Welcome to Introduction to Cybersecurity for K-12 School System (Technology) Leaders!
K-12 school systems face a disproportionate impact from cybersecurity attacks. Bad actors are increasingly penetrating digital school systems to hack sensitive data, hold that data for ransom, and otherwise create chaos that threatens a school system’s ability to operate.
This free, 1-2 hour self-paced course was designed in response to those unique K-12 needs and challenges, providing a primer for school system leaders to understand, mitigate and respond to threats. Developed with subject matter experts from Sinclair College, this course will provide K-12 system leaders with the key knowledge and information needed to lead your school system forward in navigating this challenging but critical work.
Cybersecurity can be overwhelming for the uninitiated. This course highlights the most important concepts and practices for K-12 systems, while curating expert and authoritative third-party resources so you can exit the course with a plan for extended learning and system improvement. Whatever your technical skills and prior knowledge, this interactive and actionable course is designed to help grow both your individual and system abilities.
Course Outline
Cyber Threats
Cyber Crime Mitigation
Access Controls and Design Principles
Call to Action
Wrap Up and Resources
Cyber Threats
This first module will outline the most common and significant vulnerabilities and attack vectors, along with vignettes describing several actual school cyberattacks. Learners will explore the following questions:
- What are the cybersecurity threats most likely to impact my schools?
- What are the key vulnerabilities and attack vectors I need to mitigate?
- What is the potential impact on my school and community stakeholders from a cybersecurity breach?
Cyber Crime Mitigation
This second module will identify the most essential mitigation practices for K-12 schools to minimize the risk of a breach or cybersecurity attack. Learners will explore the following questions:
- What are the key practices? The most essential practices?
- How do people, technology and process control practices align to the most likely threats?
Access Controls and Design Principles
The third module goes deeper to provide basic knowledge of how cyber security systems are designed. Learners will gain better understanding of:
- What are access controls and what is their purpose?
- What are access control models?
- What is the identity management lifecycle?
Call to Action
This fourth module will provide you the tools, frameworks and other third-party resources needed to develop and implement a continuous improvement model. Learners will explore the following questions:
- How do I assess my readiness and needs?
- How do I develop an action plan and identify priority action steps?
- What do I do in the case of a breach? Who do I contact?
- What elements are needed in a community awareness and training campaign?
Wrap Up and Resources
In addition to the four core modules, the course includes a final task leading to a certificate and a glossary of key terms and resources. Learners will have resources to address the following questions:
- How can I demonstrate my completion of this course?
- What if I don’t understand a key term?
- What additional resources are available to support my learning and my school system’s action steps?