Assignment of Professional Development for Non-licensed Personnel
ArkansasIDEAS accounts are assigned according to the individual's designation in the Arkansas Educator Licensure System (AELS). There are two types of designations in AELS, Non-Licensed and Certified Teacher.
- Certified teachers have access to all courses available from ArkansasIDEAS.
- Non-Licensed accounts have a limited number of courses available.
Before assigning ArkansasIDEAS professional development courses to non-licensed personnel, please check the list below. If the course is not listed, it is unavailable to non-licensed account holders. As more courses are made available, this list is updated, so be sure to check back periodically.
Attention: Individual courses cannot be added to non-licensed accounts, nor can non-licensed accounts be upgraded to certified teacher or given access to the Certified Teacher Audience courses. This is based on intellectual property rights and copyrighted materials provided by subject matter experts at the time the course was created.
Teaching Cyber Security with the Arkansas Range | Module 7 - Network Services
Securing network services is a multi-faceted endeavor. Dr. Chuck Gardner begins by explaining some industry basics regarding security concepts then explores the vulnerabilities and options for securing: emails, web applications, remote access, and DNS security. He concludes with an overview of the logging lab activity.
Network Services is the seventh module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 8 - Forensics
Network administrators can prevent most attacks on a network, but when an incident occurs, their response to the incident is critical. After an event has occurred, critical strategies for event detection, system logging and monitoring, and analysis of network traffic all need to work together to resolve the incident and shore up network defenses. From knowing normal to constructing the timeline of a security incident, the Forensics module ties together all of the best practices from previous modules in the series.
Forensics is the eighth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Financial Literacy Unit One: Money, Budgeting, and Banking
A degree of financial literacy is necessary in order to become financially successful and maintain that success. In this course Jennifer Wray, a National Board Certified Family and Consumer Sciences teacher from Valley View High School, delves into the basics of financial literacy. Ms. Wray begins by describing the functions and roles of money, taxation, pay, and interest. She digs deeper into the basics of finance, examining things like attainable goals and how to make good budgeting and banking choices. Throughout the course Ms. Wray encourages participants to research all options before any financial decision.
This course is the first in a series of five financial literacy courses. The series is a prerequisite to the 2017 Arkansas CTE face-to-face summer training, but is a great resource for anyone looking to become more knowledgeable about finances. Anyone seeking to become more financially literate or desiring a financial literacy certification is encouraged to participate in this series.
This course was recorded on March 21, 2017 at AETN studios in Conway, Arkansas.
Financial Literacy Unit Two: Credit
Gaining and maintaining good credit can open many doors and aid in reaching goals, while bad credit can cause trouble. In this course Jennifer Wray, a National Board Certified Family and Consumer Sciences teacher from Valley View High School, examines the world of credit. Ms. Wray shares some general information about credit, such as what credit is, costs associated with credit, and the function of credit scores. She also describes several specific types of credit in more detail. When speaking about different types of loans and credit cards she includes information about avoiding harassment and theft, as well as best practices and strategies for building and maintaining good credit.
This course is the second in a series of five financial literacy courses. The series is a prerequisite to the 2017 Arkansas CTE face-to-face summer training, but is a great resource for anyone looking to become more knowledgeable about finances. Anyone seeking to become more financially literate or desiring a financial literacy certification is encouraged to participate in this series.
This course was recorded on March 22, 2017 at AETN studios in Conway, Arkansas.
Financial Literacy Unit Three: Insurance
In this course Jennifer Wray, a National Board Certified Family and Consumer Sciences teacher from Valley View High School, discusses six types of insurance, describing the purpose, coverage, and potential costs of each. As she walks participants through the complex world of insurance, Ms. Wray defines several industry-specific terms and shares many strategies for lowering costs and minimizing risks. Throughout the course she also expands on why and/or when someone would need these different types of insurance.
This course is the third in a series of five financial literacy courses. The series is a prerequisite to the 2017 Arkansas CTE face-to-face summer training, but is a great resource for anyone looking to become more knowledgeable about finances. Anyone seeking to become more financially literate or desiring a financial literacy certification is encouraged to participate in this series.
This course was recorded on March 22, 2017 at AETN studios in Conway, Arkansas.
Financial Literacy Unit Four: Investing
The stock market can seem so complex and intimidating that many people, understandably, avoid the risky venture altogether. In this course Jennifer Wray, a National Board Certified Family and Consumer Sciences teacher from Valley View High School, demystifies the stock market. She explains industry-specific terminology, describes types of markets and investment products, and even shares a few investment strategies. Throughout the course Ms. Wray thoroughly clarifies the risks and benefits involved in different investment products and options.
This course is the fourth in a series of five financial literacy courses. The series is a prerequisite to the 2017 Arkansas CTE face-to-face summer training, but is a great resource for anyone looking to become more knowledgeable about finances. Anyone seeking to become more financially literate or desiring a financial literacy certification is encouraged to participate in this series.
This course was recorded on March 23, 2017 at AETN studios in Conway, Arkansas.
Teaching Cyber Security with the Arkansas Range | Module 1 - Intro to Range and Hacker Methodology
With the increase in cyberattacks that have hit both public and private institutions across the globe in recent years, now, more than ever, the nation is in dire need of talented cybersecurity professionals.
Intro to Range and Hacker Methodology, is the first module in the Teaching Cyber Security with the Arkansas Range series. This series will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 2 - Knowing Normal: Recognizing Traffic Patterns
Knowing what normal looks like in a network is one of the keys to understanding it, but also in being able to troubleshoot problems that might arise in that network. Learning the steps to find, track, and interpret network data are crucial skills to learn in a world where so much of what we do depends on those systems functioning efficiently. In this module, we take the first steps through exploration using tools within the Cyber Range that gather data from a network. We also begin the practice of properly recording network data.
Knowing Normal: Recognizing Traffic Patterns, is the second module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 3 - Traffic Shaping and Manipulation
In this course we look at the tools network administrators and analysts use to secure a network by monitoring and controlling its traffic. We begin by learning the basics of firewalls and their placement in a network. In the firewall lab, we experiment with the creation and order of firewall rules. Next, we discuss some common types of proxies and how they operate to keep a network secure. We continue by exploring the differences between an IDS and an IPS. Finally, we investigate the tools Snort and BASE and how they help with packet capture and analysis.
Traffic Shaping and Manipulation, is the third module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 4 - Logging and Monitoring
When a problem occurs, having the right data to trace the issue back to the source is key to incident response. But which data should be collected? In this course, we explore not only what data should be collected but also different ways to view those logs in Windows and Linux systems. Then we dig into log aggregation, the Elastic Stack, SIEMs, and a variety of network management tools.
Logging and Monitoring is the fourth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.