Course Catalog

Sort courses by:




64 courses found

Notice: If you're looking for a specific course, please log in to our LMS and use the search tools there.

Showing 1-10 of 64

Teaching Cyber Security with the Arkansas Range | Module 1 - Intro to Range and Hacker Methodology

With the increase in cyberattacks that have hit both public and private institutions across the globe in recent years, now, more than ever, the nation is in dire need of talented cybersecurity professionals.

Intro to Range and Hacker Methodology, is the first module in the Teaching Cyber Security with the Arkansas Range series. This series will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID: CSC20013
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"aea07c4d3d1709313c4bb2d07a47027d":{"option":"4e","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 0.5


Teaching Cyber Security with the Arkansas Range | Module 2 - Knowing Normal: Recognizing Traffic Patterns

Knowing what normal looks like in a network is one of the keys to understanding it, but also in being able to troubleshoot problems that might arise in that network. Learning the steps to find, track, and interpret network data are crucial skills to learn in a world where so much of what we do depends on those systems functioning efficiently. In this module, we take the first steps through exploration using tools within the Cyber Range that gather data from a network. We also begin the practice of properly recording network data.

Knowing Normal: Recognizing Traffic Patterns, is the second module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID: CSC20014
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"aea07c4d3d1709313c4bb2d07a47027d":{"option":"4e","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 1


Teaching Cyber Security with the Arkansas Range | Module 3 - Traffic Shaping and Manipulation

In this course we look at the tools network administrators and analysts use to secure a network by monitoring and controlling its traffic. We begin by learning the basics of firewalls and their placement in a network. In the firewall lab, we experiment with the creation and order of firewall rules. Next, we discuss some common types of proxies and how they operate to keep a network secure. We continue by exploring the differences between an IDS and an IPS. Finally, we investigate the tools Snort and BASE and how they help with packet capture and analysis.

Traffic Shaping and Manipulation, is the third module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID: CSC20015
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"aea07c4d3d1709313c4bb2d07a47027d":{"option":"4e","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 1


Teaching Cyber Security with the Arkansas Range | Module 4 - Logging and Monitoring

When a problem occurs, having the right data to trace the issue back to the source is key to incident response. But which data should be collected? In this course, we explore not only what data should be collected but also different ways to view those logs in Windows and Linux systems. Then we dig into log aggregation, the Elastic Stack, SIEMs, and a variety of network management tools.

Logging and Monitoring is the fourth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID: CSC20016
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"aea07c4d3d1709313c4bb2d07a47027d":{"option":"4e","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 1


Teaching Cyber Security with the Arkansas Range | Module 5 - Windows Hosts

There are several methods for securing a Windows machine, but one of the most critical is making sure each system has proper account management principles in place. Unfortunately, many organizations fail to follow best practices when it comes to account management, putting their systems and data at risk. Prepare to learn how Microsoft Active Directory can be used to help an organization establish consistent policies, some of the best practices regarding account management, and general Windows host security.

Windows Hosts is the fifth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

 

CID: CSC20017
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"aea07c4d3d1709313c4bb2d07a47027d":{"option":"4e","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 1


ATI Online: Intellectual Property and Copyright in the Field of Education

This course, ATI Online - Intellectual Property and Copyright in the Field of Education, is an educator's guide to traversing the surface of copyright and trademark law with "fair use."

CID: TCB14002
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"9a9c910c4e4249fceefcab487e9c9550":{"option":"4f","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 2


ATI Online: Planning Video Production

This Arkansas Technology Institute (ATI) Online course showcases Stephanie Lewis, an Arkansas Education Television Network Producer, discussing the details of successfully planning a video production at the annual ATI Online Workshop. In this course, participants will learn questions to ask during the planning stages of production, the importance of scouting, and the meaning of persistence of vision. 

CID: TCB14003
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"cc7a1e792bca8ccb1946b7a07f6dbc03":{"option":"1d","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 1


ATI Online: Techniques of Video Production

This course from Arkansas Technology Institute (ATI) Online teaches participants the basics of camera operation. It addresses beginning production and camera skills in three parts – Shot Composition, Basic Camera Setup and Operation, and Lighting. Arkansas Educational Television Network (AETN) Producer, Amy Waller demonstrates lighting techniques, how to use microphones, and various types of camera shots to be used for basic filming.

 

CID: TCB14004
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"cc7a1e792bca8ccb1946b7a07f6dbc03":{"option":"1d","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 1.5


ATI Online: Editing Techniques - Things We've All Learned the Hard Way

This course provides the novice learner with basic video editing techniques and concepts. The lessons in this course will provide teachers with knowledge of how to prepare and to use video footage. The goal of this course is for teachers to be able to develop, and then implement, technology-based projects and lesson plans in the classroom.

This Editing Techniques course was previously taught and recorded during the week-long Arkansas Technology Institute in the Arkansas Educational Television Network laboratory and studios. Bruce Rodtnick, producer with the AETN Education Division, skillfully guides the novice teacher through this basic editing process. Former ATI graduates are encouraged to take this editing course as a refresher.

CID: TCB14005
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"cc7a1e792bca8ccb1946b7a07f6dbc03":{"option":"1d","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 1


ATI Online: Introduction to PowerPoint

This course provides a basic overview of using Microsoft Office PowerPoint to bring technology into the classroom in order to engage students in daily lessons. Teachers will learn how to create a presentation with images and video clips.

Please note that this course was designed as a training for Microsoft Office PowerPoint 2007. If you are using an older or newer version, some of the buttons and commands may be different.

CID: TCB14084
Subject Area:
{"e7e767d7c0e58b16e57d3ab16150db80":{"option":"Technology","icon":"","default":1,"delete":0}}

TESS Domain: {"cc7a1e792bca8ccb1946b7a07f6dbc03":{"option":"1d","icon":"advertising-practice","default":1,"delete":0},"5fcfcb7df376059d0075cb892b2cc37f":{"option":"3c","icon":"advertising-practice","default":1,"delete":0}}
LEADS Domain: none
Credit Hours: 0.5