Objective: Enable MoE staff and partners to confidently use digital tools for collecting, managing, and communicating EiE data, even in low-resource settings

Unit 1: Understand Your Device & Operating Environment

  • Navigating laptops and mobile devices for work tasks
  • Managing files and folders for data collection projects
  • Basic troubleshooting in the field

Objective: Enable MoE staff and partners to confidently use digital tools for collecting, managing, and communicating EiE data, even in low-resource settings

Unit 2: Microsoft Office Applications for EiE Work

  • Word: Creating formatted forms, meeting notes, and reports
  • Excel: Entering EiE data, creating tables, generating charts
  • Hands-on: Develop a school monitoring checklist in Word & track entries in Excel

Objective: Enable MoE staff and partners to confidently use digital tools for collecting, managing, and communicating EiE data, even in low-resource settings

Unit 3: AI tools in Education & Data Work

  • Overview of safe AI use in humanitarian education (ChatGPT, Copilot, Gemini)
  • Using AI for drafting reports, training plans, and summarizing datasets, and analyzing data
  • Ethical use: avoiding misinformation and protecting data privacy

Objective: Enable MoE staff and partners to confidently use digital tools for collecting, managing, and communicating EiE data, even in low-resource settings

Unit 4: Data Visualization & Reporting in Microsoft Tools

  • Creating charts and graphs in Excel
  • Designing summary tables for reports
  • Preparing visual briefs for coordination meetings
  • Hands-on: Create a one-page visual summary from an EiE dataset, and explore AI support for better visuals

Objective: Enable MoE staff and partners to confidently use digital tools for collecting, managing, and communicating EiE data, even in low-resource settings.

Unit 5: Online Etiquette & Cybersecurity for EiE Staff

  • Protecting sensitive education data in emergency settings
  • Recognizing phishing and scams targeting government staff
  • Hands-on: Review a mock suspicious email and identify red flags