Earners will need to demonstrate their understanding of transmitting information securely across networks with appropriate protection. In addition, earners will show how to effectively support student learning in protecting their personal data. Earners will also need to demonstrate how they participate in computer science Professional Learning Communities to collaborate with peers, celebrate successes, share lessons learned, and address challenges.
To earn this micro-credential, you will process through the ADDIE learning model producing evidence that demonstrates your knowledge of the Wyoming Computer Science Content and Performance Standards and the CSTA Standards for Teachers. Through the ADDIE learning model, you will analyze standards, design/develop and implement a lesson, collect student work artifacts, and evaluate your professional practices.
This micro-credential is intended for teachers in grades K-6. If you teach middle school or high school grades, you will want to work on the secondary level computer science micro-credentials. The Cybersecurity micro-credential is one of two micro-credentials that make up the Networks & Internet stack. The Networks & Internet stack is one of six micro-credential stacks, which, when completed, will lead to a Computer Science Teacher Master Distinction.
The design of products, devices, services, or environments for people who experience disabilities. Accessibility standards that are generally accepted by professional groups include the Web Content Accessibility Guidelines (WCAG) 2.0 and Accessible Rich Internet Applications (ARIA) standards.
Authentication:The verification of the identity of a person or process.
Bandwidth:The maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time.
Computer Science:The study of computing principles, design, and applications (hardware & software); the creation, access, and use of information through algorithms and problem-solving, and the impact of computing on society.
Computing Device:A physical device that uses hardware and software to receive, process, and output information. Computers, mobile phones, and computer chips inside.
Computing System:A collection of one or more computers or computing devices, together with their hardware and software, integrated for the pur pose of accomplishing shared tasks. Although a computing system can be limited to a single computer or computing device, it more commonly refers to a collection of multiple connected computers, computing devices, and hardware.
Connectivity:A program's or device's ability to link with other programs and devices.
Cybersecurity:The protection against access to, or alteration of, computing resources through the use of technology, processes, and training.
Data:Information that is collected and used for reference or analysis. Data can be digital or non-digital and can be in many forms, including numbers, test, show of hands, images, sounds, or video.
Encryption:The conversion of electronic data into another form called ciphertext, which cannot be easily understood by anyone except authorized parties.
Forms of Assessment:These include formative, summative, or student self-assessment.
Internet:The global collection of computer networks and their connections, all using shared protocols to communicate.
Modalities of Assessment:Modalities of assessment include written assessment, oral assessment, performance tasks, or visual representations.
Network:A group of computing devices (personal computers, phones, servers, switches, routers, etc.) connected by cables or wireless media for the exchange of information and resources.
Packet:The unit of data sent over a network.
Password:A string of characters used to verify the identity of a user during the authentication process. Password is an example of one authentication factor.
Router:A device or software that determines the path that data packets travel from source to destination.
Servers:A computer or computer program which manages access to a centralized resource or service in a network.
Software:Programs that run on a computing system, computer, or other computing device.
Switches:Switches are devices in a computer network that connects other devices together. Switches manage the flow of data across a network by transmitting a received network packet only to one or more devices for which the packet is intended.
Topology:The physical and logical configuration of a network; the arrangement of a network, including its nodes and connecting links. A logical topology is the way devices appear connected to the user. A physical topology is the way they are actually interconnected with wires and cables.
Universal Design for Learning (UDL):UDL is a framework for designing a curriculum to be broadly accessible to ALL students. Learn more about utilizing the UDL Framework in CS education.
This micro-credential collection provides earners with the opportunity to document their knowledge and skills in teaching computer science to students in grades K-6. The resources offer support understanding.
Earners are encouraged to participate in additional learning opportunities if more extensive learning is needed. Other learning opportunities may include free online resources, postsecondary courses, and local courses.
The micro-credential structure offers earners flexible pathways and timelines. Earners can complete the micro-credentials in any order that aligns with their classroom timelines and availability. In addition, micro-credentials offer earners the opportunity to submit evidence and receive evaluator feedback. Earners are encouraged to resubmit evidence until mastery is earned. Each resubmission will be reviewed, and updated feedback will be provided.
All instructions are included in the worksheet. Once you have completed the worksheet, upload it in the evidence section as a PDF.
This task requires an analysis of both computer science content standards and the CSTA Standards for Computer Science Teachers. Google Docs Template: https://bit.ly/3GyNgsE
This lesson plan shows the planned instruction of your computer science focus standard.
All instructions are included in the worksheet. Once you are finished with this task, upload your lesson plan in the evidence section as a PDF. Google Docs Template: https://bit.ly/3ummSzC
Implement the set of activities or lesson plan you designed.
Submit evidence of student learning for your focus standard. Include evidence of students that have met the standard and students that have not met the standard. Examples include videos of students working, completed student worksheets, etc. Annotate each piece of evidence to demonstrate how you facilitated student achievement of the standard.
Evaluate how effective your activities were at promoting student learning of the standards. Use specific examples from the artifacts you submitted in the Implement activity.
All instructions are included in the worksheet. Once you have completed the worksheet, upload it in the evidence section as a PDF. Google Docs Template: https://bit.ly/3J5Og8X
Evidence submissions and reflections will be reviewed for alignment with the assignment guidelines and the proficiency scale, found here. Proficiency scale: https://bit.ly/3AXjyMq
The checklist will help you review your submission materials to ensure you address everything that is expected for this micro-credential. Checklist: https://bit.ly/3HrJkes
Please provide a self-assessment, a score from 1–4, on each component of the proficiency scale found here: https://bit.ly/3AXjyMq. Provide a few sentences stating where the pieces of evidence that support the scores for each component are located.
If you are resubmitting, please indicate what changes were made in the documents (e.g., highlight, text color) and include "Resubmission #" with the resubmission number in the file title when you upload.
Content knowledge – The teacher demonstrates accurate and complete knowledge of the content and skills of the standard being taught. CSTA 4a
Inform instruction through assessment – The teacher develops multiple forms and modalities of assessment to provide feedback and support. The teacher uses resulting data for instructional decision-making and differentiation. CSTA 4g
Supporting standards The teacher identifies and explains the connection of supporting computer science standards to the standard being taught in their lesson.
Vertical alignment – The teacher explains the relationship of the standard in the scope and sequence of computer science standards directly above and below chosen grade band. CSTA 4b
Participate in computer science professional learning communities – The teacher participates in computer science PLCs to collaborate with peers, celebrate successes, share lessons learned, and address challenges. CSTA 3f
Lessons aligned to each CS Standard for grades K-2.
Lessons aligned to each CS Standard for grades 3 -5.
Cybersecurity lessons and videos from Khan Academy.
With this activity kit teachers have concrete tools to help teach their students to learn about online safety and security in a fun and engaging way. These resources open the dialogue between children and their teachers about the real online threats. This activity kit consists of a workbook with puzzles and games, a poster, and a video module featuring KnowBe4’s security awareness hero Captain Awareness.
Stronger, more secure online passwords are a good idea for everyone. But how can we help kids create better passwords and actually remember them? Use the tips in this lesson to help kids make passwords that are both secure and memorable.
Free curriculum from the FBI for grades 3-8 to promote cyber citizenship and help students learn about online safety while engaging in fun, interactive games. The program was designed to address current Internet safety threats while keeping each grade level's online usage and knowledge in mind.
4 lessons from Google's Be Internet Awesome Digital Citizenship Curriculum cover the topics of basic online privacy and security. Including how to protect devices and personal information as well as being smart about your passwords.
Staying safe online is a lot like staying safe in the real world. By helping a Digital Citizen sign up for a new app, students learn about the kinds of information they should keep to themselves when they use the internet -- just as they would with a stranger in person.
By joining CSTA and CSTA WY, you are part of a community of educators looking to provide students with the most current knowledge, content, and materials in the ever-evolving computer science field.
This course is designed to support you in completing the following Wyoming Elementary Computer Science micro-credentials in the Networks and the Internet stack: Cybersecurity and Network Organization & Communication. The course is organized into two modules, one for each micro-credential in the stack. The course supports educators in better understanding the Computer Science Wyoming Content & Performance Standards, Computer Science Teachers Association (CSTA) Standards for CS Teachers, and how to complete the Analyze and Develop tasks associated with the micro-credential.
Wyoming Department of Education
122 W. 25th St. Suite E200 Cheyenne, WY 82002 Phone: (307) 777-7675 |