Professional Documents
Culture Documents
5. Resources needed
1. Instructor - Microsoft Teams, high speed internet, accounts or access to the
various websites for the activities
2. Attendee – Microsoft Teams, high speed internet, QR code scanner (usually a
smart phone camera works)
6. Activity description – this section should clearly explain what you plan to do during your
session, how you plan on doing it and what features you will use within Microsoft
Teams.
1. Introduction- Introduce myself and the topic of the workshop – digital security
2. Overview of Objectives and Activities
3. Pre-assessment – Attendees will go to Padlet and fill out the “K” and “W”
sections of the KWL chart to help create a snapshot of prior knowledge.
4. Activity 1 – Passwords
1. Look at examples of passwords both weak and strong.
2. Make a word cloud to identify the components of a strong password.
3. With extra time have attendee create (not share) their own example of a
strong password.
5. Activity 2 – Sharing Information Online
1. To determine what type of information is appropriate to share online,
attendees will compare and contrast the differences between 2 profiles
displayed side by side.
2. Students will complete a collaborative T-chart on Jamboard to define the
characteristics of safe and unsafe profiles.
6. Activity 3 – Identifying Secure Websites
1. The teacher will share examples of features of both safe and unsafe
websites.
2. Attendees will go through a website and identify the features that make it
safe.
7. Post-assessment or survey – Attendees will complete the “L” section of the KWL
chart on Padlet to share at least 1 thing they have learned throughout the
workshop.
7. Extension idea(s)
1. Idea 1- Attendees can work together (in 2 large groups) to complete a Frayer
Model on the theme of digital security,
8. Teaching tips
1. Be sure to check all links before presenting.
2. Present information to students open-endly, allow them to come to their on
conclusions through collaborative efforts.
9. EXTRA: description of how you would assess participant learning and evaluate
workshop effectiveness (e.g., pre- and post-assessment, formative assessment, workshop
survey, Q&A session...)
o To evaluate overall workshop effectiveness, I would look at the work samples that
the attendees created throughout the workshop (Padlet, Mentimeter, Jamboard,
etc.). I would consider the learning objectives, the attendee’s working definitions
of digital security, and their work samples to determine how they are aligned.