Updating search results...

Search Resources

68 Results

View
Selected filters:
  • cybersecurity
SETDA K12 Cybersecurity Landscape Scan (March 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, a professional learning community of state edtech leaders and private sector partners focused on identifying key resources, assessing state-level K-12 cybersecurity advocacy efforts, and crafting policy recommendations.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
SETDA
Date Added:
09/23/2022
Small Districts, Big Hurdles
Unrestricted Use
CC BY
Rating
0.0 stars

Small Districts, Big Hurdles: Cybersecurity Support for Small, Rural, and Under-resourced Districts, offers details on how state agencies and other support organizations are empowering their smallest districts to secure their data and networks. From detailing various funding sources to providing insights into statewide and regional partnerships and offering practical examples of cybersecurity training, the document is a must-read for everyone involved in helping districts improve their cybersecurity posture. It is the newest addition to SETDA’s Cybersecurity & Privacy Collection.

Subject:
Education
Educational Technology
Material Type:
Reading
Provider:
SETDA
Author:
SETDA
Date Added:
10/10/2023
Smart Grids: Modeling
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The smart grid of the future is a complex electrical power system. Its study, design, and management requires the integration of knowledge from various disciplines including sustainability, technology and mathematics.

Smart grids show a level of complexity and heterogeneity that often cannot be covered by analytical methods. Therefore, modeling and simulation are of great importance.

In this course, you will apply modeling tools to study and analyze the performance of your self-designed intelligent electrical power grid. By modeling smart grids, you will explore the integration of renewable energy sources into a grid, its dynamics, control and cyber security.

Subject:
Applied Science
Engineering
Information Science
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
TU Delft OpenCourseWare
Author:
D. Gusain
I. Diab
P. Palensky
Date Added:
09/04/2020
Syllabus: Digital Operations and Cybersecurity Management
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Syllabus for the course: CSCI 380 - Digital Operations and Cybersecurity Management. Delivered at John Jay College in Spring 2020 by Eric Spector as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Material Type:
Syllabus
Author:
Nyc Tech-in-residence Corps
Eric Spector
Date Added:
07/23/2020
Syllabus: Fundamentals of Cybersecurity and Intelligence Gathering
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Syllabus for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Syllabus
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Syllabus for Issues in Law Enforcement: Cybersecurity and Public Interest Technology
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a syllabus for a course in Issues in Law Enforcement, a criminal justice course. The curriculum is a public interest technology course in cybersecurity. Principally, the federal government handles cybersecurity investigations along with some state governments and the FBI acts as the center for all cybersecurity complaints.

The course expands beyond law enforcement and provides a comprehensive background to the field through the following presentations: a history of cybersecurity; an explanation of the Internet; an introduction to cybercrime and cybersecurity techniques; the legal environment, which includes a survey of law enforcement and prosecution departments and agencies, and federal and NY state criminal, civil and privacy laws; a case (Silk Road Market) about a darknet market which demonstrates federal law enforcement in action; and the concept that cybersecurity is an enormous challenge to law enforcement.

The course provides two types of student activities:

(i) Service learning project in which students present about how to prevent yourself from being hacked; and

(ii) Group assignments in which students choose and analyze four types of current cybersecurity cases as a team by answering questions posed by the professor which is presented to the class as a whole.

Subject:
Career and Technical Education
Criminal Justice
Material Type:
Syllabus
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/12/2020
Take Control of Your Personal Info to Help Prevent Identity Theft
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Identity theft has become a fact of life during the past decade. If you are reading this, it is a safe bet that your data has been breached in at least one incident. Does that mean we are all helpless? Thankfully, no. There is a lot we can do to protect ourselves from identity theft and to make recovery from cyber incidents quicker and less painful.

Subject:
Economics
Social Science
Material Type:
Reading
Provider:
University of Washington
Author:
EDUCAUSE
Date Added:
05/20/2024