Wyoming DOE Logo

Cybersecurity - Secondary
Material Image
Microcredential ID : 41
Stack
Networks & Internet - Secondary Teachers
Credits
1 PTSB Recertification Credit

Description

Earners will need to demonstrate their understanding of transmitting information securely across networks with appropriate protection. In addition, earners will show how to effectively support student learning in protecting their personal data. Earners will also need to demonstrate how they participate in computer science Professional Learning Communities to collaborate with peers, celebrate successes, share lessons learned, and address challenges.

Standards
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Professional Growth and Identity
    3f - Participate in CS professional learning communities. Participate in CS professional learning communities (PLCs) to collaborate with peers, celebrate successes, share lessons learned, and address challenges.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4a - Analyze CS curricula. Analyze CS curricula for implementation in their classrooms in terms of CS standards alignment, accuracy, completeness of content, cultural relevance, and accessibility.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4b - Develop standards-aligned learning experiences. Design and adapt learning experiences that align to comprehensive K-12 CS standards.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4g - Inform instruction through assessment. Develop multiple forms and modalities of assessment to provide feedback and support. Use resulting data for instructional decision-making and differentiation.
  • Wyoming Content and Performance Standards > Cybersecurity
    8.NI.C.01 - Critique physical and digital procedures that could be implemented to protect electronic data/information.
  • Wyoming Content and Performance Standards > Cybersecurity
    8.NI.C.02 - Apply multiple methods of encryption to model the secure transmission of data.
  • Wyoming Content and Performance Standards > Cybersecurity
    L1.NI.C.01 - Give examples to illustrate how sensitive data can be affected by malware and other attacks.
  • Wyoming Content and Performance Standards > Cybersecurity
    L1.NI.C.02 - Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  • Wyoming Content and Performance Standards > Cybersecurity
    L1.NI.C.03 - Compare various security measures, considering trade-offs between the usability and security of a computing system.
  • Wyoming Content and Performance Standards > Cybersecurity
    L1.NI.C.04 - Explain trade-offs when selecting and implementing cybersecurity recommendations.
  • Wyoming Content and Performance Standards > Cybersecurity
    L2.NI.C.01 - Compare ways software developers protect devices and information from unauthorized access.
How To Earn This Microcredential

To earn this microcredential, you will process through the ADDIE learning model producing evidence that demonstrates your knowledge of the Wyoming Computer Science Content and Performance Standards and the CSTA Standards for Teachers. Through the ADDIE learning model, you will analyze standards, design/develop and implement a lesson, collect student work artifacts, and evaluate your professional practices.

Fees
There will be no fee assessed for reviewing this microcredential.
Clarifications

The Cybersecurity microcredential is one of two microcredentials that make up the Networks & Internet stack. The Networks & Internet stack is one of six microcredential stacks which when completed will lead to a Computer Science Teacher Master Distinction.

Important Terms
Authentication:

The verification of the identity of a person or process.

Computing device:

A physical device that uses hardware and software to receive, process, and output information. This may include computers, mobile phones, and computer chips.

Computing system:

A collection of one or more computers or computing devices, together with their hardware and software, integrated for the purpose of accomplishing shared tasks. Although a computing system can be limited to a single computer or computing device, it more commonly refers to a collection of multiple connected computers, computing devices, and hardware.

Cybersecurity:

The protection against access to, or alteration of, computing resources through the use of technology, processes, and training.

Data:

Information that is collected and used for reference or analysis. Data can be be digital or nondigital and can be in many forms, including numbers, tests, show of hands, images, sounds, or videos.

Encryption:

The conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

Network:

A group of computing devices (e.g., personal computers, phones, servers, switches, routers, etc.) connected by cables or wireless media for the exchange of information and resources.

Software:

Programs that run on a computing system, computer, or other computing device.

Packet:

The unit of data sent over a network.

Password:

A string of characters used to verify the identity of a user during the authentication process. Password is an example of one authentication factor.

Router:

A device or software that determines the path that data packets travel from source to destination.

Universal design for learning (UDL):

A framework for designing curriculum to be broadly accessible to all students. (See UDL for Learning Guidelines + Computer Science/Computational Thinking in the resources)

Modalities of assessment:

Modalities of assessment include written assessment, oral assessment, performance tasks, or visual representations.

Forms of assessment:

These include formative, summative, or student self-assessment.

Background Scenario / How This Will Help You

This microcredential collection provides earners with the opportunity to document their knowledge and skills in teaching computer science to students in grades 6–12. The content provides resources to support understanding.

Earners are encouraged to participate in additional learning opportunities if more extensive learning is needed. Additional learning opportunities may include free online resources, postsecondary courses, and local courses.

The microcredential structure offers earners flexible pathways and timelines. Earners can complete the microcredentials in any order that aligns with their classroom timelines and availability. Micro-credentials offer earners the opportunity to submit evidence and receive evaluator feedback. Earners are encouraged to resubmit evidence until mastery is earned. Each resubmission will be reviewed, and updated feedback will be provided.

Evidence Options
Be sure to submit the type and number of pieces of evidence specified below.
Category: Analyze

Analyze: Standards:

Please complete "02. ANALYZE – Networks & the Internet – Cybersecurity" in the resources section below. All instructions are included in the worksheet. Once you have completed the worksheet, upload it in the evidence section as a PDF. The resource can be found by following this link: https://bit.ly/3ZV2ljs.

Category: Design/Develop

Lesson Plan:

Find "03. DESIGN/DEVELOP" in the resources section below. All instructions are included in the worksheet. Once you are finished with this task, upload your lesson plan in the evidence section as a PDF. The resource can be found by following this link: https://bit.ly/3QiOmAG.

Category: Implement

Implementation:

Implement the set of activities or lesson plan you designed. Submit evidence of student learning for your focus standard. Include evidence of students that have met the standard and students that have not met the standard. Examples include videos of students working, completed student worksheets, etc. Annotate each piece of evidence to demonstrate how you facilitated student achievement of the standard.

Category: Evaluate

Journal:

Find "04. EVALUATE – Worksheet" in the resources section below. All instructions are included in the worksheet. The resource can be found by following this link: https://bit.ly/3PThjBX.


Review Criteria

Evidence submissions and reflections will be reviewed for alignment with the assignment guidelines and the proficiency scale. The checklist will help you review your submission materials to ensure you address everything that is expected for this micro-credential.

Reflection Prompts

Please provide a self-assessment, a score from 1–4, on each component of the proficiency scale found here: https://bit.ly/2TL9fKw. Provide a few sentences stating where the pieces of evidence that support the scores for each component are located.

If you are resubmitting, please indicate what changes were made in the documents (e.g., highlight, text color) and include "Resubmission #" with the resubmission number in the file title when you upload.


Review Criteria

Proficiency scale: https://bit.ly/46xyQ9I. Checklist: https://bit.ly/3rJOQ9H.

Content knowledge – CSTA 4a The teacher demonstrates accurate and complete knowledge of the content and skills of the standard being taught.

Inform instruction through assessment – CSTA 4g The teacher develops multiple forms and modalities of assessment to provide feedback and support. The teacher uses resulting data for instructional decision-making and differentiation.

Supporting standards The teacher identifies and explains the connection of supporting computer science standards to the standard being taught in their lesson.

Vertical alignment – CSTA 4b The teacher explains the relationship of the standard in the scope and sequence of computer science standards directly above and below chosen grade band.

Participate in computer science professional learning communities – CSTA 3f The teacher participates in computer science PLCs to collaborate with peers, celebrate successes, share lessons learned, and address challenges.

Resources
Tool – UDL for Learning Guidelines + Computer Science/Computational Thinking
https://ctrl.education.ufl.edu/wp-content/uploads/sites/5/2020/05/Copy-of-UDL-and-CS_CT-remix.pdf

UDL is a framework for designing curriculum to be broadly accessible to ALL students. Learn more about utilizing the UDL framework in computer science education.


Webpage – CSTA Wyoming
https://web.membernova.com/400361/page/about-us

CSTA Wyoming's website so teachers can join.


Standards – CSTA Standards for Computer Science Teachers
https://www.csteachers.org/page/standards-for-cs-teachers

These standards are designed to provide clear guidance on effective and equitable computer science instruction in support of rigorous computer science education for all K–12 students.


Micro-Credential Map By Grade Band
https://docs.google.com/spreadsheets/d/1E6pQDbFCQ42O1FUzQIakJS9CRKraHiORCXdUXmdcBCw/copy#gid=1114401374

The computer science standards are written in grade bands (K–2, 3–5, 6–8, and 9–12). The standard committee (CSSRC) determined the standard to be met by the end of each grade band. In grades 9-12, there are level 1 and level 2 standards. Level 1 standards include introductory skills. Level 2 standards are intended for students who wish to advance their study of computer science. The teacher or earner can choose which grade band and standard to focus their lesson on.


03. DESIGN/DEVELOP
https://bit.ly/3QiOmAG

Use this resource for the design/develop step of the ADDIE model.


04. EVALUATE – Worksheet
https://bit.ly/3PThjBX

Evaluate how effective your activities were at promoting student learning of the standards. Use specific examples from the artifacts you submitted in Implement and suggest any changes in practice or approach that you might make in the future based on your experience with this micro-credential.


Standards – Wyoming Computer Science Content and Performance Standards
https://edu.wyoming.gov/wp-content/uploads/2021/04/2020-CS-WYCPS-with-all-PLDs-effective-04.07.21.pdf

Performance Level Descriptors (PLDs) describe the performance expectations of students for each of the four (4) performance level categories: advanced, proficient, basic, and below basic. These are a description of what students within each performance level are expected to know and be able to do. All PLDs are found in this document.


Article – "Unwrapping" the Standards: A Simple Way to Deconstruct Learning Outcomes
https://corwin-connect.com/2015/03/unwrapping-the-standards-a-simple-way-to-deconstruct-learning-outcomes/

“Unwrapping” is a simple method that all teachers in all grade levels can use to deconstruct the wording of any standard in order to know its meaning inside and out.


Sample Response – Completed Devices Micro-Credential
https://drive.google.com/file/d/1ESoWRRdNZRjruO2j-1eq4CUU3YoWLlh1/view?usp=sharing

This resource includes a sample response for analyze, design/develop, implement, and analyze as well as a sample reflection prompt response for the devices micro-credential.


01. PROFICIENCY SCALE – Networks & Internet – Cybersecurity
https://bit.ly/46xyQ9I

This scale is provided as a resource for learners to view micro-credential criterion and the performance descriptor levels for demonstration of mastery.


02. ANALYZE – Networks & the Internet – Cybersecurity
https://bit.ly/3ZV2ljs

Analyze the student and teacher standards aligned with the Networks & the Internet – Cybersecurity micro-credential. Aligned standards and instructions for selecting a focus standard are outlined below the task description. There are two parts to this task.


Research – Overview of Cybersecurity
https://www.researchgate.net/publication/329678338_Overview_of_Cyber_Security

This five-page article explains the basics of cybersecurity and introduces reasons for why the field of cybersecurity is important and continuing to grow.


Article – The 5 Types of Cyber Attack You're Most Likely to Face
https://www.csoonline.com/article/2616316/the-5-types-of-cyber-attack-youre-most-likely-to-face.html

This article explains the five most common types of cyber attack that everyone should know about if they go online.


Video – Defining Cybersecurity
https://youtu.be/PuHNf7cF-Tk

This video explains important cybersecurity vocabulary and other terminology.


Lesson Plan – Cybersecurity – A Curriculum for a High School Cybersecurity Course
https://github.com/DerekBabb/CyberSecurity

This curriculum is designed for a high school computer science course focused on cybersecurity. Each of the units have activities that could be used with or without prior coding knowledge so the course is customizable to the needs of the given students/teacher.


Lesson Plan – Malware Mafia
https://computerscience.columbusstate.edu/docs/cyber/roadshow/ActivityMalware.pdf

This unplugged activity uses storytelling and game techniques to teach about malware attacks and anti-malware software.


Article – The CIA Triad – Confidentiality, Integrity, and Availability Explained
https://www.freecodecamp.org/news/the-cia-triad-confidentiality-integrity-and-availability-explained/

This short article highlights each pillar of the CIA triad and concludes with a discussion of some challenges for the triad.


Video – Cybersecurity Minute
https://youtube.com/playlist?list=PL1rFvQRVWVVYLC8pf8sLPff7UIQdozwK0

This is a collection of videos on various cybersecurity topics.


Lesson Plan – Activity: Encryption/Keys
https://computerscience.columbusstate.edu/docs/cyber/roadshow/ActivityEncryption_Keys.pdf

This is an introductory activity to ciphers and encryption techniques.


Video – Public Key Cryptography – Computerphile
https://youtu.be/GSIDS_lvRv4

This six-minute video details public and private key cryptography as computer science and cybersecurity has evolved.


Video – Characters, Symbols, and the Unicode Miracle
https://youtu.be/MijmeoH9LT4

Representing symbols, characters and letters that are used worldwide is no mean feat, but unicode managed it - how? Tom Scott explains how the web has settled on a standard.


Video – Encryption and HUGE Numbers
https://youtu.be/M7kEpw1tn50

This video discusses how banks, Facebook, Twitter and Google use epic numbers - based on prime factors - to keep our Internet secrets. This is RSA public-key encryption.


Video Tutorial: Platform Navigation Tutorias
https://docs.google.com/document/d/1hUZSMULBOzj-_CmIo2zuiZG2QziB40D_qBOXqAc5P5k/edit?usp=sharing

This is a list of videos that support navigation of the Midas platform. Including how to submit micro-credentials for review.


Video Tutorial: Unpacking Wyoming Computer Science Standards
https://drive.google.com/file/d/1fy_LGu8NWKlbhJWlGblE01V520kGsPJ6/view?usp=sharing

This video helps for unpacking the Wyoming Computer Science standards as part of the micro-credential.


Video Tutorial: Best Practice in Google Drive Organization
https://drive.google.com/file/d/15WPbS__MRNpSGpEyTWWocd362qK6piZX/view?usp=sharing

This video provides best practices in Google Drive organization for the micro-credentials.


Video Tutorial: Completing the CSTA CS Teacher Standard Analyze Task
https://drive.google.com/file/d/1STn9CNmjxjjosyglv_-VbQxUOevp8Ax7/view?usp=sharing

This video gives pointers on completing the CSTA CS teacher standard analyze task for the micro-credential.


Cybersecurity Micro-credential Checklist
https://bit.ly/3rJOQ9H

This checklist will help you review your submission materials to ensure you address everything that is expected for this micro-credential.

Earners
Jennifer Anderson

Jennifer Anderson
Gina Carroll

Gina Carroll
Jill Felbeck-Jones

Jill Felbeck-Jones
Kiesa Geyer

Kiesa Geyer
Abby Hurley

Abby Hurley
Debbie Jacobson

Debbie Jacobson
Jared Lundholm

Jared Lundholm
Amanda Martin

Amanda Martin
Lena Rossolo

Lena Rossolo
Walt Smith

Walt Smith
Wyoming Department of Education

122 W. 25th St. Suite E200

Cheyenne, WY 82002

Phone: (307) 777-7675 

© Copyright 2023 Wyoming Department of Education