Wyoming DOE Logo MIDAS Logo

Cybersecurity - Elementary
Material Image
Microcredential ID : 66
Networks & Internet - Elementary
0.5 PTSB Recertification Credit


Earners will need to demonstrate their understanding of transmitting information securely across networks with appropriate protection. In addition, earners will show how to effectively support student learning in protecting their personal data. Earners will also need to demonstrate how they participate in computer science Professional Learning Communities to collaborate with peers, celebrate successes, share lessons learned, and address challenges.

  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Professional Growth and Identity
    3f - Participate in CS professional learning communities. Participate in CS professional learning communities (PLCs) to collaborate with peers, celebrate successes, share lessons learned, and address challenges.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4a - Analyze CS curricula. Analyze CS curricula for implementation in their classrooms in terms of CS standards alignment, accuracy, completeness of content, cultural relevance, and accessibility.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4b - Develop standards-aligned learning experiences. Design and adapt learning experiences that align to comprehensive K-12 CS standards.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4g - Inform instruction through assessment. Develop multiple forms and modalities of assessment to provide feedback and support. Use resulting data for instructional decision-making and differentiation.
  • Wyoming Content and Performance Standards > Cybersecurity
    2.NI.C.01 - Explain what authentication factors (e.g., login) are, why we use them, and apply authentication to protect devices and information (personal and private) from unauthorized access.
  • Wyoming Content and Performance Standards > Cybersecurity
    5.NI.C.01 - Discuss real-world cybersecurity problems and identify and implement appropriate strategies for how personal information can be protected.
How To Earn This Microcredential

To earn this micro-credential, you will process through the ADDIE learning model producing evidence that demonstrates your knowledge of the Wyoming Computer Science Content and Performance Standards and the CSTA Standards for Teachers. Through the ADDIE learning model, you will analyze standards, design/develop and implement a lesson, collect student work artifacts, and evaluate your professional practices.

There will be no fee assessed for reviewing this microcredential.

This micro-credential is intended for teachers in grades K-6. If you teach middle school or high school grades, you will want to work on the secondary level computer science micro-credentials. The Cybersecurity micro-credential is one of two micro-credentials that make up the Networks & Internet stack. The Networks & Internet stack is one of six micro-credential stacks, which, when completed, will lead to a Computer Science Teacher Master Distinction.

Important Terms

The design of products, devices, services, or environments for people who experience disabilities. Accessibility standards that are generally accepted by professional groups include the Web Content Accessibility Guidelines (WCAG) 2.0 and Accessible Rich Internet Applications (ARIA) standards.


The verification of the identity of a person or process.


The maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time.

Computer Science:

The study of computing principles, design, and applications (hardware & software); the creation, access, and use of information through algorithms and problem-solving, and the impact of computing on society.

Computing Device:

A physical device that uses hardware and software to receive, process, and output information. Computers, mobile phones, and computer chips inside.

Computing System:

A collection of one or more computers or computing devices, together with their hardware and software, integrated for the pur pose of accomplishing shared tasks. Although a computing system can be limited to a single computer or computing device, it more commonly refers to a collection of multiple connected computers, computing devices, and hardware.


A program's or device's ability to link with other programs and devices.


The protection against access to, or alteration of, computing resources through the use of technology, processes, and training.


Information that is collected and used for reference or analysis. Data can be digital or non-digital and can be in many forms, including numbers, test, show of hands, images, sounds, or video.


The conversion of electronic data into another form called ciphertext, which cannot be easily understood by anyone except authorized parties.

Forms of Assessment:

These include formative, summative, or student self-assessment.


The global collection of computer networks and their connections, all using shared protocols to communicate.

Modalities of Assessment:

Modalities of assessment include written assessment, oral assessment, performance tasks, or visual representations.


A group of computing devices (personal computers, phones, servers, switches, routers, etc.) connected by cables or wireless media for the exchange of information and resources.


The unit of data sent over a network.


A string of characters used to verify the identity of a user during the authentication process. Password is an example of one authentication factor.


A device or software that determines the path that data packets travel from source to destination.


A computer or computer program which manages access to a centralized resource or service in a network.


Programs that run on a computing system, computer, or other computing device.


Switches are devices in a computer network that connects other devices together. Switches manage the flow of data across a network by transmitting a received network packet only to one or more devices for which the packet is intended.


The physical and logical configuration of a network; the arrangement of a network, including its nodes and connecting links. A logical topology is the way devices appear connected to the user. A physical topology is the way they are actually interconnected with wires and cables.

Universal Design for Learning (UDL):

UDL is a framework for designing a curriculum to be broadly accessible to ALL students. Learn more about utilizing the UDL Framework in CS education.

Background Scenario / How This Will Help You

This micro-credential collection provides earners with the opportunity to document their knowledge and skills in teaching computer science to students in grades K-6. The resources offer support understanding.

Earners are encouraged to participate in additional learning opportunities if more extensive learning is needed. Other learning opportunities may include free online resources, postsecondary courses, and local courses.

The micro-credential structure offers earners flexible pathways and timelines. Earners can complete the micro-credentials in any order that aligns with their classroom timelines and availability. In addition, micro-credentials offer earners the opportunity to submit evidence and receive evaluator feedback. Earners are encouraged to resubmit evidence until mastery is earned. Each resubmission will be reviewed, and updated feedback will be provided.

Evidence Options
Be sure to submit the type and number of pieces of evidence specified below.
Category: Analyze

All instructions are included in the worksheet. Once you have completed the worksheet, upload it in the evidence section as a PDF.

Analyze: Standards:

This task requires an analysis of both computer science content standards and the CSTA Standards for Computer Science Teachers. Google Docs Template: https://bit.ly/3GyNgsE

ANALYZE – K-6 Networks & Internet – Cybersecurity.docx

Category: Design/Develop

This lesson plan shows the planned instruction of your computer science focus standard.

Lesson Plan:

All instructions are included in the worksheet. Once you are finished with this task, upload your lesson plan in the evidence section as a PDF. Google Docs Template: https://bit.ly/3ummSzC


Category: Implement

Implement the set of activities or lesson plan you designed.

Student Work:

Submit evidence of student learning for your focus standard. Include evidence of students that have met the standard and students that have not met the standard. Examples include videos of students working, completed student worksheets, etc. Annotate each piece of evidence to demonstrate how you facilitated student achievement of the standard.

Category: Evaluate

Evaluate how effective your activities were at promoting student learning of the standards. Use specific examples from the artifacts you submitted in the Implement activity.


All instructions are included in the worksheet. Once you have completed the worksheet, upload it in the evidence section as a PDF. Google Docs Template: https://bit.ly/3J5Og8X

EVALUATE – Worksheet.docx

Review Criteria

Evidence submissions and reflections will be reviewed for alignment with the assignment guidelines and the proficiency scale, found here. Proficiency scale: https://bit.ly/3AXjyMq

The checklist will help you review your submission materials to ensure you address everything that is expected for this micro-credential. Checklist: https://bit.ly/3HrJkes

Reflection Prompts

Please provide a self-assessment, a score from 1–4, on each component of the proficiency scale found here: https://bit.ly/3AXjyMq. Provide a few sentences stating where the pieces of evidence that support the scores for each component are located.

If you are resubmitting, please indicate what changes were made in the documents (e.g., highlight, text color) and include "Resubmission #" with the resubmission number in the file title when you upload.

Review Criteria

Content knowledge – The teacher demonstrates accurate and complete knowledge of the content and skills of the standard being taught. CSTA 4a

Inform instruction through assessment – The teacher develops multiple forms and modalities of assessment to provide feedback and support. The teacher uses resulting data for instructional decision-making and differentiation. CSTA 4g

Supporting standards The teacher identifies and explains the connection of supporting computer science standards to the standard being taught in their lesson.

Vertical alignment – The teacher explains the relationship of the standard in the scope and sequence of computer science standards directly above and below chosen grade band. CSTA 4b

Participate in computer science professional learning communities – The teacher participates in computer science PLCs to collaborate with peers, celebrate successes, share lessons learned, and address challenges. CSTA 3f

2nd grade CS Lessons Gilbert Public Schools

Lessons aligned to each CS Standard for grades K-2.

5th grade CS Lessons Gilbert Public Schools

Lessons aligned to each CS Standard for grades 3 -5.

Cybersecurity 101

Cybersecurity lessons and videos from Khan Academy.

Interactive Cybersecurity Activity Kit

With this activity kit teachers have concrete tools to help teach their students to learn about online safety and security in a fun and engaging way. These resources open the dialogue between children and their teachers about the real online threats. This activity kit consists of a workbook with puzzles and games, a poster, and a video module featuring KnowBe4’s security awareness hero Captain Awareness.

Password Power-up

Stronger, more secure online passwords are a good idea for everyone. But how can we help kids create better passwords and actually remember them? Use the tips in this lesson to help kids make passwords that are both secure and memorable.

Safe Online Surfing

Free curriculum from the FBI for grades 3-8 to promote cyber citizenship and help students learn about online safety while engaging in fun, interactive games. The program was designed to address current Internet safety threats while keeping each grade level's online usage and knowledge in mind.

Secure Your Secrets

4 lessons from Google's Be Internet Awesome Digital Citizenship Curriculum cover the topics of basic online privacy and security. Including how to protect devices and personal information as well as being smart about your passwords.

That's Private!

Staying safe online is a lot like staying safe in the real world. By helping a Digital Citizen sign up for a new app, students learn about the kinds of information they should keep to themselves when they use the internet -- just as they would with a stranger in person.

Wyoming CSTA

By joining CSTA and CSTA WY, you are part of a community of educators looking to provide students with the most current knowledge, content, and materials in the ever-evolving computer science field.

Canvas Course: Networks & the Internet - Elementary

This course is designed to support you in completing the following Wyoming Elementary Computer Science micro-credentials in the Networks and the Internet stack: Cybersecurity and Network Organization & Communication. The course is organized into two modules, one for each micro-credential in the stack. The course supports educators in better understanding the Computer Science Wyoming Content & Performance Standards, Computer Science Teachers Association (CSTA) Standards for CS Teachers, and how to complete the Analyze and Develop tasks associated with the micro-credential.

Anita Carptenter

Anita Carptenter
Erika Jorgensen

Erika Jorgensen
Sandra Joslin

Sandra Joslin
Shebree Moore

Shebree Moore
Kaylee Nygren

Kaylee Nygren
Courtney Pushcar

Courtney Pushcar
Melissa Rasmussen

Melissa Rasmussen

Wyoming Department of Education

122 W. 25th St. Suite E200

Cheyenne, WY 82002

Phone: (307) 777-7675 

© Copyright 2023 Wyoming Department of Education