Presentations

[mk_page_section attachment=”scroll” bg_position=”left top” bg_repeat=”repeat” bg_stretch=”false” enable_3d=”false” speed_factor=”4″ bg_video=”no” video_mask=”false” video_opacity=”0.6″ top_shadow=”false” section_layout=”full” min_height=”100″ padding_top=”10″ padding_bottom=”10″ margin_bottom=”0″ first_page=”false” last_page=”false”]

[mk_icon_box title=”Child Safety Issues” text_size=”16″ font_weight=”inhert”  icon=”moon-users-4″ style=”simple_minimal” icon_size=”small” rounded_circle=”false” icon_location=”top” circled=”true” icon_color=”#4f91cd” icon_circle_color=”#ffffff” icon_circle_border_color=”#4f91cd” box_blur=”true” read_more_url=”../courses/child-safety-issues-course/” margin=”30″]Learn how to help youth navigate the use of privacy settings to help them control the personally identifying information they share with their friends and others when online.[/mk_icon_box]
[mk_icon_box title=”Hacking” text_size=”16″ font_weight=”inhert”  icon=”moon-shield” style=”simple_minimal” icon_size=”small” rounded_circle=”false” icon_location=”top” circled=”true” icon_color=”#4f91cd” icon_circle_color=”#ffffff” icon_circle_border_color=”#4f91cd” box_blur=”true” margin=”30″ read_more_url=”../courses/hacking-course/”]Learn how to protect yourself and other from hacking.[/mk_icon_box]
[mk_icon_box title=”Malware” text_size=”16″ font_weight=”inhert” icon=”icon-stethoscope” style=”simple_minimal” icon_size=”small” rounded_circle=”false” icon_location=”top” circled=”true” icon_color=”#4f91cd” icon_circle_color=”#ffffff” icon_circle_border_color=”#4f91cd” box_blur=”true” margin=”30″ read_more_url=”../courses/malware-course/”]Learn how to avoid malware and what to do if infected.[/mk_icon_box]
[mk_icon_box title=”Social Media” text_size=”16″ font_weight=”inhert” icon=”icon-group” style=”simple_minimal” icon_size=”small” rounded_circle=”false” icon_location=”top” circled=”true” icon_color=”#4f91cd” icon_circle_color=”#ffffff” icon_circle_border_color=”#4f91cd” box_blur=”true” margin=”30″ read_more_url=”../courses/social-media-course”]Learn how to minimize the leakage of our personal information for marketing purposes and how unintended audiences such as marketers or predators can easily gain access to pictures, personal information and posts.[/mk_icon_box]
[mk_icon_box title=”Cyberbullying” text_size=”16″ font_weight=”inhert”  icon=”moon-bubble-notification” style=”simple_minimal” icon_size=”small” rounded_circle=”false” icon_location=”top” circled=”true” icon_color=”#4f91cd” icon_circle_color=”#ffffff” icon_circle_border_color=”#4f91cd” box_blur=”true” margin=”30″ read_more_url=”../courses/cyberbullying-course”]Learn the laws as they relate to cyberbullying, criminal harassment and cyberstalking.[/mk_icon_box]
[mk_icon_box title=”Internet Abuse” text_size=”16″ font_weight=”inhert”  icon=”moon-skull” style=”simple_minimal” icon_size=”small” rounded_circle=”false” icon_location=”top” circled=”true” icon_color=”#4f91cd” icon_circle_color=”#ffffff” icon_circle_border_color=”#4f91cd” box_blur=”true” margin=”30″ read_more_url=”../courses/internet-abuse-course”]Internet addiction’s impact can be profound.[/mk_icon_box]
[mk_icon_box title=”Phishing and Scams” text_size=”16″ font_weight=”inhert”  icon=”moon-bell” style=”simple_minimal” icon_size=”small” rounded_circle=”false” icon_location=”top” circled=”true” icon_color=”#4f91cd” icon_circle_color=”#ffffff” icon_circle_border_color=”#4f91cd” box_blur=”true” margin=”30″ read_more_url=”../courses/phishing-and-scams”]Scammers are using new tricks. Learn how not to fall for them.[/mk_icon_box]
[/mk_page_section]