Assignment of Professional Development for Non-licensed Personnel
ArkansasIDEAS accounts are assigned according to the individual's designation in the Arkansas Educator Licensure System (AELS). There are two types of designations in AELS, Non-Licensed and Certified Teacher.
- Certified teachers have access to all courses available from ArkansasIDEAS.
- Non-Licensed accounts have a limited number of courses available.
Before assigning ArkansasIDEAS professional development courses to non-licensed personnel, please check the list below. If the course is not listed, it is unavailable to non-licensed account holders. As more courses are made available, this list is updated, so be sure to check back periodically.
Attention: Individual courses cannot be added to non-licensed accounts, nor can non-licensed accounts be upgraded to certified teacher or given access to the Certified Teacher Audience courses. This is based on intellectual property rights and copyrighted materials provided by subject matter experts at the time the course was created.
Teaching Cyber Security with the Arkansas Range | Module 2 - Knowing Normal: Recognizing Traffic Patterns
Knowing what normal looks like in a network is one of the keys to understanding it, but also in being able to troubleshoot problems that might arise in that network. Learning the steps to find, track, and interpret network data are crucial skills to learn in a world where so much of what we do depends on those systems functioning efficiently. In this module, we take the first steps through exploration using tools within the Cyber Range that gather data from a network. We also begin the practice of properly recording network data.
Knowing Normal: Recognizing Traffic Patterns, is the second module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 3 - Traffic Shaping and Manipulation
In this course we look at the tools network administrators and analysts use to secure a network by monitoring and controlling its traffic. We begin by learning the basics of firewalls and their placement in a network. In the firewall lab, we experiment with the creation and order of firewall rules. Next, we discuss some common types of proxies and how they operate to keep a network secure. We continue by exploring the differences between an IDS and an IPS. Finally, we investigate the tools Snort and BASE and how they help with packet capture and analysis.
Traffic Shaping and Manipulation, is the third module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 4 - Logging and Monitoring
When a problem occurs, having the right data to trace the issue back to the source is key to incident response. But which data should be collected? In this course, we explore not only what data should be collected but also different ways to view those logs in Windows and Linux systems. Then we dig into log aggregation, the Elastic Stack, SIEMs, and a variety of network management tools.
Logging and Monitoring is the fourth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 5 - Windows Hosts
There are several methods for securing a Windows machine, but one of the most critical is making sure each system has proper account management principles in place. Unfortunately, many organizations fail to follow best practices when it comes to account management, putting their systems and data at risk. Prepare to learn how Microsoft Active Directory can be used to help an organization establish consistent policies, some of the best practices regarding account management, and general Windows host security.
Windows Hosts is the fifth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Teaching Cyber Security with the Arkansas Range | Module 6 - Linux Hosts
Christopher Wright of Citadel Systems shares the history of UNIX and Linux and its development through time. He also discusses popular distributions such as Red Hat and Ubuntu and why they are attractive to different users. The LAMP stack and software management tools such as APT and YUM are also explored. Then Mr. Wright gives an overview of some of the lab activities included in this module.
Linux Hosts is the sixth module in the Teaching Cyber Security with the Arkansas Range series. This series of trainings will cover the eight curriculum modules developed through a partnership with the Arkansas Department of Education, the University of Central Arkansas, Metova Federal, and the National Integrated Cyber Education Research Center. It is the intent of the course to present learners with a series of real-world challenges that will illustrate the practical, operational, and ethical issues of working in this kind of space.
Men and Women of Distinction: Miller Williams
The general public might remember Miller Williams as the man who delivered the inaugural poem at Bill Clinton's second inauguration; however, this Arkansas poet has secured literary stature far beyond this accomplishment. According to one critic who noted Williams' gritty, plain-spoken style he is described as the “Hank Williams of American poetry,” with poetry that is “read and understood by squirrel hunters and taxi drivers.” In this documentary, hosted by Ernie Dumas and featuring a one-on-one interview with Miller, viewers get an up-close and personal look at one of America’s great contemporary poets.
Based on the Arkansas PBS series Men and Women of Distinction, each course features an Arkansan whose life has had a profound effect on the development of the state, the character of its people, or its image beyond our borders. By highlighting these men and women, the series allows history to be told by the voices of those who lived it. This course meets the scheduled Arkansas history requirement as set forth in the Rules Governing Professional Development and required by ACA 6-17-703.
Miller Williams, 1930-2015
Music in Arkansas: Origins
This course tracks the development of Arkansas’s rich musical heritage, beginning with the discovery of a 200 BC Hopewell panpipe and concluding as King Biscuit Time hits the airwaves in 1941 Helena. Origins explores Arkansas’s role in the development of fourteen distinct musical genres, as well as how the rich Arkansas soundscape has been influenced by shifts in culture and by Arkansas's unique geographical regions.
An educator guide and standards-alignment document is provided as a resource within this course for middle and secondary teachers who wish to use Origins in the classroom. The documentary-style segments and classroom resources have been developed with the Arkansas State Standards and the College, Career and Civic Life Framework in mind. This course meets the scheduled Arkansas history requirement as set forth in the Rules Governing Professional Development and required by ACA 6-17-703.
Portraits of Courage: The Story of Women's Suffrage in Arkansas
In Search of Arkansas
Men and Women of Distinction: Gene L. Hatfield
Born in 1925 in Conway, Gene L. Hatfield was one of the state's most prolific artists, with paintings and sculptures numbering in the thousands. His work is most closely compared to that of the post-impressionist masters. A true Renaissance man, Hatfield tested his hand in nearly every form of artistic expression—acting, writing, song, dance, painting and sculpture—and challenged preconceived ideas of what is and is not art. In this documentary, narrated by Nicole and Gene Hatfield's daughter, Mathilda Hatfield, and featuring interviews with the artist himself, viewers get an intimate portrayal of one of Arkansas' renowned men of letters.
Based on the Arkansas PBS series Men and Women of Distinction, each course features an Arkansan whose life has had a profound effect on the development of the state, the character of its people, or its image beyond our borders. By highlighting these men and women, the series allows history to be told by the voices of those who lived it. This course meets the scheduled Arkansas history requirement as set forth in the Rules Governing Professional Development and required by ACA 6-17-703.
Gene L. Hatfield, 1921-2017