{"id":19,"date":"2023-05-23T16:09:18","date_gmt":"2023-05-23T16:09:18","guid":{"rendered":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/?page_id=19"},"modified":"2023-06-22T20:11:13","modified_gmt":"2023-06-22T20:11:13","slug":"professional-development","status":"publish","type":"page","link":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/professional-development\/","title":{"rendered":"Professional Development"},"content":{"rendered":"\n<p><\/p>\n\n\n<h3><strong><span style=\"color: #000000\">AAA Framework<\/span><\/strong><\/h3>\n\n\n<p class=\"has-text-align-left\">The modules in this course are based on the&nbsp;<strong>Awareness-Ask-Action (AAA) framework.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/ocMy8RoM7MRjYY4r.jpg\" alt=\"\" class=\"wp-image-62\" srcset=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/ocMy8RoM7MRjYY4r.jpg 1024w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/ocMy8RoM7MRjYY4r-300x225.jpg 300w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/ocMy8RoM7MRjYY4r-768x576.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<h3><strong><span style=\"color: #000000\">PD Course Modules<\/span><\/strong><\/h3>\n\n\n<p>The table below provides an overview of the various modules and activities in this course.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"910\" height=\"1024\" src=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/Screen-Shot-2023-05-29-at-3.01.12-PM-1-910x1024.png\" alt=\"\" class=\"wp-image-61\" srcset=\"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/Screen-Shot-2023-05-29-at-3.01.12-PM-1-910x1024.png 910w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/Screen-Shot-2023-05-29-at-3.01.12-PM-1-267x300.png 267w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/Screen-Shot-2023-05-29-at-3.01.12-PM-1-768x864.png 768w, https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-content\/uploads\/sites\/14\/2023\/05\/Screen-Shot-2023-05-29-at-3.01.12-PM-1.png 1200w\" sizes=\"auto, (max-width: 910px) 100vw, 910px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>AAA Framework The modules in this course are based on the&nbsp;Awareness-Ask-Action (AAA) framework. PD Course Modules The table below provides an overview of the various modules and activities in this course.<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ncst_custom_author":"","ncst_show_custom_author":false,"ncst_dynamicHeaderBlockName":"ncst\/default-header","ncst_dynamicHeaderData":"{\"backgroundColor\":\"red_400\",\"boxPosition\":\"left\",\"ctaNum\":\"one\",\"pageIntro\":\"This course is designed to respond to the call for cybersecurity professional development for K-12 district and school-level administrators and technology support staff.\"}","ncst_content_audit_freq":"","ncst_content_audit_date":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-19","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/19","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":33,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/19\/revisions"}],"predecessor-version":[{"id":131,"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/pages\/19\/revisions\/131"}],"wp:attachment":[{"href":"https:\/\/research.ced.ncsu.edu\/k12edtechsecurity\/wp-json\/wp\/v2\/media?parent=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}