Firewall Dragon

Cyber Security Education

Safe, Smart, and Secure—With Firewall by Your Side

Clark County School District is committed to protecting every student’s digital journey through strong policies, proactive education, and family partnership.

Lessons Families Concerns Info

Upcoming Events

What is Cyber Security Education?
Cyber.org Logo

Cyber security education teaches people to stay safe online and protect their personal information from hackers and cyber threats. It helps individuals—kids and adults—understand how to secure their digital lives.

Lesson Key 1: Passwords and Beyond

Overview: In this lesson, students will explore the cybersecurity concept of passwords.

Objective: Students will use a real-life example to describe the concept of a password, identify that some passwords are strong and others are weak, and explain why a password is important.


Lesson Key 2: Motivations of People Online - Good and Bad Uses of Devices

Overview: In this lesson, students will explore the idea that digital devices can be used in good ways and in bad ways.

Objective: Students will describe good uses of digital devices, describe bad uses of digital devices, and list examples of information that needs to be protected.


Lesson Key 3: Personally Identifiable Information - Personal or Public Information

Overview: In this lesson, students will explore what is okay to share about themselves and focus on examples of public versus personal information.

Objective: Students will distinguish between personal and public information and explore what is okay to share about themselves.


Lesson Key 1: Personal Identifiable Information

Overview: First, students will learn what a digital footprint and personally identifiable information are. Then, students will learn when it is safe to share personally identifiable information and whom they should share it with.

Objective: Students will learn how to keep their digital footprint safe.

Module 1

Lesson Key 2: Online Safety

Overview: In this lesson, students will learn about some things to watch out for when using technology and how to best respond to those threats. Students will also learn why it is important not to post private information online.

Objective: Students will learn about online safety.

Module 2

Lesson Key 3: Authentication

Overview: In this key, students will learn how to create strong passwords. Students will also discover why it’s important to use multiple ways to protect their devices and learn about different kinds of authentication.

Objective: Students will learn about authentication.

Module 3

Lesson Key 4: Connected Devices

Overview: In this key, students will learn about the risks involved in opening unknown files and connecting to unknown devices. Students will also discover the benefits of keeping their apps and devices updated and backing up data regularly. Additionally, students will learn about the Internet of Things (IoT).

Objective: Students will learn how to protect their connected devices.

Module 4

Lesson Key 5: Protecting Your Digital Footprint

Overview: Students will learn how to protect their devices and files when using interconnected systems like the Internet of Things (IoT).

Objective: Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

Module 5

Lesson Key 6: Online Threats and Vulnerabilities

Overview: In this key, students will learn to identify the characteristics of an email or text message that may be part of a phishing scam. Students will also become more aware of the different types of threats and vulnerabilities.

Objective: Students will explore online threats and vulnerabilities.

Module 6

Lesson Key 7: Defense in Depth

Overview: Students will learn how authentication and authorization methods can protect authorized users. Students will also learn various strategies that can help protect simple networks.

Objective: Students will take an in-depth dive into online defenses.

Module 7

Lesson Key 8: Protecting Connected Devices

Overview: For this key, Students will learn how to protect your devices and files when using interconnected systems like the Internet of Things (IoT). Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

Objective: Students will learn how to protect their connected devices.

Module 8

Lesson Key 5: Protecting Your Digital Footprint

Overview: Students will learn how to protect their devices and files when using interconnected systems like the Internet of Things (IoT).

Objective: Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

Module 5

Lesson Key 6: Online Threats and Vulnerabilities

Overview: In this key, students will learn to identify the characteristics of an email or text message that may be part of a phishing scam. Students will also become more aware of the different types of threats and vulnerabilities.

Objective: Students will explore online threats and vulnerabilities.

Module 6

Lesson Key 7: Defense in Depth

Overview: Students will learn how authentication and authorization methods can protect authorized users. Students will also learn various strategies that can help protect simple networks.

Objective: Students will take an in-depth dive into online defenses.

Module 7

Lesson Key 8: Protecting Connected Devices

Overview: For this key, Students will learn how to protect your devices and files when using interconnected systems like the Internet of Things (IoT). Students will learn about the risks and benefits of IoT devices, the importance of file backups, and hardware and software vulnerabilities.

Objective: Students will learn how to protect their connected devices.

Module 8

What Families Need to Know

As a parent, it’s important to know that cybersecurity plays a big role in keeping your child safe while they learn online. From school devices to educational apps, we take steps to protect student information and block harmful content. But staying safe online is a team effort! Talk to your child about creating strong passwords, being careful with what they click, and never sharing personal info. If you ever have questions or concerns, we’re here to help—working together makes a big difference in keeping our students safe and secure.

The Acceptable Use Policy explains the rules for using school district technology and internet safely and responsibly.

Learn More

FERPA, COPPA, and CIPA compliance ensures that student information is kept private, safe, and used appropriately when using school technology and online tools.

Learn More

Student Data Protection ensures that all personal student information is kept secure and used only for educational purposes.

Learn More
  • TikTok: Enable privacy, monitor screen time, avoid oversharing.
  • Discord: Review server access, enable content filters, monitor DMs.
  • Instagram: Set accounts to private, approve followers, manage screen time.
  • Use parental controls from ISPs or phone providers.
  • Avoid clicking suspicious links or downloading unknown apps.
  • Protect personal information.
  • Secure admin access.
  • Use strong firewall settings.
  • Consider apps like Who’s on My WiFi.

Report a Concern

For urgent issues, responses will be provided within 24 hours to ensure timely support and resolution. For general concerns or inquiries, please allow 3–5 business days for a response. We are committed to addressing all matters with care and efficiency, prioritizing according to urgency.

Report a Concern
1
FireWall-School

Contact the school

2
FireWall-SafeVoice

Use SafeVoice

3
FireWall-IT Support

Submit through I.T. support

How CCSD Protects Students

Clark County School District (CCSD) prioritizes student safety by implementing robust cybersecurity measures. These include using tools like GoGuardian to filter and monitor student devices, ensuring endpoint protection on all district computers, and maintaining 24/7 monitoring of district systems to detect and address potential threats. CCSD is committed to transparency, with browsing activity monitored only on district-provided devices, ensuring a secure and trustworthy digital environment for students.

Tools Used

GoGuardian for filtering and monitoring student devices.

Endpoint Protection

Endpoint protection on all District computers.

24/7 Monitoring

24/7 monitoring of district systems.

Transparency

Browsing activity is monitored only on CCSD devices.