{"id":2415,"date":"2017-11-10T15:05:05","date_gmt":"2017-11-10T15:05:05","guid":{"rendered":"https:\/\/blogs.sqa.org.uk\/computing\/?p=2415"},"modified":"2017-11-10T15:05:05","modified_gmt":"2017-11-10T15:05:05","slug":"npa-cyber-security-support-materials","status":"publish","type":"post","link":"https:\/\/blogs.sqa.org.uk\/computing\/npa-cyber-security-support-materials\/","title":{"rendered":"NPA Cyber Security support materials"},"content":{"rendered":"<p>It&#8217;s been a while since I <a href=\"https:\/\/blogs.sqa.org.uk\/computing\/teaching-and-learning-material-for-npa-cyber-security\/\">last wrote anything<\/a> about the support materials for <a href=\"https:\/\/www.sqa.org.uk\/sqa\/74738.html\">NPA Cyber Security<\/a>.<\/p>\n<p>So far, we&#8217;ve assembled a development team, discussed the sorts of materials needed, and researched what&#8217;s already available. The team consists of experienced teachers and\u00a0 lecturers, most of whom currently deliver the award in schools and colleges.<\/p>\n<p>We have agreed to develop the following materials for each of the units in the award.<\/p>\n<ul>\n<li>Teacher&#8217;s guide.<\/li>\n<li>Notes for learners.<\/li>\n<li>Worksheets.<\/li>\n<li>Practical activities.<\/li>\n<li>Formative assessments.<\/li>\n<li>Glossary of terms.<\/li>\n<li>YouTube channel.<\/li>\n<\/ul>\n<p>The <strong>teacher&#8217;s guide<\/strong> will provide information about how to introduce the award into centres, what resources you will need to offer it, and teaching plans. The <strong>notes for learners<\/strong> will be closely aligned with outcomes and performance criteria, and will cover everything that learners need to know. There will be one set of notes for each suite of units (one for <em>Data Security<\/em>, one for <em>Digital Forensics<\/em> and one for <em>Ethical Hacking<\/em>), which will cover all three levels (but will clearly indicate the level). We will produce associated <strong>worksheets and practical activities<\/strong>. We also plan to produce <strong>formative assessments<\/strong> to permit learners to judge their own learning.<\/p>\n<p>The team are currently completing research into what&#8217;s currently available for teachers; we will begin producing the learner notes in the near future. We hope to have a complete set of draft materials by <strong>January<\/strong> and begin piloting in <strong>February.<\/strong><\/p>\n<p>Please <a href=\"mailto:emma.campos@sqa.org.uk\">contact Emma<\/a> for more information about this material or to find out more about <a href=\"https:\/\/www.sqa.org.uk\/sqa\/74738.html\">the awards<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been a while since I last wrote anything about the support materials for NPA Cyber Security. So far, we&#8217;ve assembled a development team, discussed the sorts of materials needed, and researched what&#8217;s already available. The team consists of experienced teachers and\u00a0 lecturers, most of whom currently deliver the award in schools and colleges. We have agreed to develop the following materials for each of the units in the award. Teacher&#8217;s guide. Notes for learners. Worksheets. Practical activities. Formative assessments.&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts\/2415"}],"collection":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/comments?post=2415"}],"version-history":[{"count":1,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts\/2415\/revisions"}],"predecessor-version":[{"id":2416,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/posts\/2415\/revisions\/2416"}],"wp:attachment":[{"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/media?parent=2415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/categories?post=2415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sqa.org.uk\/computing\/wp-json\/wp\/v2\/tags?post=2415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}