Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

How We Got Cyber Smart

by  Lisa Rothfield-Kirschner 

in Book, Learning
1 min read

How We Got Cyber Smart addresses cyber safety, cyber bullying and online safety for elementary school-aged children. It follows the adventures of two kids Olivia and Jack, as they navigate the online world and tells the story of how they became cyber smart and dealt with their online bully. It provides practical advice to parents and children in how to protect themselves online and look after their safety.

The information pulls from realistic online events as the author explains the dangers of the Internet in terms children will understand. It incorporates the challenge of cyber safety in today’s world and addresses this concern in the lives of two school-aged children and how their parents help navigate their online experiences. This book is a helpful tool for all parents, caregivers and teachers of school-aged children to help start the conversation about online safety and safe online habits.

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags:  Lisa Rothfield-Kirschner BooksCybersecurityCyberstormExploitingHackerHackersHoneypotsLinuxSoftwareweb applications
5
VIEWS

More Books

Mastering Ethereum: Building Smart Contracts and DApps
Book

Mastering Ethereum: Building Smart Contracts and DApps

March 4, 2021

If you're looking to get started with the Ethereum protocol--or are among the many open source developers, integrators, and system...

Mastering Bitcoin: Programming the Open Blockchain
Book

Mastering Bitcoin: Programming the Open Blockchain

March 3, 2021

Join the technological revolution that's taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world...

The Bitcoin Standard: The Decentralized Alternative to Central Banking
Book

The Bitcoin Standard: The Decentralized Alternative to Central Banking

March 2, 2021

When a pseudonymous programmer introduced “a new electronic cash system that’s fully peer-to-peer, with no trusted third party” to a...

MORE

Stat

60% of people who are working or learning remotely said they were moderately or very concerned about the privacy protections associated with the tools they were using to support these remote interactions.

January 7, 2021
Definition

Man-in-the-middle (MitM) attack

January 4, 2021
Book

Book: Phishing: Detection, Analysis And Prevention

January 25, 2021
Document

2020 Cyberthreat Defense Report (CDR)

October 7, 2020
ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.