SlideShare a Scribd company logo
1 of 22
TALK Cyber Security Summit
Kevin Nolten – Cyber Innovation Center
Scott U’Sellis - Kentucky Department of Education
Ryan Deal – Jefferson County Public Schools
CYBER ENGINEERING PATHWAY
• Welcome & Introductions
• Cyber Innovation Center
State of the Union
• FY15 CETAP Recap
• FY16 CETAP Goals and
Objectives
• DHS Guidance and Open
Discussion
Transforming Education
Empowering Educators
Preparing a Cyber-Ready Workforce
Professional Development
Curriculum Design
Collaboration in K-12 Education
Cyber Innovation Center
National Integrated Cyber Education
Research Center
The Cyber Interstate ™
NICERC Heat Map 1. Alabama
2. Arizona
3. Arkansas
4. California
5. Hawaii
6. Idaho
7. Indiana
8. Kentucky
9. Louisiana
10. Maryland
11. Michigan
12. Mississippi
13. Montana
14. New Jersey
15. Rhode Island
16. South Carolina
17. Tennessee
18. Texas
19. Virginia
State Department Engagement
Learning Management System
Over 250 files per course that
includes:
• Student Workbooks
• Master Notes
• Lesson Plans
• PowerPoints
• Standards Mapping
• And other Supplemental
Resources
NICERC team members serve as
the ‘teacher’ and teachers
across America are the
‘students’.
Kevin Nolten
NICERC
Kevin.Nolten@CyberInnovationCenter.org
318-759-1600 (Office)
www.NICERC.org
Cyber Engineering Pathway
Scott U’Sellis
Kentucky Department of Education
Office of Career and Technical Education
Cyber Engineering Pathway
• Cyber Engineering is now a recognized career pathway in the KDE Office of
Career and Technical Education’s IT Program of Studies for the 2017-2018
school year
• Thank you to Dawn Yankeelov and TALK for facilitating the discussion
between the Office of Career and Technical Education and the National
Integrated Cyber Education Research Center (NICERC)
• Business and industry partners are very excited to see the creation of this new
pathway
• We have partnered with NICERC and have chosen to adopt the NICERC
curriculum and the following courses:
• Cyber Literacy I
• Cyber Literacy II
• Cyber Science
• Computer Science
• Many schools are choosing to offer the complete career pathway sequence of
courses while others are choosing to offer single courses to supplement an
existing career pathway
INFORMATION TECHNOLOGY CAREER PATHWAYS
2017-2018
CYBER ENGINEERING
CIP 14.0902.00
PATHWAY DESCRIPTION: The Cyber Engineering pathway is a blend of programming, cyber
security, and hardware engineering disciplines. Students will learn to research, design, develop, and test
computer systems and components. The National Integrated Cyber Education Research Center
(NICERC) courses in the pathway use project-driven, application-based curricula that engage students at
the secondary level. The curricula provides the teacher with a rigorous program that showcases a
systems-level understanding of real-world applications of science, technology, engineering, and
mathematics. The courses provide a hands-on, context-based approach that empowers teachers to prepare
students to become the next generation of engineers and cyber professionals. The coursework explores
topics such as robotics, electricity, and security concerns in today’s digital society.
BEST PRACTICE COURSES
EXAMPLE
ILP-
RELATED
CAREER TITLESChoose (4) FOUR CREDITS from the following:
 110110 Computer Literacy OR
060112 Digital Literacy
 110222 Cyber Literacy I(NICERC)
 110223 Cyber Literacy II(NICERC)
 110224 Cyber Science(NICERC)
 110225 Computer Science(NICERC)
 110918 Information Technology Co-opOR
110919 Information Technology Internship
Note: There is no cost to implement NICERC courses (outside
of cost of equipment). Please see the link for further curriculum
information.
Security Systems
Technician
Computer Hardware
Engineer
Computer Network
Specialist
Computer Programmer
Computer Scientist
Computer SoftwareEngineer
NOTE: PROFESSIONAL DEVELOPMENT IS AVAILABLE THROUGH NICERC DURING THE
EDUCATION DISCOVERY FORUM (NICERC PROFESSIONAL DEVELOPMENT).
Who May Teach Cyber Engineering?
• 1. IT certified teachers are automatically eligible to teach in this
pathway
• However attending the NICERC Cyber Engineering summer training is highly
encouraged
• 2. Teachers with certification in other content areas
• This group must attend the NICERC Cyber Engineering summer training
• Information regarding the NICERC training:
• Venue: University of Louisville, College of Education and Human
Development
• Room: 201G
• Time: 8:00 AM-3:00 PM
• Dates: July 27-28 & July 31-August 1
• Note: A special thanks to Steve Swan at UofL for helping to secure the
location
IT Pathway Updates - JCPS
TALK Cyber security summit
JUNE 2017
Ryan Deal
Jefferson County Public Schools
Thank you!
• A Thank You at the beginning and not the end!
Idea 1: Redesign High School Experience
To realign JCPS IT programs to be relevant both to
the student and the community.
Goal 2: Talent Development Academies
To create a talent pool of Cyber Security and IT
professionals in the Louisville area that meets the
labor market demand.
Goal 3: Student Opportunities
To create a K-12 vertical pipeline of JCPS programs
that integrate cross curricular instruction around
career themes (Business and IT preferred )
IT pipeline Problem
Point 1 - Specifics
Bottom Line: We need more IT / Security professionals in Louisville; Now
and projected in the next 10 years.
Data points galore:
State: https://kylmi.ky.gov/admin/gsipub/htmlarea/uploads/Outlook.pdf
Local: http://www.kentuckianaworks.org/JobTrends/OccupationalOutlook.aspx
National: https://www.onetonline.org/find/bright?b=1&g=Go
Data on data!: http://www.csoonline.com/article/3083798/security/cybersecurity-spending-outlook-1-
trillion-from-2017-to-2021.html
Specifics
Simply put:
IT pathways
=
STEM!
Long term goals:
• Create programs in Cyber Security Engineering that aligns to a national
curriculum at the K-12 level.
• Create a pipeline program that creates vertical alignment between
grades
• Train teachers and staff on the model and provide integration support.
• That’s where WE come in! TALK, Community, Industry, Government, Post-
Secondary, etc.
Specifics
How can I help?
• Awareness
• Advocate
• Plug In and Volunteer
• Promote
Final
• Questions, comments, concerns?

More Related Content

What's hot

Iste.nets assignment 1
Iste.nets  assignment 1Iste.nets  assignment 1
Iste.nets assignment 1Pat Nembhard
 
Why computer science in K-12 by Code.org
Why computer science in K-12 by Code.orgWhy computer science in K-12 by Code.org
Why computer science in K-12 by Code.orgPeerasak C.
 
Edld 5362 assignment 5.pptx
Edld 5362 assignment 5.pptxEdld 5362 assignment 5.pptx
Edld 5362 assignment 5.pptxpanizan
 
Edunine 2019 conference Awards session
Edunine 2019 conference Awards session Edunine 2019 conference Awards session
Edunine 2019 conference Awards session Manuel Castro
 
Reflection of highland park isd’s technology plan
Reflection of highland park isd’s technology planReflection of highland park isd’s technology plan
Reflection of highland park isd’s technology planSarah Arnold
 
Otago Polytechnic School of IT Graduation Awards 2012
Otago Polytechnic School of IT Graduation Awards 2012Otago Polytechnic School of IT Graduation Awards 2012
Otago Polytechnic School of IT Graduation Awards 2012Samuel Mann
 
Project Lead The Way - A K-12 STEM Program of Study
Project Lead The Way - A K-12 STEM Program of StudyProject Lead The Way - A K-12 STEM Program of Study
Project Lead The Way - A K-12 STEM Program of StudyNAFCareerAcads
 
DigiReady: preparing learners for a digital workplace
DigiReady: preparing learners for a digital workplaceDigiReady: preparing learners for a digital workplace
DigiReady: preparing learners for a digital workplaceJisc
 
Week 3 PowerPoint
Week 3 PowerPointWeek 3 PowerPoint
Week 3 PowerPointbridiejones
 
BARRIERS TO ICT IN SCHOOLS
BARRIERS TO ICT IN SCHOOLSBARRIERS TO ICT IN SCHOOLS
BARRIERS TO ICT IN SCHOOLSEVA Mokwena
 
National research study
National research studyNational research study
National research studynellieshep
 
Computer Science Imperative
Computer Science ImperativeComputer Science Imperative
Computer Science ImperativeHal Speed
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Computer Science NAAC presentation Pratibha college Chinchwad
Computer Science NAAC presentation Pratibha college ChinchwadComputer Science NAAC presentation Pratibha college Chinchwad
Computer Science NAAC presentation Pratibha college ChinchwadDr.Ashvini Chaudhari Bhongade
 
Educational WAN Presentation
Educational WAN PresentationEducational WAN Presentation
Educational WAN Presentationsspengler
 
Technology in the Classroom
Technology in the ClassroomTechnology in the Classroom
Technology in the ClassroomJessica Lentz
 

What's hot (20)

Iste.nets assignment 1
Iste.nets  assignment 1Iste.nets  assignment 1
Iste.nets assignment 1
 
Why computer science in K-12 by Code.org
Why computer science in K-12 by Code.orgWhy computer science in K-12 by Code.org
Why computer science in K-12 by Code.org
 
Edld 5362 assignment 5.pptx
Edld 5362 assignment 5.pptxEdld 5362 assignment 5.pptx
Edld 5362 assignment 5.pptx
 
Edunine 2019 conference Awards session
Edunine 2019 conference Awards session Edunine 2019 conference Awards session
Edunine 2019 conference Awards session
 
Reflection of highland park isd’s technology plan
Reflection of highland park isd’s technology planReflection of highland park isd’s technology plan
Reflection of highland park isd’s technology plan
 
Otago Polytechnic School of IT Graduation Awards 2012
Otago Polytechnic School of IT Graduation Awards 2012Otago Polytechnic School of IT Graduation Awards 2012
Otago Polytechnic School of IT Graduation Awards 2012
 
Project Lead The Way - A K-12 STEM Program of Study
Project Lead The Way - A K-12 STEM Program of StudyProject Lead The Way - A K-12 STEM Program of Study
Project Lead The Way - A K-12 STEM Program of Study
 
NSU Educational Technology
NSU Educational TechnologyNSU Educational Technology
NSU Educational Technology
 
DigiReady: preparing learners for a digital workplace
DigiReady: preparing learners for a digital workplaceDigiReady: preparing learners for a digital workplace
DigiReady: preparing learners for a digital workplace
 
Digital literacies at LSE
Digital literacies at LSEDigital literacies at LSE
Digital literacies at LSE
 
Week 3 PowerPoint
Week 3 PowerPointWeek 3 PowerPoint
Week 3 PowerPoint
 
BARRIERS TO ICT IN SCHOOLS
BARRIERS TO ICT IN SCHOOLSBARRIERS TO ICT IN SCHOOLS
BARRIERS TO ICT IN SCHOOLS
 
National research study
National research studyNational research study
National research study
 
Computer Science Imperative
Computer Science ImperativeComputer Science Imperative
Computer Science Imperative
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Pp2
Pp2Pp2
Pp2
 
resume_9-2015
resume_9-2015resume_9-2015
resume_9-2015
 
Computer Science NAAC presentation Pratibha college Chinchwad
Computer Science NAAC presentation Pratibha college ChinchwadComputer Science NAAC presentation Pratibha college Chinchwad
Computer Science NAAC presentation Pratibha college Chinchwad
 
Educational WAN Presentation
Educational WAN PresentationEducational WAN Presentation
Educational WAN Presentation
 
Technology in the Classroom
Technology in the ClassroomTechnology in the Classroom
Technology in the Classroom
 

Similar to TALK Cybersecurity Summit 2017: Panel on Ky Cyber Ed Pathway

Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisKentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisDawn Yankeelov
 
Kentucky's Cybersecurity Pathway for Teens By Ryan Deal
Kentucky's Cybersecurity Pathway for Teens By Ryan DealKentucky's Cybersecurity Pathway for Teens By Ryan Deal
Kentucky's Cybersecurity Pathway for Teens By Ryan DealDawn Yankeelov
 
E rate & mcisd technology plan
E rate & mcisd technology planE rate & mcisd technology plan
E rate & mcisd technology plankjmckay
 
E rate & mcisd technology plan
E rate & mcisd technology planE rate & mcisd technology plan
E rate & mcisd technology plankjmckay
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
 
RITA Education
RITA EducationRITA Education
RITA EducationAnn Treacy
 
Approaches to developing staff and students' digital capability
Approaches to developing staff and students' digital capabilityApproaches to developing staff and students' digital capability
Approaches to developing staff and students' digital capabilityJisc
 
Building digital capability community of practice
Building digital capability community of practiceBuilding digital capability community of practice
Building digital capability community of practiceJisc
 
Rural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT TalentRural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT TalentAnn Treacy
 
GCCISD Technology Plan
GCCISD Technology Plan GCCISD Technology Plan
GCCISD Technology Plan mjjoseph
 
5362 mary thrasher week5 assignment powerpoint
5362 mary thrasher week5 assignment powerpoint5362 mary thrasher week5 assignment powerpoint
5362 mary thrasher week5 assignment powerpointMary Thrasher
 
Datato information5 21-final519pm
Datato information5 21-final519pmDatato information5 21-final519pm
Datato information5 21-final519pmSETDA
 
Cisco and LATTC
Cisco and LATTCCisco and LATTC
Cisco and LATTCMainstay
 
Nc dl plan region 4 roundtable meeting 4.16.2015
Nc dl plan region 4 roundtable meeting   4.16.2015Nc dl plan region 4 roundtable meeting   4.16.2015
Nc dl plan region 4 roundtable meeting 4.16.2015Keith Eades
 
Week 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate techWeek 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate techlramondetta
 
KISD E-Rate Overview
KISD E-Rate OverviewKISD E-Rate Overview
KISD E-Rate OverviewEnidL
 
Building digital capability and digital experience insights community event
Building digital capability and digital experience insights community eventBuilding digital capability and digital experience insights community event
Building digital capability and digital experience insights community eventJisc
 
CCS Technology Budget Presentation (1).pdf
CCS Technology Budget Presentation (1).pdfCCS Technology Budget Presentation (1).pdf
CCS Technology Budget Presentation (1).pdfKehindeEsther4
 
Kids tek auto presentation 2010
Kids tek auto presentation 2010Kids tek auto presentation 2010
Kids tek auto presentation 2010abissland
 
A Plan for Technology
A Plan for TechnologyA Plan for Technology
A Plan for TechnologyDonnaLDrum
 

Similar to TALK Cybersecurity Summit 2017: Panel on Ky Cyber Ed Pathway (20)

Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisKentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
 
Kentucky's Cybersecurity Pathway for Teens By Ryan Deal
Kentucky's Cybersecurity Pathway for Teens By Ryan DealKentucky's Cybersecurity Pathway for Teens By Ryan Deal
Kentucky's Cybersecurity Pathway for Teens By Ryan Deal
 
E rate & mcisd technology plan
E rate & mcisd technology planE rate & mcisd technology plan
E rate & mcisd technology plan
 
E rate & mcisd technology plan
E rate & mcisd technology planE rate & mcisd technology plan
E rate & mcisd technology plan
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 
RITA Education
RITA EducationRITA Education
RITA Education
 
Approaches to developing staff and students' digital capability
Approaches to developing staff and students' digital capabilityApproaches to developing staff and students' digital capability
Approaches to developing staff and students' digital capability
 
Building digital capability community of practice
Building digital capability community of practiceBuilding digital capability community of practice
Building digital capability community of practice
 
Rural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT TalentRural Info Tech Alliance: Growing and Keeping IT Talent
Rural Info Tech Alliance: Growing and Keeping IT Talent
 
GCCISD Technology Plan
GCCISD Technology Plan GCCISD Technology Plan
GCCISD Technology Plan
 
5362 mary thrasher week5 assignment powerpoint
5362 mary thrasher week5 assignment powerpoint5362 mary thrasher week5 assignment powerpoint
5362 mary thrasher week5 assignment powerpoint
 
Datato information5 21-final519pm
Datato information5 21-final519pmDatato information5 21-final519pm
Datato information5 21-final519pm
 
Cisco and LATTC
Cisco and LATTCCisco and LATTC
Cisco and LATTC
 
Nc dl plan region 4 roundtable meeting 4.16.2015
Nc dl plan region 4 roundtable meeting   4.16.2015Nc dl plan region 4 roundtable meeting   4.16.2015
Nc dl plan region 4 roundtable meeting 4.16.2015
 
Week 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate techWeek 2 ramondetta presentation e rate tech
Week 2 ramondetta presentation e rate tech
 
KISD E-Rate Overview
KISD E-Rate OverviewKISD E-Rate Overview
KISD E-Rate Overview
 
Building digital capability and digital experience insights community event
Building digital capability and digital experience insights community eventBuilding digital capability and digital experience insights community event
Building digital capability and digital experience insights community event
 
CCS Technology Budget Presentation (1).pdf
CCS Technology Budget Presentation (1).pdfCCS Technology Budget Presentation (1).pdf
CCS Technology Budget Presentation (1).pdf
 
Kids tek auto presentation 2010
Kids tek auto presentation 2010Kids tek auto presentation 2010
Kids tek auto presentation 2010
 
A Plan for Technology
A Plan for TechnologyA Plan for Technology
A Plan for Technology
 

More from Dawn Yankeelov

TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022Dawn Yankeelov
 
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021Dawn Yankeelov
 
Discussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDiscussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDawn Yankeelov
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Dawn Yankeelov
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitDawn Yankeelov
 
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterCyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterDawn Yankeelov
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Dawn Yankeelov
 
Cybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISOCybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISODawn Yankeelov
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachDawn Yankeelov
 
Kentucky's Cyber Enclave
Kentucky's Cyber EnclaveKentucky's Cyber Enclave
Kentucky's Cyber EnclaveDawn Yankeelov
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Dawn Yankeelov
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in HealthcareRCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in HealthcareDawn Yankeelov
 
PSST: Seamless Data Solutions
PSST:  Seamless Data Solutions PSST:  Seamless Data Solutions
PSST: Seamless Data Solutions Dawn Yankeelov
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in Healthcare RCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare Dawn Yankeelov
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresDawn Yankeelov
 
Understanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYUnderstanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYDawn Yankeelov
 
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Dawn Yankeelov
 

More from Dawn Yankeelov (20)

TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
 
Discussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDiscussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding Reopening
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
 
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterCyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David Carter
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt.
 
Cybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISOCybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISO
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
 
Kentucky's Cyber Enclave
Kentucky's Cyber EnclaveKentucky's Cyber Enclave
Kentucky's Cyber Enclave
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in HealthcareRCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
PSST: Seamless Data Solutions
PSST:  Seamless Data Solutions PSST:  Seamless Data Solutions
PSST: Seamless Data Solutions
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in Healthcare RCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech Adventures
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
Understanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYUnderstanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KY
 
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys Blockchain: An Explanation by Frost, Brown & Todd Attorneys
Blockchain: An Explanation by Frost, Brown & Todd Attorneys
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

TALK Cybersecurity Summit 2017: Panel on Ky Cyber Ed Pathway

  • 1. TALK Cyber Security Summit Kevin Nolten – Cyber Innovation Center Scott U’Sellis - Kentucky Department of Education Ryan Deal – Jefferson County Public Schools CYBER ENGINEERING PATHWAY
  • 2. • Welcome & Introductions • Cyber Innovation Center State of the Union • FY15 CETAP Recap • FY16 CETAP Goals and Objectives • DHS Guidance and Open Discussion Transforming Education Empowering Educators Preparing a Cyber-Ready Workforce Professional Development Curriculum Design Collaboration in K-12 Education Cyber Innovation Center National Integrated Cyber Education Research Center
  • 4. NICERC Heat Map 1. Alabama 2. Arizona 3. Arkansas 4. California 5. Hawaii 6. Idaho 7. Indiana 8. Kentucky 9. Louisiana 10. Maryland 11. Michigan 12. Mississippi 13. Montana 14. New Jersey 15. Rhode Island 16. South Carolina 17. Tennessee 18. Texas 19. Virginia State Department Engagement
  • 5. Learning Management System Over 250 files per course that includes: • Student Workbooks • Master Notes • Lesson Plans • PowerPoints • Standards Mapping • And other Supplemental Resources NICERC team members serve as the ‘teacher’ and teachers across America are the ‘students’.
  • 7. Cyber Engineering Pathway Scott U’Sellis Kentucky Department of Education Office of Career and Technical Education
  • 8. Cyber Engineering Pathway • Cyber Engineering is now a recognized career pathway in the KDE Office of Career and Technical Education’s IT Program of Studies for the 2017-2018 school year • Thank you to Dawn Yankeelov and TALK for facilitating the discussion between the Office of Career and Technical Education and the National Integrated Cyber Education Research Center (NICERC) • Business and industry partners are very excited to see the creation of this new pathway • We have partnered with NICERC and have chosen to adopt the NICERC curriculum and the following courses: • Cyber Literacy I • Cyber Literacy II • Cyber Science • Computer Science • Many schools are choosing to offer the complete career pathway sequence of courses while others are choosing to offer single courses to supplement an existing career pathway
  • 9. INFORMATION TECHNOLOGY CAREER PATHWAYS 2017-2018 CYBER ENGINEERING CIP 14.0902.00 PATHWAY DESCRIPTION: The Cyber Engineering pathway is a blend of programming, cyber security, and hardware engineering disciplines. Students will learn to research, design, develop, and test computer systems and components. The National Integrated Cyber Education Research Center (NICERC) courses in the pathway use project-driven, application-based curricula that engage students at the secondary level. The curricula provides the teacher with a rigorous program that showcases a systems-level understanding of real-world applications of science, technology, engineering, and mathematics. The courses provide a hands-on, context-based approach that empowers teachers to prepare students to become the next generation of engineers and cyber professionals. The coursework explores topics such as robotics, electricity, and security concerns in today’s digital society. BEST PRACTICE COURSES EXAMPLE ILP- RELATED CAREER TITLESChoose (4) FOUR CREDITS from the following:  110110 Computer Literacy OR 060112 Digital Literacy  110222 Cyber Literacy I(NICERC)  110223 Cyber Literacy II(NICERC)  110224 Cyber Science(NICERC)  110225 Computer Science(NICERC)  110918 Information Technology Co-opOR 110919 Information Technology Internship Note: There is no cost to implement NICERC courses (outside of cost of equipment). Please see the link for further curriculum information. Security Systems Technician Computer Hardware Engineer Computer Network Specialist Computer Programmer Computer Scientist Computer SoftwareEngineer NOTE: PROFESSIONAL DEVELOPMENT IS AVAILABLE THROUGH NICERC DURING THE EDUCATION DISCOVERY FORUM (NICERC PROFESSIONAL DEVELOPMENT).
  • 10. Who May Teach Cyber Engineering? • 1. IT certified teachers are automatically eligible to teach in this pathway • However attending the NICERC Cyber Engineering summer training is highly encouraged • 2. Teachers with certification in other content areas • This group must attend the NICERC Cyber Engineering summer training • Information regarding the NICERC training: • Venue: University of Louisville, College of Education and Human Development • Room: 201G • Time: 8:00 AM-3:00 PM • Dates: July 27-28 & July 31-August 1 • Note: A special thanks to Steve Swan at UofL for helping to secure the location
  • 11. IT Pathway Updates - JCPS TALK Cyber security summit JUNE 2017 Ryan Deal Jefferson County Public Schools
  • 12. Thank you! • A Thank You at the beginning and not the end!
  • 13. Idea 1: Redesign High School Experience To realign JCPS IT programs to be relevant both to the student and the community.
  • 14. Goal 2: Talent Development Academies To create a talent pool of Cyber Security and IT professionals in the Louisville area that meets the labor market demand.
  • 15. Goal 3: Student Opportunities To create a K-12 vertical pipeline of JCPS programs that integrate cross curricular instruction around career themes (Business and IT preferred )
  • 17. Point 1 - Specifics Bottom Line: We need more IT / Security professionals in Louisville; Now and projected in the next 10 years. Data points galore: State: https://kylmi.ky.gov/admin/gsipub/htmlarea/uploads/Outlook.pdf Local: http://www.kentuckianaworks.org/JobTrends/OccupationalOutlook.aspx National: https://www.onetonline.org/find/bright?b=1&g=Go Data on data!: http://www.csoonline.com/article/3083798/security/cybersecurity-spending-outlook-1- trillion-from-2017-to-2021.html
  • 19. Long term goals: • Create programs in Cyber Security Engineering that aligns to a national curriculum at the K-12 level. • Create a pipeline program that creates vertical alignment between grades • Train teachers and staff on the model and provide integration support. • That’s where WE come in! TALK, Community, Industry, Government, Post- Secondary, etc.
  • 21. How can I help? • Awareness • Advocate • Plug In and Volunteer • Promote