Summary

Completed

In this module, you learned to implement CISA-recommended cybersecurity practices to manage cybersecurity risks, maintain security protocols, and detect and respond to incidents as a K-12 IT professional. You gained a comprehensive understanding of the threat landscape in K-12 education as well as how to conduct risk assessments, protect networks, create incident response plans, and explore security awareness and training programs for the entire school community.

As you wrap up this module, consider the following questions.

  • Prioritize the action items you want to complete in the near term. Where do you want to be now?
  • Where do you want to be six months from now?
  • Where do you want to be a year from now?

From this final reflection, reflect on what you want to accomplish next, what resources you need, and the team members or points of contact to help you get there.

Additional resources