As technology has become pervasive across K-12 schools and classrooms for instruction, administration and communication, so too has become the cybersecurity imperative. Student data, school finances and continuity of learning are all subject to cybersecurity threats. In response, this course is designed to provide you as a school system or technology leader with the general knowledge and approaches necessary to lead your school system to reduce and respond to this critical cybersecurity threat.
Course Description
This course on K-12 cybersecurity addresses a critical need for school systems. The increasing use of technology provides additional opportunities for bad actors to penetrate digital school systems, hack sensitive data, hold that data for ransom and otherwise threaten the ability of schools to operate.
Participants will learn about those cybersecurity threats, mitigation practices, as well as the tools and frameworks to develop and continuously improve a plan for breach prevention and response. Interactive activities will help you assess and improve your understanding. Embedded and referenced resources will support you and your organization in evaluating and creating an action plan specific to your needs.
The course synthesizes the extensive body of knowledge to focus on K-12 schools’ most likely threats and most essential practices, while curating additional practices and resources. This course will serve as an important resource to support your individual learning and your school system’s practice enhancement to reduce the risk/impact of an attack and breach.
Audience
This course is designed specifically for K-12 school system leaders including superintendents, administrators, and technology leaders. The course provides a primer with a scaffolded learning approach and linked resources that can support deeper learning no matter your prior knowledge. Please note however that the course will not teach network systems administration, configuration and related technology topics needed to deeply understand the threats and implement the technology solutions.
For those with advanced technology skills, the course will help you focus on the key cybersecurity practices and support you to design and implement an action plan. For those in non-technology leadership roles, the course will provide you the basic threat awareness and practice understanding needed to lead your district’s cybersecurity prioritization.
Course Outline
- Cybersecurity Threats
Identify the most common and significant vulnerabilities and attack vectors, along with vignettes describing several actual school cyberattacks.
- Mitigation Practices
Learn the most essential mitigation practices for K-12 schools to minimize the risk of a breach or cybersecurity attack.
- Access Controls and Design Principles
Go deeper to gain basic knowledge of how cyber security systems are designed, including access control models and the identity management lifecycle.
- Continuous Improvement Plan
Access the tools, frameworks and other third-party resources needed to develop and implement a continuous improvement model.
- Additional Resources
Complete a reflections exercise leading to a completion certificate and access a glossary of key terms and resources.
Course Details
Interactive content
Self-paced activities
Cost per learner: FREE
Site powered by Brightspace
PLEASE NOTE:The information presented in this course is for informational purposes only and should not be construed as professional advice, or other advice for any particular issue or subject. D2L Corporation and Sinclair College are not responsible for, and expressly disclaim all liability for, damages of any kind arising out of the use, reference to, or reliance on this course material.
If this is your first time visiting D2L Open Courses, you can register for this course by selecting the Register button below. The first time you register in D2L Open Courses, you will be asked to set up an account and agree to the Learner Terms of Use. If you have already registered for this course please login now with your existing D2L Open Courses credentials to return to this course.