EDC

Our curriculum designers are working to develop a continuum of CS learning and support, from very young children on up through high school.

AAUW Cybersecurity

The world’s leading cyber security company, Symantec, partnered with AAUW to develop the STEMpack: Cyber Security curriculum. A total of four lessons across five days of instruction and activity, this curriculum is designed to inspire and introduce participants to cyber security and computer science. Overview This curriculum is intended for a classroom setting with a computer available for each student, to be led by an experienced educator who is comfortable using technology. The robust lessons build on one another and cover the origins of the internet, binary code, an introduction to programming languages and coding, deconstructing a computer, and more. The lessons can be flexible depending on educators’ needs, but each features more than two hours of instruction and activities for computer science education for students with varying degrees of prior knowledge.

Intellitek STEM

The Intelitek STEM and CTE Foundation (ISCEF) develops and distributes state-of-the-art technology education programs in coding, robotics, manufacturing and machining to k-12 and post-secondary public institutions. Our mission is to accelerate the integration of technology education programs in k-12 and post-secondary institutions in the U.S. to support a diverse skilled 21st Century STEM workforce capable of advancing and prospering in the Innovation Economy. Our Cyber Robotics Coding Competition/education program provides teachers and youth with the opportunity to learn how to code 3D virtual simulated robots (they can be real bots, too) by completing a series of fun, interactive, thematic missions online. Youth (working in teams) build robotics coding skills they complete a series of challenging missions requiring they gain knowledge and points to get to the next level. Teams with the most completed missions are invited to a Finals Codeathon and Award Ceremony where STEM career paths are shared by industry professionals.

CISA Ransomware Guide

On September 30, 2020, the Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center released a joint Ransomware Guide, which is a customer centered, one-stop resource with best practices and ways to prevent, protect and/or respond to a ransomware attack.

Stop. Think. Connect. Cyber Threat Campaign

The STOP.THINK.CONNECT.™ Campaign is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online.

 

Cybersecurity in the Classroom

The DHS Cybersecurity Education Training Assistance Program (CETAP) equips K-12 teachers with cybersecurity curricula and education tools. This resource includes project-driven Curricula (e.g., lesson plans, assessments); programs (e.g., hands-on cybersecurity learning activities for middle-school and high-school students); and Student Resources for students, parents, and activity leaders looking to enhance students’ awareness of STEM, computer science, and cyber topics.

Cyber Threats to K-12 Remote Learning

Published in December 2020, this report by the Cybersecurity and Infrastructure Security Agency (CISA) details how cyber actors are targeting school computer systems, slowing access, and rendering the systems inaccessible to basic functions, including remote learning. In some instances, ransomware actors stole and threatened to leak confidential student data unless institutions paid a ransom.

CSAT – CIS Controls Self-Assessment Tool

The CIS Controls Self-Assessment Tool, or CIS CSAT, is a free web application that enables security leaders to track and prioritize their implementation of the CIS Controls. For each CIS Control and sub-control, CSAT helps organizations track its documentation, implementation, automation, and reporting.

CIS Controls V7.1 Implementation Groups

The CIS Controls Implementation Groups take a “horizontal” look across all of the CIS Controls and identify a set of Sub-Controls to provide a simple and accessible way to help organizations of different classes focus their security resources.