{"id":110390,"date":"2020-04-30T06:00:22","date_gmt":"2020-04-30T13:00:22","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=110390"},"modified":"2020-05-04T14:43:45","modified_gmt":"2020-05-04T21:43:45","slug":"cc-cybersecurity-education","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/04\/cc-cybersecurity-education\/","title":{"rendered":"Learning from Home While School\u2019s Out: Cybersecurity Education for Kids"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Parents all over the world are looking for ways to keep their kids learning while they\u2019re not attending class in person. We have developed a set of free cybersecurity education resources to help kids learn about using digital resources safely \u2013 and have fun doing it. All you need to do to access these materials is to sign up below.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">School closings in response to the COVID-19 pandemic have put many parents in the position of trying to homeschool children while juggling work, health and other obligations. Academic institutions across the United States and around the globe have done their best to support kids\u2019 continuing education by helping to connect parents and students with online platforms and learning resources. Cybersecurity education can supplement that effort, helping kids learn important skills while teaching them how to stay safe as they spend more time online than ever.<\/span><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/01\/cc-tools-k-12-cybersecurity\/\"><span style=\"font-weight: 400;\">Keeping students and schools safe in a digital world<\/span><\/a><span style=\"font-weight: 400;\"> already mattered, but recent changes have increased the importance of cybersecurity education even more. The rush to digital sources of learning has introduced an array of new technologies and internet destinations, vastly increasing our digital footprint. The benefits and upside of these new tools are unmistakable, but added cyber risks must also be considered as a part rapid adoption. Insecure digital platforms or <\/span><a href=\"https:\/\/unit42.paloaltonetworks.com\/how-cybercriminals-prey-on-the-covid-19-pandemic\/\"><span style=\"font-weight: 400;\">phishing campaigns based on themes related to the pandemic<\/span><\/a><span style=\"font-weight: 400;\"> can have serious and lasting consequences for students or the institutions providing educational resources.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As we spend more hours online while we work, learn or play at home during these uncertain times, encourage students to discover how to have safer online experiences. With education and awareness, we can mitigate the risks of our exploration into the tools and knowledge of the digital age, making each day safer and more secure than the one before.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Palo Alto Networks is committed to ensuring secure experiences in the digital world for students and inspiring them to pursue careers in cybersecurity. Check out the free resources that Palo Alto Networks is providing to facilitate cybersecurity awareness and knowledge growth for students.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Cyber A.C.E.S. (Students 5-15 years of age)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/cyber-aces.html?utm_source=marketo&amp;utm_medium=email&amp;utm_campaign=%7B%7Bprogram.Name%7D%7D\"><span style=\"font-weight: 400;\">Cyber A.C.E.S. program <\/span><\/a><span style=\"font-weight: 400;\">works to demystify cybersecurity through interactive learning, equipping students 5-15 years of age with an understanding of how to protect their digital future. It provides the cybersecurity basics students need to have safer online experiences and become good digital citizens. Lessons are designed so they can be facilitated by anyone, regardless of knowledge level, with each module tailored to a specific age group.<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Cybersecurity Foundations (Secondary and Post-Secondary)<\/b><\/p>\n<p><a href=\"https:\/\/paloaltonetworksacademy.net\/course\/view.php?id=418\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cybersecurity Foundation Self-paced Course (~ 15 hours)<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Through cooperation with<\/span><a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.moonami.com_-3Futm-5Fsource-3Dmarketo-26utm-5Fmedium-3Demail-26utm-5Fcampaign-3D-257B-257Bprogram.Name-257D-257D&amp;d=DwMFaQ&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=kaZhWDlGM508GjJ14WGZ_rRB2bm_8RQuoqejUur-esY&amp;m=woKKybD59twU1gE_5KaQF0-ZnazT0gtwsJ-yLdhSpk0&amp;s=C52q-9hHUfWkhwl5CwU2owVF6x3WHoYexwFlENpKbEY&amp;e=\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\"> Moonami Learning Solutions<\/span><\/a><span style=\"font-weight: 400;\">, Palo Alto Networks has made this course freely available to all learners who are seeking to gain cybersecurity knowledge as well as career exploration in the cybersecurity industry.\u00a0<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By working through the seven course modules, which include videos, games and quizzes, students will learn the fundamentals of cybersecurity and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission-critical infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After completing each of the seven module quizzes with an 80% or higher grade, students will receive a student certificate of completion signed by the CEO and Chairman of Palo Alto Networks.<\/span><\/p>\n<p><b><i>Access to this course will expire on June 30, 2020.<\/i><\/b><\/p>\n<p><b>ENROLL TODAY<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Create a <\/span><a href=\"http:\/\/paloaltonetworksacademy.net\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Moonami account<\/span><\/a><span style=\"font-weight: 400;\"> (See link in top right corner).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Verify account when email confirmation is delivered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enroll in the <\/span><a href=\"https:\/\/paloaltonetworksacademy.net\/course\/view.php?id=418\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cybersecurity Foundation<\/span><\/a><span style=\"font-weight: 400;\"> course (account required).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enter password, <\/span><span style=\"font-weight: 400;\">2020Foundation!<\/span><\/p>\n<p><b><i>Access Expires on June 30, 2020.<\/i><\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Cybersecurity Survival Guide (Secondary and Post-Secondary)<\/b><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/techbriefs\/cybersecurity-survival-guide?utm_source=marketo&amp;utm_medium=email&amp;utm_campaign=%7B%7Bprogram.Name%7D%7D\"><span style=\"font-weight: 400;\">Cybersecurity Survival Guide<\/span><\/a><span style=\"font-weight: 400;\"> provides a valuable overview of today\u2019s threat landscape and describes the tools and technology required to defend against today\u2019s cyber attacks. This 250-page book contains three modules:\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cybersecurity Foundations (Corresponds to the Cybersecurity Foundation course).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cybersecurity Gateway (Introduction to Networking).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cybersecurity Essentials (Introduction to Network Security).<\/span><\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">We hope you and your families are staying safe and healthy during this very difficult time.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Free cybersecurity education resources can educate students about the industry while helping them have safer online experiences.<\/p>\n","protected":false},"author":663,"featured_media":108494,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6719],"tags":[120,423],"coauthors":[6984,7084],"class_list":["post-110390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","tag-cybersecurity","tag-education"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/03\/IMG_2009.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=110390"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110390\/revisions"}],"predecessor-version":[{"id":110824,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/110390\/revisions\/110824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/108494"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=110390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=110390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=110390"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=110390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}