Required Resources
- Read article from IBM on
 - View and think about the network you have in your classroom.
 - Complete  with the following modules:
- 鈥淒escribe basic cyber security threats鈥 (21 mins)
 - 鈥淒escribe authentication and authorization鈥 (18 mins)
 - 鈥淒escribe device-based threats and security controls鈥 (17 mins)
 
 - View video on (5:57)
 
Additional Resources
- (11:53)
 
Required Evidence
- Create and submit a basic networking diagram for a classroom, include a few examples of each networked device (printer, computer, iPads). This can be done on , Microsoft Word, or Visio.
 - Submit a screenshot with evidence of the completed Microsoft training (the main screen of the training will show a green checkmark next to it)鈥嬧嬧嬧嬧嬧嬧
 
Evidence Review Criteria
- Criterion 1: Educator understands how a network is created.
 - Criterion 2: Educator understands basic cybersecurity and keeping their information safe.
 
0
      
0