Username:

Password:
  
The better children recognize tactics used by dangerous online criminals who intend to do them harm, the easier it is to avoid them. In this lesson, you learn about the grooming process, an intentional, methodical procedure used by sexual predators online to choose their victims and try to meet up with them face to face. Login to Start
Login to Start
There are rules of the road for students on the information superhighway. This lesson will teach you about the detours and roadblocks students face online. Topics range from the proper use of intellectual property that students access on the Internet, to being able to recognize and avoid tactics used by online bullies. And much more.
Login to Start
This lesson teaches the value of protecting personal information in any online communication. Chat, e-mail, blog, text and instant messaging are potentially risky when identifying information is revealed. You will learn what information to keep private. And, you'll be able to teach students how that information in the wrong hands could lead to identity theft, and potentially lead a predator to a child's front door.
Login to Start
This lesson teaches you how to guard your personal computer against malicious code. Worms, viruses, Trojan horses, and spyware can cripple your machine. Find out how to spot trouble, then learn the steps you can take to minimize the risk of infecting others.
Login to Start

Return Home
Go To: