Are you a non-licensed educator? Click here for your list available courses.

Music in Arkansas: Origins

This course tracks the development of Arkansas’s rich musical heritage, beginning with the discovery of a 200 BC Hopewell panpipe and concluding as King Biscuit Time hits the airwaves in 1941 Helena. Origins explores Arkansas’s role in the development of fourteen distinct musical genres, as well as how the rich Arkansas soundscape has been influenced by shifts in culture and by Arkansas's unique geographical regions.

An educator guide and standards-alignment document is provided as a resource within this course for middle and secondary teachers who wish to use Origins in the classroom. The documentary-style segments and classroom resources have been developed with the Arkansas State Standards and the College, Career and Civic Life Framework in mind. This course meets the scheduled Arkansas history requirement as set forth in the Rules Governing Professional Development and required by Act 969 of 2013.

CID AHB16030
TESS 1a,4e
LEADS None
Credit Hours 2
Fine Arts History & Government 2020-21 Scheduled PD 2016-17 Scheduled PD

Portraits of Courage: The Story of Women's Suffrage in Arkansas

The centuries-long fight for women's suffrage was slow and arduous. Suffragists around the world took part in parades and protests to garner support, while men in office challenged their colleagues to support or deny equal voting rights for women. The story of suffrage in Arkansas is largely undocumented and sometimes unclear. Portraits of Courage explores women's suffrage in The Natural State, taking a unique look at some of the more influential Arkansas suffragists as well as some of the national figures who inspired their fight. Combining creative reenactments and interviews with leading Arkansas historians, professors, and modern day activists, this course shows that while the Nineteenth Amendment celebrates its 100th anniversary, the lessons learned from its passage are just as relevant today.

An educator guide and standards-alignment document is provided as a resource with this course for middle and secondary teachers who wish to use Portraits in the classroom.

This course meets the scheduled Arkansas history requirement as set forth in the Rules Governing Professional Development and required by Act 969 of 2013.


CID AHB20008
TESS 1a
LEADS None
Credit Hours 1.5
History & Government 2020-21 Scheduled PD

In Search of Arkansas

The Encyclopedia of Arkansas, sponsored by the Central Arkansas Library System (CALS), is a helpful research tool for teachers and students.  In Search of Arkansas takes a look at how to navigate the historical database. Ms. Ali Welky, Assistant Editor of the CALS Encyclopedia of Arkansas (EoA), discusses the site's features and offers some suggestions for getting the most out of the EoA.

This course meets the scheduled Arkansas history requirement as set forth in the Rules Governing Professional Development and required by Act 969 of 2013.

CID AHB20009
TESS 1a,1d
LEADS None
Credit Hours 0.5
History & Government Library Media Specialist 2020-21 Scheduled PD

Increasing Student Effort and Engaging Students

In this course, Denise Riley, an educational consultant with more than thirty-nine years of experience in alternative education, breaks down motivation. She addresses many aspects of student effort, from how the brain processes new information to interest in material. Ms. Riley also shares many strategies for increasing motivation in students.

This course was recorded on July 11, 2016 at the Arkansas Association of Alternative Educators (AAAE) Conference.

CID CMG17031
TESS 1c,2a,2b
LEADS None
Credit Hours 1
Classroom Management

Teaching Cyber Security with the Arkansas Range | Module 1 - Intro to Range and Hacker Methodology

With the increase in cyberattacks that have hit both public and private institutions across the globe in recent years, now, more than ever, the nation is in dire need of talented cybersecurity professionals.

Intro to Range and Hacker Methodology, is the first module in the Teaching Cyber Security with the Arkansas Range series. This series will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID CSC20013
TESS 4e
LEADS None
Credit Hours 0.5
Technology

Teaching Cyber Security with the Arkansas Range | Module 2 - Knowing Normal: Recognizing Traffic Patterns

Knowing what normal looks like in a network is one of the keys to understanding it, but also in being able to troubleshoot problems that might arise in that network. Learning the steps to find, track, and interpret network data are crucial skills to learn in a world where so much of what we do depends on those systems functioning efficiently. In this module, we take the first steps through exploration using tools within the Cyber Range that gather data from a network. We also begin the practice of properly recording network data.

Knowing Normal: Recognizing Traffic Patterns, is the second module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID CSC20014
TESS 4e
LEADS None
Credit Hours 1
Technology

Teaching Cyber Security with the Arkansas Range | Module 3 - Traffic Shaping and Manipulation

In this course we look at the tools network administrators and analysts use to secure a network by monitoring and controlling its traffic. We begin by learning the basics of firewalls and their placement in a network. In the firewall lab, we experiment with the creation and order of firewall rules. Next, we discuss some common types of proxies and how they operate to keep a network secure. We continue by exploring the differences between an IDS and an IPS. Finally, we investigate the tools Snort and BASE and how they help with packet capture and analysis.

Traffic Shaping and Manipulation, is the third module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID CSC20015
TESS 4e
LEADS None
Credit Hours 1
Technology

Teaching Cyber Security with the Arkansas Range | Module 4 - Logging and Monitoring

When a problem occurs, having the right data to trace the issue back to the source is key to incident response. But which data should be collected? In this course, we explore not only what data should be collected but also different ways to view those logs in Windows and Linux systems. Then we dig into log aggregation, the Elastic Stack, SIEMs, and a variety of network management tools.

Logging and Monitoring is the fourth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID CSC20016
TESS 4e
LEADS None
Credit Hours 1
Technology

Teaching Cyber Security with the Arkansas Range | Module 5 - Windows Hosts

There are several methods for securing a Windows machine, but one of the most critical is making sure each system has proper account management principles in place. Unfortunately, many organizations fail to follow best practices when it comes to account management, putting their systems and data at risk. Prepare to learn how Microsoft Active Directory can be used to help an organization establish consistent policies, some of the best practices regarding account management, and general Windows host security.

Windows Hosts is the fifth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

 

CID CSC20017
TESS 4e
LEADS None
Credit Hours 1
Technology

Teaching Cyber Security with the Arkansas Range | Module 6 - Linux Hosts

Christopher Wright of Citadel Systems shares the history of UNIX and Linux and its development through time. He also discusses popular distributions such as Red Hat and Ubuntu and why they are attractive to different users. The LAMP stack and software management tools such as APT and YUM are also explored. Then Mr. Wright gives an overview of some of the lab activities included in this module.

Linux Hosts is the sixth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.

CID CSC20018
TESS 4e
LEADS None
Credit Hours 1
Technology