[DOCUMENT TITLE]
[Document subtitle]
REGISTRATION &
MODULE 1
[School]
[Course title]
BIL AKTIVITI
1 Dengan menggunakan Google Chrome, pastikan anda telah login menggunakan email
GMAIL @gmail.com peribadi anda. Klik bucu kanan atas pada gambar profile anda.
Sekiranya anda belum sign in profile GMAIL anda, sila berbuat demikian. Ataupun sekiranya
anda mempunyai email GMAIL sekolah, anda boleh gunakan Gmail Sekolah.
2 Taip laman web ini di website address: https://skillsbuild.org/
Anda akan masuk ke laman web ini
Klik Sign Up
Klik Sign Up as High School Student > Klik Sign Up
1
Klik Sign Up with Google
Pilih Akaun Google Anda
Klik Continue
2
Masukkan Basic Information (Required)
Klik Additional Information (Required) > Masukkan maklumat
Tak Perlu TICK
Klik Consent Form (Required) > Isikan maklumat > Klik Submit
Anda boleh gunakan
email guru anda:
[email protected]
IBM ada menghantar Email kepada ibu bapa anda, minta ibu bapa anda semak email dan
sahkan. IBU BAPA PERLU MENGESAHKAN EMAIL DALAM MASA SEMINGGU
3
Ibu bapa anda akan dapat email seperti ini, minta mereka klik Grant Permission
Selepas ibu bapa anda sahkan email, anda perlu Tick kedua-dua pilihan > Klik Approve
Anda kini boleh mula belajar!
4
3 Setelah Akaun Anda Disahkan, masuk semula ke laman web https://skillsbuild.org/
Klik SIGN IN WITH GOOGLE
Klik English > Klik Continue
Anda akan dibawa masuk ke LEARNING DASHBOARD anda
Taipkan CYBERSECURITY FUNDAMENTALS > Klik Enter
5
Klik Pada DIGITAL CREDENTIAL: CYBERSECURITY FUNDAMENTALS
Klik di Link: Complete The Learning in English here:
Klik ENROLL
6
4 Selepas Berjaya ENROLL > Anda perlu CIPTA akaun CREDLY
Klik Create a Credly account
Klik Next
Masuk laman web https://info.credly.com/ > Klik Sign In
7
Klik Sign in With Google
Pilih akaun Google Anda
Klik Masukkan Profile anda dan Klik Create Account
8
KLIK MARK COMPLETE SELEPAS BERJAYA CREATE CREDLY ACCOUNT
5 Kemudian, anda perlu klik Play Video > Selepas Video Tamat > Klik Mark Complete
Taipkan Masa Mark Complete Anda
9
6 Untuk Peneruskan Pembelajaran, klik Recommendation > klik Course Catalog
Klik Cybersecurity
Klik Course ini
10
Klik
Anda perlu scroll ke bawah dan lengkapkan 4 Course ini.
Klik introduction to Cybersecurity
7 INTRODUCTION TO CYBER SECURITY
Klik GO TO ACTIVITY
11
Anda perlu melengkapkan Program ini dalam Masa 2 JAM
Klik Start Course
COURSE OVERVIEW
1. ABOUT THIS COURSE > scroll ke bawah > klik I’VE CHECKED IT OUT
2. EARN A CREDENTIAL > scroll ke bawah > klik I’VE CHECKED IT OUT
12
3. COURSE DESIGN > scroll ke bawah > klik I’VE CHECKED IT OUT
MODULE 1: WHAT IS CYBER SECURITY?
1. ABOUT THIS MODULE: scroll ke bawah > klik I’VE CHECKED IT OUT!
2. CYBERSECURITY > scroll ke bawah > klik I’VE CHECKED IT OUT!
13
3. CIA TRIAD > scroll ke bawah > klik I’VE CHECKED IT OUT!
4. CONTROLS > scroll ke bawah > klik I’VE CHECKED IT OUT!
5. WHAT DO YOU THINK?
Letakkan Skala 5 untuk LOSING BANK ACCOUNT > klik SUBMIT
14
Letakkan Skala seperti berikut untuk LOSING PHOTO LIBRARY > klik SUBMIT
Letakkan Skala seperti berikut untuk LOSING SOCIAL ACCOUNT > klik SUBMIT
Letakkan Skala seperti berikut untuk LOSING MOBILE PHONE > klik SUBMIT
Review Summary yang sepatutnya anda jawab
15
8 MODULE 2: KEY ELEMENTS OF CYBERSECURITY
1. ABOUT THIS MODULE > scroll ke bawah > klik I’VE CHECKED IT OUT!
2. EDUCATION > scroll ke bawah > klik I’VE CHECKED IT OUT!
3. PROCESS > scroll ke bawah > klik I’VE CHECKED IT OUT!
16
4. TECHNOLOGY > scroll ke bawah > klik I’VE CHECKED IT OUT!
5. WHAT DO YOU THINK?
Taipkan respon anda seperti berikut. Tiru je. > Klik next
Skroll ke bawah > Taipkan respon anda seperti berikut. Tiru je. > Klik next
17
Skroll ke bawah > Taipkan respon anda seperti berikut. Tiru je. > Klik next
MODULE 3: RISK MANAGEMENT
1. ABOUT THIS MODULE > scroll ke bawah > klik I’VE CHECKED IT OUT!
2. RISK VALUATION > scroll ke bawah > klik NEXTx4 > klik I’VE CHECKED IT OUT!
18
3. ACTIVITY: CHOOSE THE BEST QUESTION TO ANSWER WHEN DETERMINING RISK VALUE
RISK 1: Klik Jawapan > Klik SUBMIT
Skrol ke bawah
RISK 2: Klik Jawapan > Klik SUBMIT
Skrol ke bawah
RISK 3: Klik Jawapan > Klik SUBMIT
19
Skrol ke bawah
RISK 4: Klik Jawapan > Klik SUBMIT
Skrol ke bawah
RISK 5: Klik Jawapan > Klik SUBMIT
klik I’VE CHECKED IT OUT!
20
4. RISK RESPONSE
Klik Risk Response > Klik “+” > Scroll ke bawah > Klik I’VE IT CHECKED OUT
5. RISK APPETITE
Klik Risk Appetite > Scroll ke bawah > Klik I’VE CHECKED IT OUT
21
6. WHAT DO YOU THINK?
REFLECT 1 ; Tiru je, pastu klik next
Skroll ke bawah,
REFLECT 2 ; Tiru je, pastu klik next
Klik I’VE CHECKED IT OUT!
22
9 MODULE 4: COMMON MISCONCEPTION ABOUT CYBERSECURITY
1. ABOUT THIS MODULE: Scoll sampai bawah > Klik I’VE CHECKED IT OUT!
2. MISCONCEPTION: Klik “+” x4 > Klik I’VE CHECKED THIS OUT!
3. WHAT DO YOU THINK? Tiru je > Klik Next
Klik I’VE CHECKED THIS OUT!
23
10 MODULE 5: LAWS AND ETHICS
1. ABOUT THIS MODULE: Scroll sampai bawah > Klik I’VE CHECKED IT OUT!
2. COMMON TYPES COMPUTER MISUSE LAWS: Scroll sampai bawah > Klik I’VE CHECKED IT
OUT!
3. OTHER RELATABLE CYBERCRIME LAWS: Scroll sampai bawah > Klik I’VE CHECKED IT OUT!
24
4. DISCUSSION ON ETHICS: Klik Tab-Tab > Scroll sampai bawah > Klik I’VE CHECKED IT OUT!
5. DESCRIBE COMPUTER LAWS ON YOUR COUNTRY:
Copy Paste Text Ini Ke Dalam Box:
Computer Crimes Act 1997 (CCA):
This act criminalizes the misuse of computers, including unauthorized access, illegal
interception, and data interference.
Communications and Multimedia Act 1998 (CMA):
This act provides a regulatory framework for the converging communications and
multimedia industries, including provisions related to information security and network
reliability.
Personal Data Protection Act 2010 (PDPA):
This act governs the processing of personal data in commercial transactions and is
undergoing updates to align with global standards.
Cyber Security Act 2024:
This act aims to enhance national cybersecurity by establishing the National Cyber Security
Committee, regulating cybersecurity service providers through licensing, and addressing
cybersecurity threats and incidents.
25
11 MODULE 6: SUMMARY AND FINAL ASSESMENT
1. YOU’VE COME SO FAR: Scroll sampai bawah > Klik I’VE CHECKED IT OUT!
2. KEY POINTS TO REMEMBER: Scroll sampai bawah > Klik I’VE CHECKED IT OUT!
3. FINAL ASSESMENT
5 QUESTION (Soalan dan Jawapan Shuffle) (rujuk soalan dan jawapan)
QUESTION 1: Klik Jawapan > Klik SUBMIT > Klik NEXT
26
QUESTION 2: Klik Jawapan > Klik SUBMIT > Klik NEXT
QUESTION 3: Klik Jawapan > Klik SUBMIT > Klik NEXT
QUESTION 4: Klik Jawapan > Klik SUBMIT > Klik NEXT
27
QUESTION 5: Klik Jawapan > Klik SUBMIT
PASSING MARK = 80%
Klik Continue
Klik I’VE CHECKED IT OUT!
KLIK EXIT COURSE
28