcontent .kt-blocks-info-box-text{color:var(--global-palette5, #4A5568);}.wp-block-kadence-infobox.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-text{font-size:var(--global-kb-font-size-sm, 0.9rem);}.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}@media all and (max-width: 1024px){.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);}}@media all and (max-width: 767px){.kt-info-box31821_07d4f5-8a .kt-blocks-info-box-link-wrap{border-top:1px solid var(--global-palette3, #1A202C);border-right:1px solid var(--global-palette3, #1A202C);border-bottom:1px solid var(--global-palette3, #1A202C);border-left:1px solid var(--global-palette3, #1A202C);}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box31821_07d4f5-8a\"><span class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-top kt-info-halign-center\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-icon-container kt-info-icon-animate-none\"><div class=\"kadence-info-box-icon-inner-container\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_star kt-info-svg-icon\"><svg viewBox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M4 0l-1 3h-3l2.5 2-1 3 2.5-2 2.5 2-1-3 2.5-2h-3l-1-3z\"\/><\/svg><\/span><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><h3 class=\"kt-blocks-info-box-title\">Printable Certificates<\/h3><p class=\"kt-blocks-info-box-text\">When students complete a CyberByters course, you can easily download a certificate of completion along with a takeaway checklist to acknowledge their hard work and learning.<\/p><\/div><\/span><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n\n<style>.kadence-column31821_b66efa-e8 > .kt-inside-inner-col,.kadence-column31821_b66efa-e8 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_b66efa-e8 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_b66efa-e8 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_b66efa-e8 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_b66efa-e8 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_b66efa-e8{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_b66efa-e8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_b66efa-e8 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_b66efa-e8\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-id31821_759a4e-f6 > .kt-row-column-wrap{align-content:center;}:where(.kb-row-layout-id31821_759a4e-f6 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:center;}.kb-row-layout-id31821_759a4e-f6 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-lg, 4rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, calc(40% - ((var(--global-kb-gap-lg, 4rem) * 1 )\/2)))minmax(0, calc(60% - ((var(--global-kb-gap-lg, 4rem) * 1 )\/2)));}.kb-row-layout-id31821_759a4e-f6 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_759a4e-f6 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31821_759a4e-f6 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_759a4e-f6 alignfull has-theme-palette9-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-row kt-mobile-layout-row kt-row-valign-middle kb-theme-content-width\">\n<style>.kadence-column31821_e93c95-15 > .kt-inside-inner-col,.kadence-column31821_e93c95-15 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_e93c95-15 > .kt-inside-inner-col{column-gap:0px;}.kadence-column31821_e93c95-15 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_e93c95-15 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_e93c95-15 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_e93c95-15{text-align:left;}.kadence-column31821_e93c95-15{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_e93c95-15 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_e93c95-15 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_e93c95-15 kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.kb-image31821_d2351a-26 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image31821_d2351a-26 size-full kb-image-is-ratio-size\"><div class=\"kb-is-ratio-image kb-image-ratio-land43\"><img loading=\"lazy\" decoding=\"async\" width=\"583\" height=\"576\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-24-111949.png\" alt=\"\" class=\"kb-img wp-image-32052\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-24-111949.png 583w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-24-111949-300x296.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-24-111949-12x12.png 12w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-24-111949-100x100.png 100w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\" \/><\/div><\/figure>\n<\/div><\/div>\n\n\n<style>.kadence-column31821_df29ad-2b > .kt-inside-inner-col{display:flex;}.kadence-column31821_df29ad-2b > .kt-inside-inner-col,.kadence-column31821_df29ad-2b > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_df29ad-2b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_df29ad-2b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column31821_df29ad-2b > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column31821_df29ad-2b{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31821_df29ad-2b{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31821_df29ad-2b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column31821_df29ad-2b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_df29ad-2b{text-align:left;}.kadence-column31821_df29ad-2b{position:relative;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column31821_df29ad-2b{align-self:center;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31821_df29ad-2b{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31821_df29ad-2b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 1024px){.kadence-column31821_df29ad-2b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column31821_df29ad-2b{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31821_df29ad-2b{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31821_df29ad-2b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column31821_df29ad-2b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_df29ad-2b kb-section-dir-vertical inner-column-1\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31821_4aa605-70, .wp-block-kadence-advancedheading.kt-adv-heading31821_4aa605-70[data-kb-block=\"kb-adv-heading31821_4aa605-70\"]{font-size:20px;font-weight:700;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading31821_4aa605-70 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_4aa605-70[data-kb-block=\"kb-adv-heading31821_4aa605-70\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_4aa605-70 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_4aa605-70[data-kb-block=\"kb-adv-heading31821_4aa605-70\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<div class=\"kt-adv-heading31821_4aa605-70 wp-block-kadence-advancedheading has-theme-palette-5-color has-text-color\" data-kb-block=\"kb-adv-heading31821_4aa605-70\">cYBERSAFETY aCADEMY<\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31821_49d04a-b1, .wp-block-kadence-advancedheading.kt-adv-heading31821_49d04a-b1[data-kb-block=\"kb-adv-heading31821_49d04a-b1\"]{margin-top:var(--global-kb-spacing-xxs, 0.5rem);margin-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:var(--global-kb-font-size-lg, 2rem);line-height:1.2;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31821_49d04a-b1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_49d04a-b1[data-kb-block=\"kb-adv-heading31821_49d04a-b1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_49d04a-b1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_49d04a-b1[data-kb-block=\"kb-adv-heading31821_49d04a-b1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading31821_49d04a-b1 wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading31821_49d04a-b1\">Want to Use Our LMS?<\/h2>\n\n\n\n<p>CyberByters is also available on our <strong>Cybersafety Academy<\/strong> LMS, which provides teachers with a classroom view of student progress and issues the certificates and badges of completion digitally. Students use anonymous accounts so that there is no collection of name, email or any other personal information. It&#8217;s private, it&#8217;s secure and student-friendly.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns31821_feaa71-b3{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns31821_feaa71-b3 .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns31821_feaa71-b3\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;border-top-color:var(--global-palette2, #2B6CB0);border-top-style:solid;border-right-color:var(--global-palette2, #2B6CB0);border-right-style:solid;border-bottom-color:var(--global-palette2, #2B6CB0);border-bottom-style:solid;border-left-color:var(--global-palette2, #2B6CB0);border-left-style:solid;}.wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button:focus{color:var(--global-palette9, #ffffff);background:var(--global-palette1, #3182CE);border-top-color:#444444;border-top-style:solid;border-right-color:#444444;border-right-style:solid;border-bottom-color:#444444;border-bottom-style:solid;border-left-color:#444444;border-left-style:solid;}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button{border-top-color:var(--global-palette2, #2B6CB0);border-top-style:solid;border-right-color:var(--global-palette2, #2B6CB0);border-right-style:solid;border-bottom-color:var(--global-palette2, #2B6CB0);border-bottom-style:solid;border-left-color:var(--global-palette2, #2B6CB0);border-left-style:solid;}}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button:focus{border-top-color:#444444;border-top-style:solid;border-right-color:#444444;border-right-style:solid;border-bottom-color:#444444;border-bottom-style:solid;border-left-color:#444444;border-left-style:solid;}}@media all and (max-width: 767px){.wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button{border-top-color:var(--global-palette2, #2B6CB0);border-top-style:solid;border-right-color:var(--global-palette2, #2B6CB0);border-right-style:solid;border-bottom-color:var(--global-palette2, #2B6CB0);border-bottom-style:solid;border-left-color:var(--global-palette2, #2B6CB0);border-left-style:solid;}.wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn31821_23c4ce-72.kb-button:focus{border-top-color:#444444;border-top-style:solid;border-right-color:#444444;border-right-style:solid;border-bottom-color:#444444;border-bottom-style:solid;border-left-color:#444444;border-left-style:solid;}}<\/style><a class=\"kb-button kt-button button kb-btn31821_23c4ce-72 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/cybersafetyacademy.org\/course\/index.php?categoryid=23\" target=\"_blank\" rel=\"noopener\"><span class=\"kt-btn-inner-text\">lEARN MORE<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n<\/div><\/div>\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31821_d986bf-ad, .wp-block-kadence-advancedheading.kt-adv-heading31821_d986bf-ad[data-kb-block=\"kb-adv-heading31821_d986bf-ad\"]{text-align:center;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31821_d986bf-ad mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_d986bf-ad[data-kb-block=\"kb-adv-heading31821_d986bf-ad\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_d986bf-ad img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_d986bf-ad[data-kb-block=\"kb-adv-heading31821_d986bf-ad\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading31821_d986bf-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31821_d986bf-ad\">Courses<\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31821_060f34-c8, .wp-block-kadence-advancedheading.kt-adv-heading31821_060f34-c8[data-kb-block=\"kb-adv-heading31821_060f34-c8\"]{text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31821_060f34-c8 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_060f34-c8[data-kb-block=\"kb-adv-heading31821_060f34-c8\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_060f34-c8 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_060f34-c8[data-kb-block=\"kb-adv-heading31821_060f34-c8\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31821_060f34-c8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31821_060f34-c8\">We offer a full range of courses, carefully designed to grow digital skills and safety knowledge at every grade level. Each course is mapped to provincial curriculum standards to support classroom learning and meet education requirements.<\/p>\n\n\n<style>.kb-row-layout-id31821_1a5c1a-ea > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_1a5c1a-ea > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_1a5c1a-ea > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-lg, 4rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:0px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_1a5c1a-ea > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_1a5c1a-ea > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31821_1a5c1a-ea > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_1a5c1a-ea alignfull has-theme-palette9-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column31821_989ef4-21 > .kt-inside-inner-col{padding-top:0px;padding-right:var(--global-kb-spacing-lg, 3rem);padding-bottom:0px;padding-left:var(--global-kb-spacing-lg, 3rem);}.kadence-column31821_989ef4-21 > .kt-inside-inner-col,.kadence-column31821_989ef4-21 > .kt-inside-inner-col:before{border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;}.kadence-column31821_989ef4-21 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_989ef4-21 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_989ef4-21 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_989ef4-21 > .kt-inside-inner-col{background-color:var(--global-palette9, #ffffff);}.kadence-column31821_989ef4-21 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_989ef4-21{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_989ef4-21 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_989ef4-21 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_989ef4-21\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-sm, 1rem);row-gap:var(--global-kb-gap-sm, 1rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);}.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}.kb-row-layout-id31821_97ec97-e1 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-sm, 1rem);grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 1024px){.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}@media all and (max-width: 767px){.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id31821_97ec97-e1{margin-top:var(--global-kb-spacing-xs, 1rem);}.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-none, 0rem );row-gap:var(--global-kb-gap-sm, 1rem);padding-top:0px;padding-right:0px;padding-bottom:0px;grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_97ec97-e1 > .kt-row-column-wrap > div:not(.added-for-specificity){grid-column:initial;}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_97ec97-e1 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-4-columns kt-row-layout-two-grid kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kt-inner-column-height-full\">\n<style>.kadence-column31821_cea84d-4c > .kt-inside-inner-col,.kadence-column31821_cea84d-4c > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_cea84d-4c > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_cea84d-4c > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_cea84d-4c > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_cea84d-4c > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_cea84d-4c{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_cea84d-4c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_cea84d-4c > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_cea84d-4c\"><div class=\"kt-inside-inner-col\"><style>.kt-info-box31821_2e27d8-98{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_2e27d8-98{height:auto;align-self:stretch;}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap{border-top:0px solid var(--global-palette8, #F7FAFC);border-right:0px solid var(--global-palette8, #F7FAFC);border-bottom:0px solid var(--global-palette8, #F7FAFC);border-left:0px solid var(--global-palette8, #F7FAFC);border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;background:var(--global-palette9, #ffffff);padding-top:var(--global-kb-spacing-lg, 3rem);padding-right:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);padding-left:var(--global-kb-spacing-lg, 3rem);}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap:hover{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;}.kt-info-box31821_2e27d8-98.wp-block-kadence-infobox{max-width:100%;}.kt-info-box31821_2e27d8-98 .kadence-info-box-image-inner-intrisic-container{max-width:350px;}.kt-info-box31821_2e27d8-98 .kadence-info-box-image-inner-intrisic-container .kadence-info-box-image-intrisic{padding-bottom:56.25%;width:1440px;height:0px;max-width:100%;}.kt-info-box31821_2e27d8-98 .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box31821_2e27d8-98 .kt-info-svg-icon-flip, .kt-info-box31821_2e27d8-98 .kt-blocks-info-box-number{font-size:50px;}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-media{color:var(--global-palette3, #1A202C);background:var(--global-palette7, #EDF2F7);border-radius:12px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-media-container{margin-top:0px;margin-right:0px;margin-bottom:16px;margin-left:0px;}.kt-info-box31821_2e27d8-98 .kt-infobox-textcontent h3.kt-blocks-info-box-title{color:var(--global-palette3, #1A202C);font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3em;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:5px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_2e27d8-98 .kt-infobox-textcontent .kt-blocks-info-box-text{color:var(--global-palette5, #4A5568);}.wp-block-kadence-infobox.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-text{font-size:var(--global-kb-font-size-md, 1.25rem);}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap{box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 35px 30px -5px rgba(0, 0, 0, 0.2);}@media all and (max-width: 1024px){.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap{border-top:0px solid var(--global-palette8, #F7FAFC);border-right:0px solid var(--global-palette8, #F7FAFC);border-bottom:0px solid var(--global-palette8, #F7FAFC);border-left:0px solid var(--global-palette8, #F7FAFC);padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}}@media all and (max-width: 1024px){.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 35px 30px -5px rgba(0, 0, 0, 0.2);}}@media all and (max-width: 767px){.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap{border-top:0px solid var(--global-palette8, #F7FAFC);border-right:0px solid var(--global-palette8, #F7FAFC);border-bottom:0px solid var(--global-palette8, #F7FAFC);border-left:0px solid var(--global-palette8, #F7FAFC);box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_2e27d8-98 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 35px 30px -5px rgba(0, 0, 0, 0.2);}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box31821_2e27d8-98\"><a class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-top kt-info-halign-center\" href=\"https:\/\/knowledgeflow.org\/initiative\/cyberbyters\/cyber-explorers\/\" aria-label=\"Start Learning\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic-container\"><div class=\"kadence-info-box-image-intrisic kt-info-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyberwise-parents-light-blue-banner.png\" alt=\"cyber explorers\" width=\"1440\" height=\"810\" class=\"kt-info-box-image wp-image-31846\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyberwise-parents-light-blue-banner.png 1440w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyberwise-parents-light-blue-banner-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyberwise-parents-light-blue-banner-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyberwise-parents-light-blue-banner-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyberwise-parents-light-blue-banner-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyberwise-parents-light-blue-banner-600x338.png 600w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><h3 class=\"kt-blocks-info-box-title\">Cyber Explorers (Grade 1 &#8211; 3)<\/h3><p class=\"kt-blocks-info-box-text\"><strong>Welcome to Cyber Explorers<\/strong><br>Kids in grades 1 to 3 learn online safety through fun games, stories, and activities. They discover how to make smart choices, protect personal information, and be kind online. At the end, they earn a Cyber Explorer Certificate to celebrate their new skills. \ud83d\ude80<\/p><\/div><\/a><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column31821_2c6a49-11 > .kt-inside-inner-col,.kadence-column31821_2c6a49-11 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_2c6a49-11 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_2c6a49-11 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_2c6a49-11 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_2c6a49-11 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_2c6a49-11{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_2c6a49-11 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_2c6a49-11 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_2c6a49-11\"><div class=\"kt-inside-inner-col\"><style>.kt-info-box31821_218178-40{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_218178-40{height:auto;align-self:stretch;}.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;background:var(--global-palette9, #ffffff);padding-top:var(--global-kb-spacing-lg, 3rem);padding-right:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);padding-left:var(--global-kb-spacing-lg, 3rem);}.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap:hover{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;}.kt-info-box31821_218178-40.wp-block-kadence-infobox{max-width:100%;}.kt-info-box31821_218178-40 .kadence-info-box-image-inner-intrisic-container{max-width:350px;}.kt-info-box31821_218178-40 .kadence-info-box-image-inner-intrisic-container .kadence-info-box-image-intrisic{padding-bottom:56.25%;width:1200px;height:0px;max-width:100%;}.kt-info-box31821_218178-40 .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box31821_218178-40 .kt-info-svg-icon-flip, .kt-info-box31821_218178-40 .kt-blocks-info-box-number{font-size:50px;}.kt-info-box31821_218178-40 .kt-blocks-info-box-media{color:var(--global-palette3, #1A202C);background:var(--global-palette7, #EDF2F7);border-radius:11px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-info-box31821_218178-40 .kt-blocks-info-box-media-container{margin-top:0px;margin-right:0px;margin-bottom:16px;margin-left:0px;}.kt-info-box31821_218178-40 .kt-infobox-textcontent h3.kt-blocks-info-box-title{color:var(--global-palette3, #1A202C);font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3em;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:5px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_218178-40 .kt-infobox-textcontent .kt-blocks-info-box-text{color:var(--global-palette5, #4A5568);}.wp-block-kadence-infobox.kt-info-box31821_218178-40 .kt-blocks-info-box-text{font-size:var(--global-kb-font-size-md, 1.25rem);}.kt-info-box31821_218178-40 .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap{box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 60px -15px rgba(0, 0, 0, 0.2);}@media all and (max-width: 1024px){.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap{padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}}@media all and (max-width: 1024px){.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 60px -15px rgba(0, 0, 0, 0.2);}}@media all and (max-width: 767px){.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap{box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_218178-40 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 60px -15px rgba(0, 0, 0, 0.2);}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box31821_218178-40\"><a class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-top kt-info-halign-center\" href=\"https:\/\/knowledgeflow.org\/initiative\/cyberbyters\/cyber-wizards\/\" aria-label=\"Start Learning\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic-container\"><div class=\"kadence-info-box-image-intrisic kt-info-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Cyber-Wizard-Academy-banner-final.png\" alt=\"cyber wizards\" width=\"1200\" height=\"675\" class=\"kt-info-box-image wp-image-31844\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Cyber-Wizard-Academy-banner-final.png 1200w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Cyber-Wizard-Academy-banner-final-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Cyber-Wizard-Academy-banner-final-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Cyber-Wizard-Academy-banner-final-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Cyber-Wizard-Academy-banner-final-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/Cyber-Wizard-Academy-banner-final-600x338.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><h3 class=\"kt-blocks-info-box-title\">Cyber Wizards (Grade 4 &#8211; 7)<\/h3><p class=\"kt-blocks-info-box-text\"><strong>Welcome to Cyber Wizards<\/strong><br>Guided by Hoot the Owl, students in grades 4 to 6 learn to stay safe online, create strong passwords, spot scams, and protect privacy. They earn a Cyber Wizard Certificate and a magical safety checklist! \ud83e\uddd9<\/p><\/div><\/a><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column31821_fabb36-69 > .kt-inside-inner-col,.kadence-column31821_fabb36-69 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_fabb36-69 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_fabb36-69 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_fabb36-69 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_fabb36-69 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_fabb36-69{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_fabb36-69 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_fabb36-69 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_fabb36-69\"><div class=\"kt-inside-inner-col\"><style>.kt-info-box31821_d279e5-89{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_d279e5-89{height:auto;align-self:stretch;}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;background:var(--global-palette9, #ffffff);padding-top:var(--global-kb-spacing-lg, 3rem);padding-right:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);padding-left:var(--global-kb-spacing-lg, 3rem);}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap:hover{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;}.kt-info-box31821_d279e5-89.wp-block-kadence-infobox{max-width:100%;}.kt-info-box31821_d279e5-89 .kadence-info-box-image-inner-intrisic-container{max-width:350px;}.kt-info-box31821_d279e5-89 .kadence-info-box-image-inner-intrisic-container .kadence-info-box-image-intrisic{padding-bottom:56.25%;width:1440px;height:0px;max-width:100%;}.kt-info-box31821_d279e5-89 .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box31821_d279e5-89 .kt-info-svg-icon-flip, .kt-info-box31821_d279e5-89 .kt-blocks-info-box-number{font-size:50px;}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-media{color:var(--global-palette3, #1A202C);background:var(--global-palette7, #EDF2F7);border-radius:12px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-media-container{margin-top:0px;margin-right:0px;margin-bottom:16px;margin-left:0px;}.kt-info-box31821_d279e5-89 .kt-infobox-textcontent h3.kt-blocks-info-box-title{color:var(--global-palette3, #1A202C);font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3em;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:5px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_d279e5-89 .kt-infobox-textcontent .kt-blocks-info-box-text{color:var(--global-palette5, #4A5568);}.wp-block-kadence-infobox.kt-info-box31821_d279e5-89 .kt-blocks-info-box-text{font-size:var(--global-kb-font-size-md, 1.25rem);}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap{box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}@media all and (max-width: 1024px){.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap{padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}}@media all and (max-width: 1024px){.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}}@media all and (max-width: 767px){.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap{box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_d279e5-89 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box31821_d279e5-89\"><a class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-top kt-info-halign-center\" href=\"https:\/\/knowledgeflow.org\/initiative\/cyberbyters\/cyber-defenders\/\" aria-label=\"Start Learning\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic-container\"><div class=\"kadence-info-box-image-intrisic kt-info-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-defenders-banner.png\" alt=\"cyber defenders\" width=\"1440\" height=\"810\" class=\"kt-info-box-image wp-image-31843\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-defenders-banner.png 1440w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-defenders-banner-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-defenders-banner-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-defenders-banner-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-defenders-banner-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-defenders-banner-600x338.png 600w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><h3 class=\"kt-blocks-info-box-title\">Cyber defenders (Grade 7 &#8211; 9)<\/h3><p class=\"kt-blocks-info-box-text\">Welcome, future <strong>Cyber Defenders!<\/strong> Designed for <strong>grades 7\u20139<\/strong>, this program empowers students to protect personal info, handle online risks and drama, and make smart digital choices. Finish strong with a <strong>Cyber Defender Certificate<\/strong> and lead confidently in the digital world! \ud83d\udee1\ufe0f<br><\/p><\/div><\/a><\/div>\n<\/div><\/div>\n\n\n<style>.kadence-column31821_82927c-f0 > .kt-inside-inner-col,.kadence-column31821_82927c-f0 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_82927c-f0 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_82927c-f0 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_82927c-f0 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_82927c-f0 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_82927c-f0{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_82927c-f0 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_82927c-f0 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_82927c-f0\"><div class=\"kt-inside-inner-col\"><style>.kt-info-box31821_b7ddd3-95{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_b7ddd3-95{height:auto;align-self:stretch;}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap{height:100%;}.wp-block-kadence-column.kb-section-dir-horizontal > .kt-inside-inner-col > .kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap{max-width:unset;}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap{background:var(--global-palette9, #ffffff);padding-top:var(--global-kb-spacing-lg, 3rem);padding-right:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-lg, 3rem);padding-left:var(--global-kb-spacing-lg, 3rem);}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap:hover{border-top-left-radius:10px;border-top-right-radius:10px;border-bottom-right-radius:10px;border-bottom-left-radius:10px;}.kt-info-box31821_b7ddd3-95.wp-block-kadence-infobox{max-width:100%;}.kt-info-box31821_b7ddd3-95 .kadence-info-box-image-inner-intrisic-container{max-width:350px;}.kt-info-box31821_b7ddd3-95 .kadence-info-box-image-inner-intrisic-container .kadence-info-box-image-intrisic{padding-bottom:56.25%;width:1200px;height:0px;max-width:100%;}.kt-info-box31821_b7ddd3-95 .kadence-info-box-icon-container .kt-info-svg-icon, .kt-info-box31821_b7ddd3-95 .kt-info-svg-icon-flip, .kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-number{font-size:50px;}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-media{color:var(--global-palette3, #1A202C);background:var(--global-palette7, #EDF2F7);border-radius:11px;overflow:hidden;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-media-container{margin-top:0px;margin-right:0px;margin-bottom:16px;margin-left:0px;}.kt-info-box31821_b7ddd3-95 .kt-infobox-textcontent h3.kt-blocks-info-box-title{color:var(--global-palette3, #1A202C);font-size:var(--global-kb-font-size-md, 1.25rem);line-height:1.3em;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:5px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_b7ddd3-95 .kt-infobox-textcontent .kt-blocks-info-box-text{color:var(--global-palette5, #4A5568);}.wp-block-kadence-infobox.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-text{font-size:var(--global-kb-font-size-md, 1.25rem);padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-learnmore{background:transparent;border-width:0px 0px 0px 0px;padding-top:4px;padding-right:8px;padding-bottom:4px;padding-left:8px;margin-top:10px;margin-right:0px;margin-bottom:10px;margin-left:0px;}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap{box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}@media all and (max-width: 1024px){.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap{padding-top:var(--global-kb-spacing-xs, 1rem);padding-right:var(--global-kb-spacing-xs, 1rem);padding-bottom:var(--global-kb-spacing-xs, 1rem);padding-left:var(--global-kb-spacing-xs, 1rem);box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}}@media all and (max-width: 1024px){.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}}@media all and (max-width: 767px){.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap{box-shadow:0px 0px 0px 0px rgba(0, 0, 0, 0);}.kt-info-box31821_b7ddd3-95 .kt-blocks-info-box-link-wrap:hover{box-shadow:0px 0px 14px 0px rgba(0, 0, 0, 0.2);}}<\/style>\n<div class=\"wp-block-kadence-infobox kt-info-box31821_b7ddd3-95\"><a class=\"kt-blocks-info-box-link-wrap info-box-link kt-blocks-info-box-media-align-top kt-info-halign-center\" href=\"https:\/\/knowledgeflow.org\/initiative\/cyberbyters\/cyber-smart\/\" aria-label=\"Start Learning\"><div class=\"kt-blocks-info-box-media-container\"><div class=\"kt-blocks-info-box-media kt-info-media-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic-container\"><div class=\"kadence-info-box-image-intrisic kt-info-animate-none\"><div class=\"kadence-info-box-image-inner-intrisic\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-2-1.png\" alt=\"\" width=\"1200\" height=\"675\" class=\"kt-info-box-image wp-image-31847\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-2-1.png 1200w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-2-1-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-2-1-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-2-1-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-2-1-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-2-1-600x338.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"kt-infobox-textcontent\"><h3 class=\"kt-blocks-info-box-title\">Cyber Smart (Grade 10 &#8211; 12)<\/h3><p class=\"kt-blocks-info-box-text\">The <strong>Cyber Smart Certificate Program<\/strong> helps <strong>grades 10\u201312<\/strong> students build digital confidence and prepare for life beyond school. They\u2019ll learn about cybersafety, managing online identity, and tech career paths. Completing the course earns them the <strong>Cyber Smart Certificate<\/strong>. A step toward responsible digital citizenship and leadership. \ud83e\uddd1\u200d\ud83c\udf93<\/p><\/div><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id31821_847693-14 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_847693-14 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_847693-14 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_847693-14 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_847693-14 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31821_847693-14 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_847693-14 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col,.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_b2a1eb-18{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_b2a1eb-18 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_b2a1eb-18\"><div class=\"kt-inside-inner-col\"><style>.kb-row-layout-id31821_317ffc-20 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_317ffc-20 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_317ffc-20 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_317ffc-20 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_317ffc-20 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31821_317ffc-20 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_317ffc-20 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31821_5c04af-25 > .kt-inside-inner-col,.kadence-column31821_5c04af-25 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_5c04af-25 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_5c04af-25 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_5c04af-25 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_5c04af-25 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_5c04af-25{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_5c04af-25 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_5c04af-25 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_5c04af-25\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31821_409803-47, .wp-block-kadence-advancedheading.kt-adv-heading31821_409803-47[data-kb-block=\"kb-adv-heading31821_409803-47\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31821_409803-47 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_409803-47[data-kb-block=\"kb-adv-heading31821_409803-47\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_409803-47 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_409803-47[data-kb-block=\"kb-adv-heading31821_409803-47\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading31821_409803-47 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31821_409803-47\">Course Alignment<\/h2>\n\n\n\n<p>To help you understand how our courses fit with your local education standards, select your province below. You\u2019ll find detailed information on how each course aligns with the curriculum requirements set by your province\u2019s education authority. This way, you can be confident that the learning goals match what\u2019s expected in your classroom.<\/p>\n\n\n\n<table id=\"tablepress-7\" class=\"tablepress tablepress-id-7\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><strong>Province<\/strong><\/th><th class=\"column-2\"><strong>Course<\/strong><\/th><th class=\"column-3\"><strong>Subject<\/strong><\/th><th class=\"column-4\"><strong>Strand<\/strong><\/th><th class=\"column-5\"><strong>Expectations<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.1: Digital Citizenship<br \/>\ndemonstrate an understanding of their rights and responsibilities when interacting online with appropriate permission, and make decisions that contribute positively to the development of their digital identity and those of their communities<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.2: Online Safety, Well-Being, and Etiquette<br \/>\ndemonstrate an understanding of how to navigate online environments safely, manage their privacy, and interact in a way that supports their well-being and that of others, including seeking appropriate permission<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.5: Media, Audience, and Production<br \/>\ndemonstrate an understanding of the interrelationships between the form, message, and context of a text, the audience, and the creator<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.7: Community and Cultural Awareness<br \/>\ncommunicate and collaborate with various communities in a safe, respectful, responsible, and inclusive manner when using online platforms and environments, including digital and media tools, and demonstrate cultural awareness with members of the community<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.1: Digital Citizenship<br \/>\nexplain their rights and responsibilities when interacting online with appropriate permission, and make decisions that contribute positively to the development of their digital identity and those of their communities<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.2: Online Safety, Well-Being, and Etiquette<br \/>\ndemonstrate an understanding of how to navigate online environments safely, manage their privacy and personal data, and interact in a way that supports their well-being and that of others, including seeking appropriate permission<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.3: Research and Information Literacy<br \/>\ngather, evaluate, and use information, considering validity, credibility, accuracy, and perspectives, to construct knowledge, create texts, and demonstrate learning<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.7: Community and Cultural Awareness<br \/>\ncommunicate and collaborate with various communities in a safe, respectful, responsible, and inclusive manner when using online platforms and environments, including digital and media tools, and demonstrate cultural awareness with members of the community<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.1: Digital Citizenship<br \/>\nevaluate and explain their rights and responsibilities when interacting online with appropriate permission, and make decisions that contribute positively to the development of their digital identity and those of their communities<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.2: Online Safety, Well-Being, and Etiquette<br \/>\ndemonstrate an understanding of how to navigate online environments safely, manage their privacy, personal data, and security, and interact in a way that supports their well-being and that of others, including seeking appropriate permission<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.2: Online Safety, Well-Being, and Etiquette<br \/>\ndemonstrate an understanding of how to navigate online environments safely, manage their privacy, personal data, and security, and interact in a way that supports their well-being and that of others, including seeking appropriate permission<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.5: Media, Audience, and Production<br \/>\ndemonstrate an understanding of the interrelationships between the form, message, and context of texts, the intended and unintended audience, and the purpose for production<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/elementary-language\" target=\"_blank\" rel=\"noopener\">Language<\/a><\/td><td class=\"column-4\">Digital Media Literacy<\/td><td class=\"column-5\">A2.7: Community and Cultural Awareness<br \/>\ncommunicate and collaborate with various communities in a safe, respectful, responsible, and inclusive manner when using online platforms and environments, including digital and media tools, and demonstrate and model cultural awareness with members of the community<\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/computer-studies\/courses\/icd2o\/strands\" target=\"_blank\" rel=\"noopener\"> Computational Thinking and Making Connections <\/a><\/td><td class=\"column-4\">Digital Technology and Society<\/td><td class=\"column-5\">A2.1 investigate current social, cultural, economic, environmental, and ethical issues related to digital technology that have personal, local, and global impacts, taking various perspectives into account<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/computer-studies\/courses\/icd2o\/strands\" target=\"_blank\" rel=\"noopener\"> Computational Thinking and Making Connections <\/a><\/td><td class=\"column-4\">Digital Technology and Society<\/td><td class=\"column-5\">A2.2 analyze personal and societal safety and cybersecurity issues related to digital technology, and identify measures and technologies that can help mitigate related concerns for individuals and communities<\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/computer-studies\/courses\/icd2o\/strands\" target=\"_blank\" rel=\"noopener\"> Computational Thinking and Making Connections <\/a><\/td><td class=\"column-4\">Digital Technology and Society<\/td><td class=\"column-5\">A2.3 investigate contributions to innovations in digital technology and computing by people from diverse local, Canadian, and global communities, including Indigenous communities in Canada and around the world<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/computer-studies\/courses\/icd2o\/strands\" target=\"_blank\" rel=\"noopener\"> Computational Thinking and Making Connections <\/a><\/td><td class=\"column-4\">Digital Technology and Society<\/td><td class=\"column-5\">A2.4 investigate how to identify and address bias involving digital technology<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/computer-studies\/courses\/icd2o\/strands\" target=\"_blank\" rel=\"noopener\"> Computational Thinking and Making Connections <\/a><\/td><td class=\"column-4\">Digital Technology and Society<\/td><td class=\"column-5\">A2.5 analyze accessibility issues involving digital technology, and identify measures that can improve accessibility<\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/computer-studies\/courses\/icd2o\/strands\" target=\"_blank\" rel=\"noopener\"> Computational Thinking and Making Connections <\/a><\/td><td class=\"column-4\">Cybersecurity and Data<\/td><td class=\"column-5\">B3.1 apply safe and effective data practices when using digital technology in various contexts<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">Ontario<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.dcp.edu.gov.on.ca\/en\/curriculum\/computer-studies\/courses\/icd2o\/strands\" target=\"_blank\" rel=\"noopener\"> Computational Thinking and Making Connections <\/a><\/td><td class=\"column-4\">Cybersecurity and Data<\/td><td class=\"column-5\">B3.2 apply safe and effective security practices, including practices to protect their privacy, when using digital technology in various contexts<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/1\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Describe ways to prevent and respond to a variety of unsafe and or uncomfortable situations<\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/1\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Develop and demonstrate respectful behaviour when participating in activities with others<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/1\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Identify caring behaviours among classmates and within families<\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/1\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Healthy and active living<\/td><td class=\"column-5\">Identify opportunities to make choices that contribute to health and well-being<\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/1\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Healthy and active living<\/td><td class=\"column-5\">Recognize basic health information from a variety of sources<\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/2\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Identify and describe avoidance or assertiveness strategies to use in unsafe and\/or uncomfortable situations<\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/2\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Develop and demonstrate respectful behaviour when participating in activities with others<\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/3\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Mental well-being<\/td><td class=\"column-5\">Describe factors that influence mental well-being and self-identity<\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/1\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Skills<\/td><td class=\"column-5\">Use materials, tools, and technologies in a safe manner in both physical and digital environments<\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/1\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Technologies<\/td><td class=\"column-5\">Explore the use of simple, available tools and technologies to extend their capabilities<\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/4\/core\" target=\"_blank\" rel=\"noopener\">Physical and Health Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Identify and describe avoidance or assertiveness strategies to use in unsafe and\/or uncomfortable situations<\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/4\/core\" target=\"_blank\" rel=\"noopener\">Physical and Health Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Describe and assess strategies for responding to discrimination, stereotyping, and bullying<\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/4\/core\" target=\"_blank\" rel=\"noopener\">Physical and Health Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Describe and apply strategies for developing and maintaining positive relationships<\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/4\/core\" target=\"_blank\" rel=\"noopener\">Physical and Health Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Describe and apply strategies that promote a safe and caring environment<\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/5\/core\" target=\"_blank\" rel=\"noopener\">Physical and Health Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Identify and describe strategies for avoiding and\/or responding to potentially unsafe, abusive, or exploitive situations<\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/4\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Skills<\/td><td class=\"column-5\">Use materials, tools, and technologies in a safe manner, and with an awareness of the safety of others, in both physical and digital environments<\/td>\n<\/tr>\n<tr class=\"row-38\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/4\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Technologies<\/td><td class=\"column-5\">Demonstrate a willingness to learn new technologies as needed<\/td>\n<\/tr>\n<tr class=\"row-39\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/6\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Skills<\/td><td class=\"column-5\">Demonstrate an awareness of precautionary and emergency safety procedures in both physical and digital environments<\/td>\n<\/tr>\n<tr class=\"row-40\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/6\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Technologies<\/td><td class=\"column-5\">Identify the personal, social, and environmental impacts, including unintended negative consequences, of the choices they make about technology use<\/td>\n<\/tr>\n<tr class=\"row-41\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/7\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Identify and describe strategies for avoiding and\/or responding to potentially unsafe, abusive, or exploitive situations<\/td>\n<\/tr>\n<tr class=\"row-42\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/7\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Describe and assess strategies for responding to discrimination, stereotyping, and bullying<\/td>\n<\/tr>\n<tr class=\"row-43\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/7\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Describe and apply strategies for developing and maintaining healthy relationships<\/td>\n<\/tr>\n<tr class=\"row-44\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/physical-health-education\/7\/core\" target=\"_blank\" rel=\"noopener\">Health and Physical Education<\/a><\/td><td class=\"column-4\">Social and community health<\/td><td class=\"column-5\">Explore strategies for promoting the health and well-being of the school and community<\/td>\n<\/tr>\n<tr class=\"row-45\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/7\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Skills<\/td><td class=\"column-5\">Demonstrate an awareness of precautionary and emergency safety procedures in both physical and digital environments<\/td>\n<\/tr>\n<tr class=\"row-46\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/7\/core\" target=\"_blank\" rel=\"noopener\">Applied Design, Skills, and Technologies<\/a><\/td><td class=\"column-4\">Applied Technologies<\/td><td class=\"column-5\">Identify the personal, social, and environmental impacts, including unintended negative consequences, of the choices they make about technology use<\/td>\n<\/tr>\n<tr class=\"row-47\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/10\/computer-studies\" target=\"_blank\" rel=\"noopener\">Computer Studies<\/a><\/td><td class=\"column-4\">Applied Skills<\/td><td class=\"column-5\">Demonstrate an awareness of precautionary and emergency safety procedures in both physical and digital environments<\/td>\n<\/tr>\n<tr class=\"row-48\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/10\/computer-studies\" target=\"_blank\" rel=\"noopener\">Computer Studies<\/a><\/td><td class=\"column-4\">Applied Technologies<\/td><td class=\"column-5\">Evaluate impacts, including unintended negative consequences, of choices made about technology use<\/td>\n<\/tr>\n<tr class=\"row-49\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/11\/digital-communications\" target=\"_blank\" rel=\"noopener\">Digital Communications <\/a><\/td><td class=\"column-4\">Applied Technologies<\/td><td class=\"column-5\">Explore existing, new, and emerging tools, technologies, and systems and evaluate their suitability for their design interests<\/td>\n<\/tr>\n<tr class=\"row-50\">\n\t<td class=\"column-1\">British Columbia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.gov.bc.ca\/curriculum\/adst\/11\/digital-communications\" target=\"_blank\" rel=\"noopener\">Digital Communications <\/a><\/td><td class=\"column-4\">Applied Technologies<\/td><td class=\"column-5\">Analyze the role technologies play in societal change<\/td>\n<\/tr>\n<tr class=\"row-51\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde1?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Demonstrate appropriate responses to environmental cues.<\/td>\n<\/tr>\n<tr class=\"row-52\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde1?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Discuss needs and wants that connect to feelings of safety and security.<\/td>\n<\/tr>\n<tr class=\"row-53\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde1?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify how boundaries might protect a person or a group of individuals.<\/td>\n<\/tr>\n<tr class=\"row-54\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde2?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Examine how safety can be improved in a variety of situations.<\/td>\n<\/tr>\n<tr class=\"row-55\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde3?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Generate examples of situations where behaviours would be appropriate and others where they would involve risk.<\/td>\n<\/tr>\n<tr class=\"row-56\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde3?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify available resources that support safety.<\/td>\n<\/tr>\n<tr class=\"row-57\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/sci3?s=SCI\" target=\"_blank\" rel=\"noopener\">Science<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Compare the trustworthiness of sources of data.<\/td>\n<\/tr>\n<tr class=\"row-58\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/sci3?s=SCI\" target=\"_blank\" rel=\"noopener\">Science<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Collect data using techniques to improve the accuracy of data.<\/td>\n<\/tr>\n<tr class=\"row-59\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/sci4?s=SCI\" target=\"_blank\" rel=\"noopener\">Science<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Draw conclusions, using reliable and valid evidence from investigations.<\/td>\n<\/tr>\n<tr class=\"row-60\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/sci5?s=SCI\" target=\"_blank\" rel=\"noopener\">Science<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify biases that could influence an investigation.<\/td>\n<\/tr>\n<tr class=\"row-61\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/sci5?s=SCI\" target=\"_blank\" rel=\"noopener\">Science<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Discuss potential impacts of evidence that is not communicated clearly and accurately.<\/td>\n<\/tr>\n<tr class=\"row-62\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde6?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Discuss how feelings associated with risk taking affect actions and decisions.<\/td>\n<\/tr>\n<tr class=\"row-63\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde6?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Assess safety and vulnerability risks associated with use of digital technology.<\/td>\n<\/tr>\n<tr class=\"row-64\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde6?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify potential harms from online and social media use.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-65\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde6?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Explain how to deal with unwanted attention, communication, or images.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-66\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde5?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Reflect on how the results or consequences of personal actions and decisions can affect the well-being of self and others.<\/td>\n<\/tr>\n<tr class=\"row-67\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde5?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Examine the impacts of a variety of factors on personal actions and decisions.<\/td>\n<\/tr>\n<tr class=\"row-68\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde5?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify laws, rules, practices, and protocols that support safety and well-being in a variety of contexts.<\/td>\n<\/tr>\n<tr class=\"row-69\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde5?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Practise digital citizenship by being considerate of others.<\/td>\n<\/tr>\n<tr class=\"row-70\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde4?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Describe responsibility and its impact on personal and group safety in a variety of contexts.<\/td>\n<\/tr>\n<tr class=\"row-71\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde4?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify situations where responsibility supports the rights and feelings of others.<\/td>\n<\/tr>\n<tr class=\"row-72\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde4?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Examine how responsibility can impact safety in a variety of situations.<\/td>\n<\/tr>\n<tr class=\"row-73\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde4?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Recognize harmful bullying behaviours.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-74\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.learnalberta.ca\/curriculum\/en\/c\/pde4?s=PDE\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify actions that can be taken when bullying occurs.<br \/>\n<\/td>\n<\/tr>\n<tr class=\"row-75\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.learnalberta.ca\/ProgramOfStudy.aspx?lang=en&amp;ProgramId=317413#531726\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\">Safety and Responsibility<\/td><td class=\"column-5\">W-7.7 analyze the definition, effects and possible consequences of various forms of harassment<\/td>\n<\/tr>\n<tr class=\"row-76\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.learnalberta.ca\/ProgramOfStudy.aspx?lang=en&amp;ProgramId=317413#531726\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\">Safety and Responsibility<\/td><td class=\"column-5\">W-7.8 analyze and appreciate differing personal perspectives on safety; e.g., physical, emotional, social safety<\/td>\n<\/tr>\n<tr class=\"row-77\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.learnalberta.ca\/ProgramOfStudy.aspx?lang=en&amp;ProgramId=317413#531726\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\">Safety and Responsibility<\/td><td class=\"column-5\">W-7.10 identify and examine potential sources of physical\/emotional\/social support<\/td>\n<\/tr>\n<tr class=\"row-78\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.learnalberta.ca\/ProgramOfStudy.aspx?lang=en&amp;ProgramId=317413#531726\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\">Safety and Responsibility<\/td><td class=\"column-5\">W-9.10 assess the quality and reliability of health information provided by different sources; e.g., on the Internet<\/td>\n<\/tr>\n<tr class=\"row-79\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/www.learnalberta.ca\/ProgramOfStudy.aspx?lang=en&amp;ProgramId=317413#531726\" target=\"_blank\" rel=\"noopener\">Physical Education and Wellness<\/a><\/td><td class=\"column-4\">Interactions<\/td><td class=\"column-5\">R-9.6 model integrity and honesty in accordance with ethical principles; e.g., develop strategies to behave in an ethical manner<\/td>\n<\/tr>\n<tr class=\"row-80\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">access diverse viewpoints on particular topics by using appropriate technologies<\/td>\n<\/tr>\n<tr class=\"row-81\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">assemble and organize different viewpoints in order to assess their validity<\/td>\n<\/tr>\n<tr class=\"row-82\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">use information technology to find facts that support or refute diverse viewpoints<\/td>\n<\/tr>\n<tr class=\"row-83\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">evaluate the authority and reliability of electronic sources<\/td>\n<\/tr>\n<tr class=\"row-84\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">evaluate the relevance of electronically accessed information to a particular topic<\/td>\n<\/tr>\n<tr class=\"row-85\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">evaluate the relevance of electronically accessed information to a particular topic<\/td>\n<\/tr>\n<tr class=\"row-86\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">describe the impact of communication technologies on past, present and future workplaces, lifestyles and the<br \/>\n environment<\/td>\n<\/tr>\n<tr class=\"row-87\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">identify potential technology-related career paths<\/td>\n<\/tr>\n<tr class=\"row-88\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">explain the issues involved in balancing the right to access information with the right to personal privacy<\/td>\n<\/tr>\n<tr class=\"row-89\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">model and assume personal responsibility for ethical behaviour and attitudes and acceptable use of information technologies and sources in local and global contexts<\/td>\n<\/tr>\n<tr class=\"row-90\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\"> identify aspects of style in a presentation<\/td>\n<\/tr>\n<tr class=\"row-91\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">understand the nature of various media and how they are consciously used to influence an audience<\/td>\n<\/tr>\n<tr class=\"row-92\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">identify specific techniques used by the media to elicit particular responses from an audience<\/td>\n<\/tr>\n<tr class=\"row-93\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">recognize that the ability of technology to manipulate images and sound can alter the meaning of a communication<\/td>\n<\/tr>\n<tr class=\"row-94\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">identify and apply safety procedures required for the technology being used<\/td>\n<\/tr>\n<tr class=\"row-95\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">consult a wide variety of sources that reflect varied viewpoints on particular topics<\/td>\n<\/tr>\n<tr class=\"row-96\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">evaluate the validity of gathered viewpoints against other  sources<\/td>\n<\/tr>\n<tr class=\"row-97\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Communicating, Inquiring, Decision Making and Problem Solving<\/td><td class=\"column-5\">assess the authority, reliability and validity of electronically accessed information<\/td>\n<\/tr>\n<tr class=\"row-98\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\"> evaluate possible potential for emerging technologies<\/td>\n<\/tr>\n<tr class=\"row-99\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">use current, reliable information sources from around the world<\/td>\n<\/tr>\n<tr class=\"row-100\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">analyze and assess the impact of technology on the global community<\/td>\n<\/tr>\n<tr class=\"row-101\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\"> demonstrate an understanding of how changes in technology can benefit or harm society<\/td>\n<\/tr>\n<tr class=\"row-102\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\"> evaluate the influence and results of digital manipulation on our perceptions<\/td>\n<\/tr>\n<tr class=\"row-103\">\n\t<td class=\"column-1\">Alberta<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/education.alberta.ca\/media\/3114953\/ictpos.pdf\" target=\"_blank\" rel=\"noopener\">Information and Communication Technology<\/a><\/td><td class=\"column-4\">Foundational Operations, Knowledge and Concepts<\/td><td class=\"column-5\">identify and analyze a variety of factors that affect the authenticity of information derived from mass media and electronic communication<\/td>\n<\/tr>\n<tr class=\"row-104\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/english-language-arts\/#\" target=\"_blank\" rel=\"noopener\">English Language Arts<\/a><\/td><td class=\"column-4\">Reception<\/td><td class=\"column-5\">Receive information from others<\/td>\n<\/tr>\n<tr class=\"row-105\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/english-language-arts\/#\" target=\"_blank\" rel=\"noopener\">English Language Arts<\/a><\/td><td class=\"column-4\">Reception<\/td><td class=\"column-5\">Reflect while others are speaking<\/td>\n<\/tr>\n<tr class=\"row-106\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/physical-education\/#\" target=\"_blank\" rel=\"noopener\">Physical Education<\/a><\/td><td class=\"column-4\">Socio-emotional Skills<\/td><td class=\"column-5\">Use appropriate emotional reactions when trying new activities or challenges<\/td>\n<\/tr>\n<tr class=\"row-107\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/physical-education\/#\" target=\"_blank\" rel=\"noopener\">Physical Education<\/a><\/td><td class=\"column-4\">Socio-emotional Skills<\/td><td class=\"column-5\">Encourage others<\/td>\n<\/tr>\n<tr class=\"row-108\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/explore-your-world\/\" target=\"_blank\" rel=\"noopener\">Explore Your World<\/a><\/td><td class=\"column-4\">Well-Being<\/td><td class=\"column-5\">Define personal safety<\/td>\n<\/tr>\n<tr class=\"row-109\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/explore-your-world\/\" target=\"_blank\" rel=\"noopener\">Explore Your World<\/a><\/td><td class=\"column-4\">Well-Being<\/td><td class=\"column-5\">Discuss healthy practices<\/td>\n<\/tr>\n<tr class=\"row-110\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/explore-your-world\/\" target=\"_blank\" rel=\"noopener\">Explore Your World<\/a><\/td><td class=\"column-4\">Well-Being<\/td><td class=\"column-5\">Identify safe spaces, people, and behaviours<\/td>\n<\/tr>\n<tr class=\"row-111\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/explore-your-world\/\" target=\"_blank\" rel=\"noopener\">Explore Your World<\/a><\/td><td class=\"column-4\">Well-Being<\/td><td class=\"column-5\">Demonstrate safe behaviours and practices<\/td>\n<\/tr>\n<tr class=\"row-112\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/explore-your-world\/\" target=\"_blank\" rel=\"noopener\">Explore Your World<\/a><\/td><td class=\"column-4\">Well-Being<\/td><td class=\"column-5\">Use practices that contribute to a safe and caring environment<\/td>\n<\/tr>\n<tr class=\"row-113\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/primary-block\/explore-your-world\/\" target=\"_blank\" rel=\"noopener\">Explore Your World<\/a><\/td><td class=\"column-4\">Diversity and Social Responsibility<\/td><td class=\"column-5\">Demonstrate an increased willingness to investigate and reflect when making a decision<\/td>\n<\/tr>\n<tr class=\"row-114\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Describe some qualities of a safe adult<\/td>\n<\/tr>\n<tr class=\"row-115\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Describe a situation when they would talk to a safe adult<\/td>\n<\/tr>\n<tr class=\"row-116\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Describe what consent over own body means<\/td>\n<\/tr>\n<tr class=\"row-117\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Identify personal information and ways to protect it<\/td>\n<\/tr>\n<tr class=\"row-118\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Identify when elements of a situation are unsafe<\/td>\n<\/tr>\n<tr class=\"row-119\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">List behaviours that will keep self and peers safe<\/td>\n<\/tr>\n<tr class=\"row-120\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Explain how to assess situations to determine if they are safe or unsafe<\/td>\n<\/tr>\n<tr class=\"row-121\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Describe when safety strategies are needed<\/td>\n<\/tr>\n<tr class=\"row-122\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Define personal boundaries and consent<\/td>\n<\/tr>\n<tr class=\"row-123\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Describe ways to stay safe when using technology<\/td>\n<\/tr>\n<tr class=\"row-124\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Describe ways to stay safe during outdoor activities<\/td>\n<\/tr>\n<tr class=\"row-125\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Describe how to recognize an unsafe situation<\/td>\n<\/tr>\n<tr class=\"row-126\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Discuss ways to give and withdraw consent<\/td>\n<\/tr>\n<tr class=\"row-127\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Wellness<\/td><td class=\"column-5\">Choose and describe appropriate risk-reduction strategies given a variety of situations<\/td>\n<\/tr>\n<tr class=\"row-128\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Mental Fitness<\/td><td class=\"column-5\">Describe a strategy for seeking help for self<\/td>\n<\/tr>\n<tr class=\"row-129\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Mental Fitness<\/td><td class=\"column-5\">Describe a strategy for seeking help for others<\/td>\n<\/tr>\n<tr class=\"row-130\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Mental Fitness<\/td><td class=\"column-5\">List people and places to ask for help<\/td>\n<\/tr>\n<tr class=\"row-131\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Relationships<\/td><td class=\"column-5\">Demonstrate safe behaviours and practices<\/td>\n<\/tr>\n<tr class=\"row-132\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Relationships<\/td><td class=\"column-5\">Use practices that contribute to a safe and caring environment<\/td>\n<\/tr>\n<tr class=\"row-133\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/elementary-block\/personal-wellness\/#\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Relationships<\/td><td class=\"column-5\">Demonstrate an increased willingness to investigate and reflect when making a decision<\/td>\n<\/tr>\n<tr class=\"row-134\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/english-language-arts\/\" target=\"_blank\" rel=\"noopener\">English Language Arts<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Identify claims that are supported by facts and reason from those that are not<\/td>\n<\/tr>\n<tr class=\"row-135\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/english-language-arts\/\" target=\"_blank\" rel=\"noopener\">English Language Arts<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Evaluate the effectiveness of the facts\/reason to support a claim and identify when irrelevant information is introduced<\/td>\n<\/tr>\n<tr class=\"row-136\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/english-language-arts\/\" target=\"_blank\" rel=\"noopener\">English Language Arts<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Respond critically to how a text employs language to manipulate, persuade, or control and propose alternative perspectives<\/td>\n<\/tr>\n<tr class=\"row-137\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/technology\/#\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Information Technology<\/td><td class=\"column-5\">Distinguish between phishing, DDoS, MitM, Zero-day exploit, malware, and botnets<\/td>\n<\/tr>\n<tr class=\"row-138\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/technology\/#\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Information Technology<\/td><td class=\"column-5\">Use digital communication software to provide ongoing synchronous and asynchronous communication for collaborative projects<\/td>\n<\/tr>\n<tr class=\"row-139\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/technology\/#\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Information Technology<\/td><td class=\"column-5\">Demonstrate ethical and respectful communication in digital communications<\/td>\n<\/tr>\n<tr class=\"row-140\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Decision-Making<\/td><td class=\"column-5\">Assess positive and negative peer influences when making decisions<\/td>\n<\/tr>\n<tr class=\"row-141\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Decision-Making<\/td><td class=\"column-5\">Examine their personal process used to make big or small decisions<\/td>\n<\/tr>\n<tr class=\"row-142\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Decision-Making<\/td><td class=\"column-5\">Evaluate credible sources of health and safety information<\/td>\n<\/tr>\n<tr class=\"row-143\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Decision-Making<\/td><td class=\"column-5\">Identify sources of health and safety misinformation and disinformation<\/td>\n<\/tr>\n<tr class=\"row-144\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Decision-Making<\/td><td class=\"column-5\">Assess how own decision-making skills promote a healthy environment for self and community<\/td>\n<\/tr>\n<tr class=\"row-145\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Decision-Making<\/td><td class=\"column-5\">List sources of support for decision-making in my community<\/td>\n<\/tr>\n<tr class=\"row-146\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Personal Safety<\/td><td class=\"column-5\">Discuss behaviours that promote a positive digital profile<\/td>\n<\/tr>\n<tr class=\"row-147\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Personal Safety<\/td><td class=\"column-5\">Evaluate the impact of information (posted or shared) forever stored in cyberspace<\/td>\n<\/tr>\n<tr class=\"row-148\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Personal Safety<\/td><td class=\"column-5\">Describe when it is appropriate to use a social media platform<\/td>\n<\/tr>\n<tr class=\"row-149\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Personal Safety<\/td><td class=\"column-5\">Explain the benefits or harms of following certain people or groups online<\/td>\n<\/tr>\n<tr class=\"row-150\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Personal Safety<\/td><td class=\"column-5\">Outline the law about sharing or securing sexually explicit images<\/td>\n<\/tr>\n<tr class=\"row-151\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/middle-block\/personal-wellness\/\" target=\"_blank\" rel=\"noopener\">Personal Wellness<\/a><\/td><td class=\"column-4\">Personal Safety<\/td><td class=\"column-5\">Describe strategies to keep self and others safe online (luring, protecting personal information, identifying misinformation and disinformation, etc.)<\/td>\n<\/tr>\n<tr class=\"row-152\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Describe social engineering in reference to cybersecurity<\/td>\n<\/tr>\n<tr class=\"row-153\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Explain how human actions or inactions represent a major portion of cybersecurity events<\/td>\n<\/tr>\n<tr class=\"row-154\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Define confidentiality, integrity, and availability (CIA triad)<\/td>\n<\/tr>\n<tr class=\"row-155\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Describe authentication processes (passwords and multifactor authentication)<\/td>\n<\/tr>\n<tr class=\"row-156\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Explain encryption and importance in ICT<\/td>\n<\/tr>\n<tr class=\"row-157\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Use simple encryption techniques to encrypt messages<\/td>\n<\/tr>\n<tr class=\"row-158\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Explain why increased complexity of encryption requires additional time and algorithms to decrypt<\/td>\n<\/tr>\n<tr class=\"row-159\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/technology-9\/\" target=\"_blank\" rel=\"noopener\">Technology<\/a><\/td><td class=\"column-4\">Informational Technology Skills<\/td><td class=\"column-5\">Describe synchronous and asynchronous encryption and uses in ICT<\/td>\n<\/tr>\n<tr class=\"row-160\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Trends<\/td><td class=\"column-5\">Identify careers and pathways in cybersecurity, including extra-curricular, post-secondary, internship, and companies involved in cybersecurity in New Brunswick.<\/td>\n<\/tr>\n<tr class=\"row-161\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Trends<\/td><td class=\"column-5\">Research current trends in cybersecurity.<\/td>\n<\/tr>\n<tr class=\"row-162\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Communicate adoption practices to harden systems.<\/td>\n<\/tr>\n<tr class=\"row-163\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Determine the usefulness of guides found on the Internet for software and cybersecurity updates.<\/td>\n<\/tr>\n<tr class=\"row-164\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Demonstrate how diverse thinking practices lead to safer and more secure systems.<\/td>\n<\/tr>\n<tr class=\"row-165\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Analyze cybersecurity challenges and vulnerabilities involving people, technology or both.<\/td>\n<\/tr>\n<tr class=\"row-166\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Presented with a situation containing a potential vulnerability, learners suggest a way to resolve the vulnerability.<\/td>\n<\/tr>\n<tr class=\"row-167\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Combine the solutions to smaller challenges in a way that solves the original larger challenge.<\/td>\n<\/tr>\n<tr class=\"row-168\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Secure a variety of digital devices using common patterns and solutions.<\/td>\n<\/tr>\n<tr class=\"row-169\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Adapt a solution to solve a challenge that has common elements but is slightly different (and may involve human and\/or technology automation).<\/td>\n<\/tr>\n<tr class=\"row-170\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Gather data related to a cybersecurity event and analyze that data to determine important elements.<\/td>\n<\/tr>\n<tr class=\"row-171\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Prove, using data, that a cybersecurity event happened.<\/td>\n<\/tr>\n<tr class=\"row-172\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Create a list of issues to check with each cybersecurity event.<\/td>\n<\/tr>\n<tr class=\"row-173\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Discover flaws and security threats on digital devices.<\/td>\n<\/tr>\n<tr class=\"row-174\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Hypothesize solutions based on the brainstorming, researching, analyzing and discussing possible causes and potential solutions to cybersecurity challenges and vulnerabilities.<\/td>\n<\/tr>\n<tr class=\"row-175\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Identify and implement proactive strategies for mitigating cybersecurity risks and vulnerabilities, including secure password methodology, software patches and updates.<\/td>\n<\/tr>\n<tr class=\"row-176\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Create and maintain a list of possible solutions to mitigate a variety of cybersecurity challenges, risks and vulnerabilities.<\/td>\n<\/tr>\n<tr class=\"row-177\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Use data to prove the mitigation is enabled and effective.<\/td>\n<\/tr>\n<tr class=\"row-178\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Evaluate policies designed to prevent password attacks.<\/td>\n<\/tr>\n<tr class=\"row-179\">\n\t<td class=\"column-1\">New Brunswick<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.nbed.ca\/learning-areas\/high-school-block\/career-connected-learning\/digital-and-information-technology\/cybersecurity-120\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity<\/a><\/td><td class=\"column-4\">Mindset<\/td><td class=\"column-5\">Understand and communicate to others the destructive consequences that can be associated with in secure digital data.<\/td>\n<\/tr>\n<tr class=\"row-180\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/english-programs\/course\/physical-education-p-3\" target=\"_blank\" rel=\"noopener\">Health Education<br \/>\n<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will investigate characteristics that promote healthy and safe relationships.<\/td>\n<\/tr>\n<tr class=\"row-181\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/english-programs\/course\/health-education-2\" target=\"_blank\" rel=\"noopener\">Health Education<br \/>\n<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will investigate empathy.<\/td>\n<\/tr>\n<tr class=\"row-182\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/english-programs\/course\/health-education-3\" target=\"_blank\" rel=\"noopener\">Health Education<br \/>\n<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will investigate ways for seeking help in unsafe risk scenarios.<\/td>\n<\/tr>\n<tr class=\"row-183\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Explorers (Grades 1 &#8211; 3)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/english-programs\/course\/health-education-5\" target=\"_blank\" rel=\"noopener\">Health Education<br \/>\r\n<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will investigate the components of mental health literacy<\/td>\n<\/tr>\n<tr class=\"row-184\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Wizards (Grades 4 &#8211; 6)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/english-programs\/course\/health-education-6\" target=\"_blank\" rel=\"noopener\">Health Education<br \/>\r\n<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will analyse how relationships impact physical, mental, emotional, social, and spiritual health<\/td>\n<\/tr>\n<tr class=\"row-185\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/english-programs\/course\/healthy-living-7\" target=\"_blank\" rel=\"noopener\">Health Education<br \/>\r\n<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will analyse how life skills influence physical, mental, emotional, social, and spiritual health<\/td>\n<\/tr>\n<tr class=\"row-186\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/English%20Language%20Arts%207%20At%20A%20Glance%20%282022%29.pdf\" target=\"_blank\" rel=\"noopener\">English Language Arts<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will plan oral, written, and visual personal and critical responses, in relation to audience and purpose<\/td>\n<\/tr>\n<tr class=\"row-187\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/English%20Language%20Arts%207%20At%20A%20Glance%20%282022%29.pdf\" target=\"_blank\" rel=\"noopener\">English Language Arts<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will analyse the accuracy, reliability, validity, and bias in a range of written, audio, visual, and digital communication forms<\/td>\n<\/tr>\n<tr class=\"row-188\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/Technology%20Education%208%20At%20a%20glance%20%282022%29.pdf\" target=\"_blank\" rel=\"noopener\">Technology Education<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Learners will construct a product in response to audience need.<\/td>\n<\/tr>\n<tr class=\"row-189\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/Technology%20Education%209%20Outcomes%20%282014%29.pdf\" target=\"_blank\" rel=\"noopener\">Technology Education<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Students will be expected to demonstrate an understanding of the consequences of their technological choices<\/td>\n<\/tr>\n<tr class=\"row-190\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Defenders (Grades 7 &#8211; 9)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/Technology%20Education%209%20Outcomes%20%282014%29.pdf\" target=\"_blank\" rel=\"noopener\">Technology Education<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Students will be expected to operate and manage technological systems<\/td>\n<\/tr>\n<tr class=\"row-191\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/Communications%20Technology%2012%20Outcomes%20%282015%29.pdf\" target=\"_blank\" rel=\"noopener\">Communications Technology<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Design, develop, evaluate, and articulate technological solutions<\/td>\n<\/tr>\n<tr class=\"row-192\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/Communications%20Technology%2012%20Outcomes%20%282015%29.pdf\" target=\"_blank\" rel=\"noopener\">Communications Technology<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Evaluate and manage technological systems<\/td>\n<\/tr>\n<tr class=\"row-193\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/Communications%20Technology%2012%20Outcomes%20%282015%29.pdf\" target=\"_blank\" rel=\"noopener\">Communications Technology<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Demonstrate an understanding of current and evolving careers and of the influence of technology on the nature of work<\/td>\n<\/tr>\n<tr class=\"row-194\">\n\t<td class=\"column-1\">Nova Scotia<\/td><td class=\"column-2\">Cyber Smart (Grades 10 &#8211; 12)<\/td><td class=\"column-3\"><a href=\"https:\/\/curriculum.novascotia.ca\/sites\/default\/files\/documents\/outcomes-indicators-files\/Communications%20Technology%2012%20Outcomes%20%282015%29.pdf\" target=\"_blank\" rel=\"noopener\">Communications Technology<\/a><\/td><td class=\"column-4\"><\/td><td class=\"column-5\">Demonstrate an understanding of their personal responsibility in determining the future<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-7 from cache --><\/div><\/div>\n\n<\/div><\/div><\/div><\/div>\n\n<\/div><\/div>\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-31821_ee59b0-7d .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-31821_ee59b0-7d .kt-divider{border-top-width:1px;height:1px;border-top-color:var(--global-palette7, #EDF2F7);width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-31821_ee59b0-7d\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kb-row-layout-id31821_2482d0-9b > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31821_2482d0-9b > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31821_2482d0-9b > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-3xl, 6.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31821_2482d0-9b > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31821_2482d0-9b > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31821_2482d0-9b > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31821_2482d0-9b alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31821_5443b4-20 > .kt-inside-inner-col,.kadence-column31821_5443b4-20 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31821_5443b4-20 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31821_5443b4-20 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31821_5443b4-20 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31821_5443b4-20 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31821_5443b4-20{position:relative;}@media all and (max-width: 1024px){.kadence-column31821_5443b4-20 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31821_5443b4-20 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31821_5443b4-20\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31821_f30a73-9e, .wp-block-kadence-advancedheading.kt-adv-heading31821_f30a73-9e[data-kb-block=\"kb-adv-heading31821_f30a73-9e\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31821_f30a73-9e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31821_f30a73-9e[data-kb-block=\"kb-adv-heading31821_f30a73-9e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31821_f30a73-9e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31821_f30a73-9e[data-kb-block=\"kb-adv-heading31821_f30a73-9e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading31821_f30a73-9e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31821_f30a73-9e\">Resources for Teachers<\/h2>\n\n\n\n<p style=\"padding-top:0;padding-bottom:0\">Looking for tools to bring digital safety and tech skills to life in your classroom? This section includes ready-to-use lesson ideas, activity guides, discussion prompts, and optional links to trusted online tools. All resources are designed to make teaching digital citizenship easy, engaging, and flexible for any learning environment.<\/p>\n\n\n<style>.kb-posts-id-31821_6c3b4e-99 .entry.loop-entry .entry-header .entry-title{font-size:var(--global-kb-font-size-md, 1.25rem);}.kb-posts-id-31821_6c3b4e-99 .kb-post-list-item{display:grid;}<\/style><ul class=\"wp-block-kadence-posts kb-posts kadence-posts-list kb-posts-id-31821_6c3b4e-99 content-wrap grid-cols kb-posts-style-boxed grid-sm-col-2 grid-lg-col-3 item-image-style-above\"><li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-34428 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/cybersafety-fundamentals\/\" aria-label=\"Cybersafety Fundamentals\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image-300x169.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Cybersafety Fundamentals\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image-1536x864.png 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image-600x338.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersafety-fundamentals-image.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/cybersafety-fundamentals\/\" rel=\"bookmark\">Cybersafety Fundamentals<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-11-24T13:14:42-05:00\">24 \u041b\u0438\u0441\u0442\u043e\u043f\u0430\u0434\u0430, 2025<\/time><time class=\"updated\" datetime=\"2026-04-09T15:10:55-04:00\">9 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>In this resource, you will learn how to maintain a secure device by using strong access passwords, checking privacy and activity settings, and keeping apps and systems updated. You will be trained to recognize and respond to signs of compromise, remaining vigilant for unusual activity or unauthorized changes. You will also learn about and understand different types of scams, including fear-based tactics, technology scams, fraudulent transactions, and romance schemes. Finally, you will develop strong password practices, creating unique, complex passwords that protect your information and keep intruders out.<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-34426 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/mastering-digital-media-literacy\/\" aria-label=\"Mastering Digital Media Literacy\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image-300x169.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Mastering Digital Media Literacy\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image-1536x864.png 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image-600x338.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/Digital-media-literacy-image.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/mastering-digital-media-literacy\/\" rel=\"bookmark\">Mastering Digital Media Literacy<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-11-24T13:13:12-05:00\">24 \u041b\u0438\u0441\u0442\u043e\u043f\u0430\u0434\u0430, 2025<\/time><time class=\"updated\" datetime=\"2026-04-09T15:11:02-04:00\">9 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>In this resource, you will learn how to bring digital and media literacy into your classroom by using videos, screen captures, and multimedia projects to make learning more engaging and accessible. You will also develop the skills to help your students think critically about digital content, while gaining the confidence to create, analyze, and navigate digital materials responsibly and creatively, preparing both you and your students to thrive in the digital world.<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-34424 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/cybersecurity-basics\/\" aria-label=\"Cybersecurity Basics\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image-300x169.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Cybersecurity Basics\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image-1536x864.png 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image-600x338.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/cybersecurity-basics-image.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/cybersecurity-basics\/\" rel=\"bookmark\">Cybersecurity Basics<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-11-24T13:08:51-05:00\">24 \u041b\u0438\u0441\u0442\u043e\u043f\u0430\u0434\u0430, 2025<\/time><time class=\"updated\" datetime=\"2026-04-09T15:10:57-04:00\">9 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>In this resource, you will be introduced to the fundamentals of cybersecurity and the opportunities within the field. You will examine the CIA Triad of confidentiality, integrity, and availability, and how these principles guide businesses in protecting their systems and data. You will review the state of cybersecurity in schools, including the frequency of attacks, their impact, and a case study highlighting current gaps in protection and the recommended changes. You will also explore career pathways in cybersecurity, including university and college programs and industry-recognized certifications. Following the completion of this resource, you will be equipped to inform and guide students toward potential careers in cybersecurity, helping to build the next generation of skilled professionals.<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-34422 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/understanding-artificial-intelligence\/\" aria-label=\"Understanding Artificial Intelligence\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image-300x169.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Understanding Artificial Intelligence\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image-1536x864.png 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image-600x338.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/understanding-artificial-intelligence-image.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/understanding-artificial-intelligence\/\" rel=\"bookmark\">Understanding Artificial Intelligence<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-11-24T13:07:24-05:00\">24 \u041b\u0438\u0441\u0442\u043e\u043f\u0430\u0434\u0430, 2025<\/time><time class=\"updated\" datetime=\"2026-04-09T15:11:09-04:00\">9 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>In this resource, you will explore artificial intelligence (AI), understanding what AI is, how it\u2019s transforming learning, and the powerful ways it can be used in the classroom. Along the way, you will explore opportunities for students to leverage AI as a tool for creativity, problem-solving, and research, while also addressing the challenges and responsibilities that come with it. <\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-34419 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/digital-habits-online-culture\/\" aria-label=\"Digital Habits And Online Culture\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner-300x169.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Digital Habits And Online Culture\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner-768x432.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner-1536x864.png 1536w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner-18x10.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner-600x338.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/11\/digital-habits-banner.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/digital-habits-online-culture\/\" rel=\"bookmark\">Digital Habits And Online Culture<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2025-11-24T12:54:56-05:00\">24 \u041b\u0438\u0441\u0442\u043e\u043f\u0430\u0434\u0430, 2025<\/time><time class=\"updated\" datetime=\"2026-04-09T15:11:06-04:00\">9 \u041a\u0432\u0456\u0442\u043d\u044f, 2026<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>In this resource, you will explore what a digital footprint is, why it matters, and how to evaluate and manage your online presence with care. You will learn to distinguish between misinformation and disinformation, developing strategies to verify content and promote information integrity. You\u2019ll also unpack how algorithms work specifically on social media, understanding their benefits, risks, and the powerful role they play in shaping what we see online. Along the way, you\u2019ll build the skills needed to navigate digital spaces responsibly and support students in becoming thoughtful, informed digital citizens.<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-22198 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-lesson-plans topic-device-security topic-online-privacy-and-security\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/protect-your-candy-cybersafety-lesson\/\" aria-label=\"Protect Your Candy!\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-300x75.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Protect Your Candy!\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-18x5.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/protect-your-candy-cybersafety-lesson\/\" rel=\"bookmark\">Protect Your Candy!<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2024-04-28T15:17:42-04:00\">28 \u041a\u0432\u0456\u0442\u043d\u044f, 2024<\/time><time class=\"updated\" datetime=\"2024-07-12T13:01:00-04:00\">12 \u041b\u0438\u043f\u043d\u044f, 2024<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Cybersafety Lesson plan for teachers A Cybersafety Lesson Plan for Grades 1-4: All About Passwords This cybersafety lesson plan introduces&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-21715 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum resource-type-guides\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/curriculum-alignment-for-teachers\/\" aria-label=\"KnowledgeFlow: Curriculum Alignment for Teachers\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image-300x75.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"KnowledgeFlow: Curriculum Alignment for Teachers\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/04\/Guidebooks-Featured-Image.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/curriculum-alignment-for-teachers\/\" rel=\"bookmark\">KnowledgeFlow: Curriculum Alignment for Teachers<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2024-04-09T13:06:11-04:00\">9 \u041a\u0432\u0456\u0442\u043d\u044f, 2024<\/time><time class=\"updated\" datetime=\"2025-11-26T17:05:46-05:00\">26 \u041b\u0438\u0441\u0442\u043e\u043f\u0430\u0434\u0430, 2025<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>A comprehensive mapping of our educational materials to provincial curriculum standards. This guide is designed to help teachers seamlessly integrate our resources and course content into their lesson planning, ensuring alignment with required educational outcomes.<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-20540 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum resource-type-lesson-plans resource-type-tip-sheets topic-online-privacy-and-security topic-online-safety-for-children-and-parents resource-initiative-national-cyberday-2023\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/cybersafety-lesson-plans\/\" aria-label=\"Cybersafety Lesson Plans\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-300x75.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Cybersafety Lesson Plans\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans-18x5.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2024\/04\/Lesson-Plans.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/cybersafety-lesson-plans\/\" rel=\"bookmark\">Cybersafety Lesson Plans<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2023-12-05T18:18:36-05:00\">5 \u0413\u0440\u0443\u0434\u043d\u044f, 2023<\/time><time class=\"updated\" datetime=\"2024-07-11T11:57:46-04:00\">11 \u041b\u0438\u043f\u043d\u044f, 2024<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>Cybersafety Lesson Plans for your classroom Attention teachers! Check out our comprehensive collection of digital media literacy and cybersafety lesson&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-11454 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum resource-initiative-national-cyberday-2023\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/protection-of-privacy-grade-5-teachers\/\" aria-label=\"What Students Need to Know about Freedom of Information and Protection of Privacy &#8211; Grade 5\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-300x75.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"What Students Need to Know about Freedom of Information and Protection of Privacy &#8211; Grade 5\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/protection-of-privacy-grade-5-teachers\/\" rel=\"bookmark\">What Students Need to Know about Freedom of Information and Protection of Privacy &#8211; Grade 5<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2022-10-13T20:17:05-04:00\">13 \u0416\u043e\u0432\u0442\u043d\u044f, 2022<\/time><time class=\"updated\" datetime=\"2024-07-04T16:23:39-04:00\">4 \u041b\u0438\u043f\u043d\u044f, 2024<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>What Students Need to Know about Freedom of Information and Protection of Privacy: Grade 5 This document outlines what students&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<li class=\"kb-post-list-item\">\n\t<article class=\"entry content-bg loop-entry post-11452 resource type-resource status-publish format-standard has-post-thumbnail hentry resource-type-curriculum resource-initiative-national-cyberday-2023\">\n\t\t\t\t<a aria-hidden=\"true\" tabindex=\"-1\" role=\"presentation\" class=\"post-thumbnail kadence-thumbnail-ratio-2-3\" href=\"https:\/\/knowledgeflow.org\/uk\/resource\/protection-of-privacy-grade-11-teachers\/\" aria-label=\"What Students Need to Know about Freedom of Information and Protection of Privacy: Grade 11-12\">\n\t\t\t<div class=\"post-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"75\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-300x75.png\" class=\"attachment-medium size-medium wp-post-image\" alt=\"What Students Need to Know about Freedom of Information and Protection of Privacy: Grade 11-12\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-300x75.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-600x150.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-1024x256.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-150x38.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum-768x192.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/03\/Curriculum.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" title=\"\">\t\t\t<\/div>\n\t\t<\/a><!-- .post-thumbnail -->\n\t\t\t\t<div class=\"entry-content-wrap\">\n\t\t\t<header class=\"entry-header\">\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/knowledgeflow.org\/uk\/resource\/protection-of-privacy-grade-11-teachers\/\" rel=\"bookmark\">What Students Need to Know about Freedom of Information and Protection of Privacy: Grade 11-12<\/a><\/h2>\t<div class=\"entry-meta entry-meta-divider-dot\">\n\t\t\t\t<span class=\"posted-on\">\n\t\t\t\t<time class=\"entry-date published\" datetime=\"2022-10-13T20:14:29-04:00\">13 \u0416\u043e\u0432\u0442\u043d\u044f, 2022<\/time><time class=\"updated\" datetime=\"2024-07-04T16:23:57-04:00\">4 \u041b\u0438\u043f\u043d\u044f, 2024<\/time>\t\t\t<\/span>\n\t\t\t\t<\/div><!-- .entry-meta -->\n\t<\/header><!-- .entry-header -->\n\t<div class=\"entry-summary\">\n\t\t<p>What Students Need to Know about Freedom of Information and Protection of Privacy: Grade 11-12 This document outlines what students&#8230;<\/p>\n\t<\/div><!-- .entry-summary -->\n\t<footer class=\"entry-footer\">\n\t<\/footer><!-- .entry-footer -->\t\t<\/div>\n\t<\/article>\n<\/li>\n<\/ul><\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u0414\u043b\u044f \u0432\u0447\u0438\u0442\u0435\u043b\u0456\u0432 \u041a\u0456\u0431\u0435\u0440\u0411\u0430\u0439\u0442\u0438 \u0434\u043e\u043f\u043e\u043c\u0430\u0433\u0430\u044e\u0442\u044c \u0432\u0430\u0448\u0438\u043c \u0443\u0447\u043d\u044f\u043c \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0443\u0432\u0430\u0442\u0438, \u0434\u043e\u0441\u044f\u0433\u0430\u0442\u0438 \u0443\u0441\u043f\u0456\u0445\u0443 \u0442\u0430 \u043f\u0440\u043e\u0446\u0432\u0456\u0442\u0430\u0442\u0438 \u0432 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u043c\u0443 \u0441\u0432\u0456\u0442\u0456. \u041f\u0456\u0434\u0442\u0440\u0438\u043c\u0443\u0439\u0442\u0435 \u0443\u0447\u043d\u0456\u0432 \u043d\u0430 \u043a\u043e\u0436\u043d\u043e\u043c\u0443 \u0435\u0442\u0430\u043f\u0456, \u043a\u043e\u043b\u0438 \u0432\u043e\u043d\u0438 \u0440\u043e\u0437\u0432\u0438\u0432\u0430\u044e\u0442\u044c \u043d\u0430\u0432\u0438\u0447\u043a\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0433\u043e \u043c\u0438\u0441\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u0432\u043f\u0435\u0432\u043d\u0435\u043d\u043e\u0433\u043e \u0437\u0440\u043e\u0441\u0442\u0430\u043d\u043d\u044f \u0432 \u0406\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0456. \u041d\u0430 \u0446\u044c\u043e\u043c\u0443 \u0448\u043b\u044f\u0445\u0443 \u0443\u0447\u043d\u0456 \u043c\u043e\u0436\u0443\u0442\u044c \u0437\u0430\u0440\u043e\u0431\u0438\u0442\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0456\u043a\u0430\u0442\u0438, \u0449\u043e\u0431 \u0432\u0456\u0434\u0441\u0432\u044f\u0442\u043a\u0443\u0432\u0430\u0442\u0438 \u0441\u0432\u0456\u0439 \u043f\u0440\u043e\u0433\u0440\u0435\u0441, \u0430 \u0432\u0438 \u043c\u043e\u0436\u0435\u0442\u0435 \u043f\u043e\u0447\u0443\u0432\u0430\u0442\u0438\u0441\u044f \u0432\u043f\u0435\u0432\u043d\u0435\u043d\u043e, \u0441\u0443\u043f\u0440\u043e\u0432\u043e\u0434\u0436\u0443\u044e\u0447\u0438 \u0457\u0445 \u043d\u0430 \u043a\u043e\u0436\u043d\u043e\u043c\u0443 \u043a\u0440\u043e\u0446\u0456. cYBERSAFETY aCADEMY \u0411\u0430\u0436\u0430\u0454\u0442\u0435 \u0441\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u0442\u0438\u0441\u044f \u043d\u0430\u0448\u043e\u044e LMS? CyberByters \u0442\u0430\u043a\u043e\u0436 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0438\u0439 \u0432 \u043d\u0430\u0448\u043e\u043c\u0443 LMS \u0410\u043a\u0430\u0434\u0435\u043c\u0456\u0457 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438, \u044f\u043a\u0438\u0439 \u043d\u0430\u0434\u0430\u0454 \u0432\u0438\u043a\u043b\u0430\u0434\u0430\u0447\u0430\u043c \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0431\u0430\u0447\u0438\u0442\u0438 \u043f\u0440\u043e\u0433\u0440\u0435\u0441 \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u0456\u0432 \u0443 \u043a\u043b\u0430\u0441\u0456 \u0442\u0430 \u0432\u0438\u0434\u0430\u0454 \u0441\u0435\u0440\u0442\u0438\u0444\u0456\u043a\u0430\u0442\u0438 \u0442\u0430 \u0437\u043d\u0430\u0447\u043a\u0438 \u043f\u0440\u043e \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u044f \u043a\u0443\u0440\u0441\u0443 \u0432 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u043c\u0443 \u0432\u0438\u0433\u043b\u044f\u0434\u0456. \u0421\u0442\u0443\u0434\u0435\u043d\u0442\u0438 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0430\u043d\u043e\u043d\u0456\u043c\u043d\u0456 \u0430\u043a\u0430\u0443\u043d\u0442\u0438, \u0449\u043e\u0431 \u043d\u0435 \u0437\u0431\u0438\u0440\u0430\u0442\u0438 \u0456\u043c\u0435\u043d\u0430, \u0435\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0456 \u0430\u0434\u0440\u0435\u0441\u0438 \u0447\u0438 \u0431\u0443\u0434\u044c-\u044f\u043a\u0443 \u0456\u043d\u0448\u0443 \u043e\u0441\u043e\u0431\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044e. \u0426\u0435 \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u043e, \u0431\u0435\u0437\u043f\u0435\u0447\u043d\u043e \u0456 \u0437\u0440\u0443\u0447\u043d\u043e \u0434\u043b\u044f \u0441\u0442\u0443\u0434\u0435\u043d\u0442\u0456\u0432. \u041a\u0443\u0440\u0441\u0438 \u041c\u0438 \u043f\u0440\u043e\u043f\u043e\u043d\u0443\u0454\u043c\u043e \u043f\u043e\u0432\u043d\u0438\u0439 \u0441\u043f\u0435\u043a\u0442\u0440 \u043a\u0443\u0440\u0441\u0456\u0432, \u0440\u0435\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u0438\u0445 \u0434\u043b\u044f \u0440\u043e\u0437\u0432\u0438\u0442\u043a\u0443 \u0446\u0438\u0444\u0440\u043e\u0432\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439...<\/p>","protected":false},"featured_media":31938,"parent":0,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"class_list":["post-31821","initiative","type-initiative","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"taxonomy_info":[],"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/06\/cyber-smart-course-banner-1024x621.png",1024,621,true],"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/initiative\/31821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/initiative"}],"about":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/types\/initiative"}],"version-history":[{"count":43,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/initiative\/31821\/revisions"}],"predecessor-version":[{"id":32064,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/initiative\/31821\/revisions\/32064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media\/31938"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/media?parent=31821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}