What You Need to Know Before
You Start

Starts 3 July 2025 14:39

Ends 3 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

Student Surveillance - How Hackers Can Help Protect Student Privacy

Dive into the dynamic intersection of education and technology, where student privacy takes center stage. This event sheds light on the complexities of data-intensive tools used in classrooms and the potential threats they pose to the personal information of students. Learn how hackers can become allies in safeguarding this sensitive data, e.
Security BSides San Francisco via YouTube

Security BSides San Francisco

2765 Courses


50 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Dive into the dynamic intersection of education and technology, where student privacy takes center stage. This event sheds light on the complexities of data-intensive tools used in classrooms and the potential threats they pose to the personal information of students.

Learn how hackers can become allies in safeguarding this sensitive data, exploring innovative solutions to maintain privacy while embracing modern educational technologies. Join the conversation and uncover strategies to ensure the safe and effective integration of technology in educational settings.

Syllabus

  • Introduction to Educational Technologies
  • Overview of current technologies used in classrooms
    Benefits and challenges of integrating tech in education
  • Understanding Student Privacy
  • Definition and importance of student privacy
    Key laws and regulations (e.g., FERPA, GDPR)
  • Risks of Data-Intensive Tools
  • Types of data collected by educational technologies
    Potential vulnerabilities and threats
    Case studies of privacy breaches in educational settings
  • Role of Hackers in Privacy Protection
  • Ethical hacking and its importance
    How hackers identify and mitigate vulnerabilities
  • Techniques for Enhancing Student Privacy
  • Encryption and secure communication methods
    Anonymization and data minimization techniques
    Secure login and authentication practices
  • Collaborating with Ethical Hackers
  • Building partnerships with the ethical hacking community
    Successful examples of educational institutions working with hackers
  • Designing Privacy-Conscious Educational Tools
  • Principles of privacy by design
    Best practices for developers and educators
  • Response and Mitigation Strategies
  • Developing incident response plans
    Recovery and communication strategies post-breach
  • Future Trends and Innovations in Educational Privacy
  • Emerging technologies and their implications
    Predictions for the future of student privacy protection
  • Course Conclusion
  • Summary of key points
    Discussion on the evolving landscape of education and technology ethics

Subjects

Conference Talks