{"id":285,"date":"2024-09-15T14:28:00","date_gmt":"2024-09-15T12:28:00","guid":{"rendered":"https:\/\/panda-edu.at\/wordpress\/?page_id=285"},"modified":"2025-06-16T00:01:42","modified_gmt":"2025-06-15T22:01:42","slug":"sicher-durchs-netz","status":"publish","type":"page","link":"https:\/\/panda-edu.at\/wordpress\/sicher-durchs-netz\/","title":{"rendered":"Digital-Fit: Sicher durchs Netz"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-e795610d wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:var(--wp--preset--spacing--50);padding-bottom:0;padding-left:var(--wp--preset--spacing--50)\">\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-e1bb55cb\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Digital-Fit: <br>Sicher durchs Netz<\/strong><\/h2>\n\n\n\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-e1bb55cb\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-48dbd97c wp-block-group-is-layout-constrained\" style=\"padding-right:0px;padding-left:0px\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-7442c3f0 wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<ul style=\"padding-top:0;padding-right:20px;padding-bottom:0;padding-left:20px;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.542), 1.2rem);\" class=\"wp-block-list is-style-checkmark-list\">\n<li style=\"margin-top:10px;margin-right:0;margin-bottom:10px;margin-left:0;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.542), 1.2rem);\"><strong>Erkennen und Sch\u00fctzen<\/strong> vor diversen Formen der Internetkriminalit\u00e4t<\/li>\n\n\n\n<li style=\"margin-top:10px;margin-bottom:10px;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.542), 1.2rem);\">Tipps f\u00fcr <strong>sicheres Online-Shopping<\/strong><\/li>\n\n\n\n<li style=\"margin-top:10px;margin-bottom:10px;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.542), 1.2rem);\">Tipps f\u00fcr <strong>sichere Passw\u00f6rter<\/strong><\/li>\n\n\n\n<li style=\"margin-top:10px;margin-bottom:10px;font-size:clamp(0.875rem, 0.875rem + ((1vw - 0.2rem) * 0.542), 1.2rem);\">Erkennen von <strong>KI-generierten Inhalten<\/strong><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image size-large has-custom-border is-style-rounded is-style-rounded--1\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/panda-edu.at\/wordpress\/wp-content\/uploads\/2024\/09\/Security-Banner-1024x683.jpeg\" alt=\"\" class=\"wp-image-455\" style=\"border-radius:20px\" srcset=\"https:\/\/panda-edu.at\/wordpress\/wp-content\/uploads\/2024\/09\/Security-Banner-1024x683.jpeg 1024w, https:\/\/panda-edu.at\/wordpress\/wp-content\/uploads\/2024\/09\/Security-Banner-300x200.jpeg 300w, https:\/\/panda-edu.at\/wordpress\/wp-content\/uploads\/2024\/09\/Security-Banner-768x512.jpeg 768w, https:\/\/panda-edu.at\/wordpress\/wp-content\/uploads\/2024\/09\/Security-Banner-1536x1024.jpeg 1536w, https:\/\/panda-edu.at\/wordpress\/wp-content\/uploads\/2024\/09\/Security-Banner-2048x1366.jpeg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator alignwide has-text-color has-contrast-2-color has-alpha-channel-opacity has-contrast-2-background-color has-background is-style-wide\" style=\"margin-top:0;margin-bottom:0\"\/>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-cd6163fc wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--10);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--10);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-9bcd2c63 wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--10);margin-bottom:var(--wp--preset--spacing--10)\">\n<h2 class=\"wp-block-heading has-text-align-center is-style-default\"><strong>Inhalte<\/strong><\/h2>\n<\/div>\n\n\n\n<div style=\"margin-top:0;margin-bottom:0;height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-d0bbbce0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\"><strong>Internetkriminalit\u00e4t und Betrugserkennung<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Einf\u00fchrung in verschiedene Formen der Internetkriminalit\u00e4t und wie man betr\u00fcgerische E-Mails erkennt.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\"><strong>Virenschutz und Datenmanagement<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Die Bedeutung von Virenschutz und sichere Verwaltung pers\u00f6nlicher Daten.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:var(--wp--preset--spacing--20)\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-d0bbbce0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\"><strong>Sicheres Online-Verhalten<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Tipps f\u00fcr sicheres Online-Shopping und Erkennung von KI-generierten Inhalten.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\"><strong>Passwortsicherheit und -verwaltung<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Erstellen und Verwalten von sicheren Passw\u00f6rtern f\u00fcr einen optimalen Schutz.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator alignwide has-text-color has-contrast-2-color has-alpha-channel-opacity has-contrast-2-background-color has-background is-style-wide\" style=\"margin-top:0px;margin-bottom:0px\"\/>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-cd6163fc wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--10);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--10);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-9bcd2c63 wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--10);margin-bottom:var(--wp--preset--spacing--10)\">\n<h2 class=\"wp-block-heading has-text-align-center is-style-default\"><strong>Methoden<\/strong><\/h2>\n<\/div>\n\n\n\n<div style=\"margin-top:0;margin-bottom:0;height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-d0bbbce0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">Pr\u00e4sentationen<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">zu jedem Kapitel mit anschlie\u00dfendem Kahoot-Quiz, um das neue Wissen spielerisch zu festigen.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">Handout f\u00fcr Teilnehmende<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">mit wichtigsten Inhalten des Workshops, Tipps und Tricks und Anleitungen.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">Interaktive Beispiele und Fallstudien<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Erkennen von Sicherheitsl\u00fccken in Webseiten, E-Mails und Shops.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator alignwide has-text-color has-contrast-2-color has-alpha-channel-opacity has-contrast-2-background-color has-background is-style-wide\" style=\"margin-top:0px;margin-bottom:0px\"\/>\n\n\n\n<div class=\"wp-block-group alignfull has-base-2-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-cd6163fc wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--10);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--10);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-9bcd2c63 wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--10);margin-bottom:var(--wp--preset--spacing--10)\">\n<h2 class=\"wp-block-heading has-text-align-center is-style-default\"><strong>Voraussetzungen f\u00fcr Teilnehmende<\/strong><\/h2>\n<\/div>\n\n\n\n<div style=\"margin-top:0;margin-bottom:0;height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-d0bbbce0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">Eigenes Smartphone, Laptop oder Tablet<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Genutzt werden k\u00f6nnen Ger\u00e4te mit den g\u00e4ngigen Betriebssystemen (iOS, Android und Emporia).<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">Digitalen Basiskenntnisse von Vorteil<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Teilnehmende sollten \u00fcber grundlegende Erfahrung und Kenntnisse im Umgang mit digitalen Ger\u00e4ten verf\u00fcgen.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator alignwide has-text-color has-contrast-2-color has-alpha-channel-opacity has-contrast-2-background-color has-background is-style-wide\" style=\"margin-top:0px;margin-bottom:0px\"\/>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-cd6163fc wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--10);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--10);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-group is-vertical is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-9bcd2c63 wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--10);margin-bottom:var(--wp--preset--spacing--10)\">\n<h2 class=\"wp-block-heading has-text-align-center is-style-default\"><strong>Weitere Informationen<\/strong><\/h2>\n<\/div>\n\n\n\n<div style=\"margin-top:0;margin-bottom:0;height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-d0bbbce0 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">Dauer des Workshops:<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Der Workshop dauert <strong><span style=\"text-decoration: underline;\">3 Einheiten \u00e1 50 Minuten<\/span><\/strong>.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">Anzahl der Teilnehmenden:<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Am Workshop k\u00f6nnen zwischen<strong><span style=\"text-decoration: underline;\"> 5 und 12 Personen<\/span><\/strong> teilnehmen.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-container-core-column-is-layout-e3d1c41b wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-text-align-left is-style-default has-body-font-family has-medium-font-size\" style=\"font-style:normal;font-weight:600\">F\u00fcr Workshops vor Ort:<\/h3>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:5px;margin-bottom:var(--wp--preset--spacing--50)\">Au\u00dfer einen <strong>Beamer<\/strong> oder Bildschirm mit <strong>HDMI-Eingang<\/strong> und einer stabilen <strong>Internetverbindung<\/strong> ben\u00f6tigen wir keine weitere technische Ausstattung.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Digital-Fit: Sicher durchs Netz Inhalte Internetkriminalit\u00e4t und Betrugserkennung Einf\u00fchrung in verschiedene Formen der Internetkriminalit\u00e4t und wie man betr\u00fcgerische E-Mails erkennt. Virenschutz und Datenmanagement Die Bedeutung von Virenschutz und sichere Verwaltung pers\u00f6nlicher Daten. Sicheres Online-Verhalten Tipps f\u00fcr sicheres Online-Shopping und Erkennung von KI-generierten Inhalten. Passwortsicherheit und -verwaltung Erstellen und Verwalten von sicheren Passw\u00f6rtern f\u00fcr einen optimalen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-285","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/pages\/285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":22,"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/pages\/285\/revisions"}],"predecessor-version":[{"id":560,"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/pages\/285\/revisions\/560"}],"wp:attachment":[{"href":"https:\/\/panda-edu.at\/wordpress\/wp-json\/wp\/v2\/media?parent=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}