Facilitated Online Course: Cybersecurity in K-12 Education

Wannacry. Heartbleed. Sasser. These are just some of the worldwide cyber attacks that have made it increasingly obvious to technical professionals in the K-12 education sector that the need to secure our school systems' information infrastructure is greater than ever.
 
This seven-week, facilitated online course will help IT staff learn the fundamentals of IT security and improve their understanding of enterprise security issues. The content is comprised of three modules – 1) Network Security, 2) Risks and Controls, and 3) Vulnerabilities and Mitigation. At the end of the course, you will be able to:
  • Distinguish network design elements and components
  • Describe security troubleshooting processes and the importance of risk related concepts
  • Summarize security implications of integrating system with data with third parties
  • Recognize the importance of security related awareness training and summarize risk management best practices
  • Explain types of malware, social engineering, wireless, and application attacks
  • Develop a plan of action to secure your school system's infrastructure
All classes are held from 3:00 - 4:00 pm Eastern Time Zone. 9 CEA Credits toward CETL® recertification.

Facilitator

 
Amy McLaughlin has twenty+ years’ experience building, implementing, and securing information systems in K-12, higher education and government sectors that includes 15+ years' of Chief Information Security Officer/Technology Director experience. As a CISO, she has been responsible for protecting data covered by a broad range of federal and state regulations including HIPAA, FERPA, and IRS 1075. Amy has a strong interest in the intersection of technology, information security, psychology, privacy and civil rights. She has served as the State of Oregon E-Rate coordinator, led the development of Oregon's K12 data policies to support gender non-conforming students, participated in the drafting of the Oregon Identity Theft Protection Act, and is the vice-chair of the CoSN Smart Education Networks by Design team.  

Register

 
Course Schedule 
October 17 - December 5, 2018
3:00 - 4:00 ET
 
 Oct 17, 2018
  • Welcome & Introductions
  • Network Security
    • The OSI Model
    • The Basics
    • Elements of a Secure Network
      • Firewall, Proxy, Router, Switch, Load Balancer
      • Security Web Gateway, IDS & IPS, Spam Filter, VPN, Sniffer
 Oct, 24, 2018
  • Network Security (cont.)
    • Seven Domains of IT Infrastructure
    • Network Risk Types
    • Network Security Principals
    • Firewalls
    • Network Access Control
    • WiFi Security
    • Module 1 Review
      • Check for understanding
      • Reflection Questions
      • Extending your study
 Oct 31, 2018
  • Risk & Controls
    • Basic Security Principals
    • Controls
    • Inventory Devices & Software
    • Configurations
    • Vulnerability Assessment
    • Admin Privileges
    • .... the rest.
 Nov 7, 2018
  • Risk & Controls (cont.)
  • Risk Assessment
  • Integration and Privacy
  • RTO & RPO
  • Module 2 Review
    • Check for understanding
    • Reflection Questions
    • Extending your study
 Nov 14, 2018
  • Vulnerability & Mitigation
    • Responding to Incidents
    • Securing the Human
    • The Way In
    • Social Engineering
 Nov 28, 2018
  • Vulnerability & Mitigation
  • System Logs
  • Hardening Systems and Networks
  • Assessment and Scanners
  • The Boxes
  • Module 3 Review
    • Check for understanding
    • Reflection Questions
    • Extending your study
 Dec 5, 2018
  • Course Review
  • Participant Action Plan Presentations

Register

Pricing

Course Pricing Member Non-Member
Educator $599 $799
Corporate $799 $999

 

Customization

If you are a CoSN member and have a group interested in taking a course, we are happy to work with you to make arrangements for a private facilitation. You may also be interested in our ability to customize a virtual group presentation to meet your needs. Additional consulting may be available to assist your School District in modifying their policies to comply with privacy laws and best practices. For more information please contact us.