Teach cybercrime at GCSE, says Symantec

As GCSE results out today showed a decline in the number of students taking ICT courses, security firm Symantec believes GCSE students should be taught more about information security to make lessons more engaging.

As GCSE results out today showed a decline in the number of students taking ICT courses, security firm Symantec believes GCSE students should be taught more about information security to make lessons more engaging.

Following the Royal Society's concern that ICT GCSE lessons are "too boring", Tony Osborn, manager of UK public sector at Symantec, believes teaching about cybercrime will liven up "dull" IT courses.

"Talking to them about topics such as poisoned Facebook applications, dirty music downloads and credit card phishing attacks gains their interest far more than the more bland aspects of ICT ever will. Information security should be included in the curriculum," Osborn said.

IT courses need to be made relevant to students by drawing on platforms they are using outside school, such as social networking sites. "Children learn about basic databases, [Microsoft] Powerpoint and Excel, but it's hard to relate that to the real world," said Osborn.

"About 95% of everything young people do when they reach adult life and get a job will involve a computer. Knowledge, awareness and appreciation [of IT] will make them a better employee and more employable."

A total of 61,022 students took GCSE ICT this year compared with 73,519 last year - a drop of 17%.

Read more on IT jobs and recruitment

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close