The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, …
The scan is the first release from SETDA's Cybersecurity and Privacy Collaborative, a professional learning community of state edtech leaders and private sector partners focused on identifying key resources, assessing state-level K-12 cybersecurity advocacy efforts, and crafting policy recommendations.
Small Districts, Big Hurdles: Cybersecurity Support for Small, Rural, and Under-resourced Districts, …
Small Districts, Big Hurdles: Cybersecurity Support for Small, Rural, and Under-resourced Districts, offers details on how state agencies and other support organizations are empowering their smallest districts to secure their data and networks. From detailing various funding sources to providing insights into statewide and regional partnerships and offering practical examples of cybersecurity training, the document is a must-read for everyone involved in helping districts improve their cybersecurity posture. It is the newest addition to SETDA’s Cybersecurity & Privacy Collection.
The smart grid of the future is a complex electrical power system. …
The smart grid of the future is a complex electrical power system. Its study, design, and management requires the integration of knowledge from various disciplines including sustainability, technology and mathematics.
Smart grids show a level of complexity and heterogeneity that often cannot be covered by analytical methods. Therefore, modeling and simulation are of great importance.
In this course, you will apply modeling tools to study and analyze the performance of your self-designed intelligent electrical power grid. By modeling smart grids, you will explore the integration of renewable energy sources into a grid, its dynamics, control and cyber security.
Syllabus for the course: CSCI 380 - Digital Operations and Cybersecurity Management. …
Syllabus for the course: CSCI 380 - Digital Operations and Cybersecurity Management. Delivered at John Jay College in Spring 2020 by Eric Spector as part of the Tech-in-Residence Corps program.
Syllabus for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence …
Syllabus for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Syllabus for the course "CS 360 - Software Security Engineering" delivered at …
Syllabus for the course "CS 360 - Software Security Engineering" delivered at Medgar Evers College in Spring 2019 by Andrew Bristow as part of the Tech-in-Residence Corps program.
This is a syllabus for a course in Issues in Law Enforcement, …
This is a syllabus for a course in Issues in Law Enforcement, a criminal justice course. The curriculum is a public interest technology course in cybersecurity. Principally, the federal government handles cybersecurity investigations along with some state governments and the FBI acts as the center for all cybersecurity complaints.
The course expands beyond law enforcement and provides a comprehensive background to the field through the following presentations: a history of cybersecurity; an explanation of the Internet; an introduction to cybercrime and cybersecurity techniques; the legal environment, which includes a survey of law enforcement and prosecution departments and agencies, and federal and NY state criminal, civil and privacy laws; a case (Silk Road Market) about a darknet market which demonstrates federal law enforcement in action; and the concept that cybersecurity is an enormous challenge to law enforcement.
The course provides two types of student activities:
(i) Service learning project in which students present about how to prevent yourself from being hacked; and
(ii) Group assignments in which students choose and analyze four types of current cybersecurity cases as a team by answering questions posed by the professor which is presented to the class as a whole.
Identity theft has become a fact of life during the past decade. …
Identity theft has become a fact of life during the past decade. If you are reading this, it is a safe bet that your data has been breached in at least one incident. Does that mean we are all helpless? Thankfully, no. There is a lot we can do to protect ourselves from identity theft and to make recovery from cyber incidents quicker and less painful.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.