Skip to main content
For Education

Security Awareness Training for Education

FERPA-aligned interactive simulations for K-12 districts, higher-ed institutions, and ed-tech teams. Phishing, ransomware, BEC, smishing, and student-data handling, mapped to FERPA, GLBA, and state student-privacy laws.

By Last reviewed

Why Schools Need More Than A Once-A-Year FERPA Slide Deck

Education has been the most-targeted public sector for ransomware in the United States for three years running, behind only healthcare overall. The K12 SIX cyber incident map records hundreds of publicly disclosed K-12 ransomware events since 2016, and EDUCAUSE tracks similar pressure on higher-ed networks. Most incidents start with a phishing email to a teacher, IT admin, or financial-aid officer.

FERPA does not name a training requirement word-for-word, but the U.S. Department of Education guidance and most accreditors expect schools to train staff on protecting personally identifiable information from education records. Higher-ed institutions handling federal student aid fall under the GLBA Safeguards Rule, which mandates a written information-security program with documented workforce training. State laws (SOPIPA in California, similar K-12 laws in 30+ states) add specific obligations.

RansomLeak delivers training that satisfies FERPA expectations, the GLBA Safeguards Rule, NIST 800-171 controls for federal-grant research, COPPA for K-12 under-13 services, and state student-privacy laws. Interactive 3D simulations rehearse the decisions school staff actually face: a tuition-redirect BEC, a "free textbook" smishing scam, a ransomware foothold from a teacher mailbox, an MFA bypass attempt on a grade portal.

Education-Specific Threat Patterns

1

Ransomware on K-12 districts

K12 SIX records district-level ransomware events in nearly every state. Most start with a phishing email opened by a teacher or office staff member. Training that rehearses report-before-open behavior pays back the program cost after a single avoided incident.

2

Phishing for SIS and grade-portal credentials

Student Information Systems (PowerSchool, Infinite Campus, Banner, Workday Student) hold complete student records and grade data. Attackers phish faculty and registrars to harvest credentials. Staff need pattern recognition specific to these systems.

3

BEC for tuition and financial-aid redirection

Higher-ed bursars and financial-aid offices process millions in tuition, refunds, and federal aid. BEC actors impersonate students requesting refund-account changes, or vendors changing wire instructions. Finance staff need scenario practice, not generic anti-phishing reminders.

4

Smishing scams targeting students and parents

Fake textbook offers, fake tuition payment notices, and fake scholarship awards arrive by SMS to students and parents. Customer-service and admissions teams need a verification habit and a clear escalation path when families report scams.

5

Research-data theft and MFA bypass

Research universities holding federal-grant data face nation-state reconnaissance and credential-theft attempts. Faculty and graduate research staff need MFA fatigue training, not a one-time MFA-setup walkthrough.

Compliance Frameworks This Page Covers

Mapping to the regulations that drive most education buying decisions.

FERPA

The Family Educational Rights and Privacy Act protects student education records. The Department of Education and most accreditors expect schools to train staff who access PII from education records on confidentiality, access controls, and disclosure rules.

GLBA Safeguards Rule (higher ed)

Higher-ed institutions participating in federal student aid programs are GLBA financial institutions. The Safeguards Rule under 16 CFR § 314 requires a written information-security program with named workforce-training elements.

State student-privacy laws

SOPIPA (California), New York Education Law 2-d, Connecticut PA 16-189, Colorado HB 16-1423, and 30+ similar laws layer specific training, contracting, and breach-response duties on top of FERPA.

COPPA (K-12 under 13)

Schools acting as agents for parental consent under COPPA must train staff who configure ed-tech vendor relationships, evaluate privacy policies, and handle under-13 student data.

NIST 800-171 (research data)

Universities receiving federal research grants with controlled unclassified information (CUI) follow NIST 800-171, which requires security awareness training for personnel handling CUI under control 3.2.

Threats this program covers

Read the pillar guide for each attack type and the exercises that train against it.

What Is Education Security Awareness Training?

Education security awareness training is a structured education program that prepares K-12 teachers and staff, higher-ed faculty, IT and IS teams, financial-aid officers, registrars, and research personnel to recognize and report cyber threats that target schools. It satisfies FERPA confidentiality expectations, the GLBA Safeguards Rule for higher-ed financial-aid institutions, NIST 800-171 awareness control 3.2 for federal research data, and state student-privacy laws including SOPIPA, NY Ed Law 2-d, and equivalents in 30+ states.

In practice, effective education training splits along K-12 and higher-ed lines while sharing core content. K-12 districts need ransomware response, phishing detection, smishing reporting, and FERPA disclosure rules. Higher-ed adds GLBA-specific scenarios for tuition-redirect BEC, financial-aid fraud, research-data MFA bypass, and parental-COPPA handling. K12 SIX cyber incident data shows ransomware events in nearly every state, and EDUCAUSE confirms similar pressure on universities.

RansomLeak delivers education training through interactive 3D simulations rather than passive videos. The platform satisfies FERPA, GLBA, and state law training expectations, exports SCORM packages to any LMS for completion tracking, and supplies audit-ready evidence packages for accreditors and federal aid auditors. The catalogue covers every threat pattern documented in K12 SIX incident reports and EDUCAUSE Higher Education IT issues lists.

Frequently Asked Questions

What buyers in education ask most often.

Does FERPA require security awareness training?

FERPA does not name a training requirement in the statute, but Department of Education guidance and most accreditors expect schools to train staff with access to education records on confidentiality, disclosure, and access-control rules. RansomLeak provides FERPA-mapped exercises and completion records for accreditation evidence.

How does this satisfy the GLBA Safeguards Rule for higher ed?

Higher-ed institutions participating in federal student aid programs are GLBA financial institutions. The Safeguards Rule at 16 CFR § 314.4(e) requires a documented training program. RansomLeak exercises map to GLBA Safeguards elements, including phishing, BEC, incident response, and access management.

How often does FERPA or GLBA training need to happen?

GLBA expects training at hire and ongoing reinforcement; the FTC has cited insufficient training in enforcement actions. FERPA does not specify a frequency. Most schools run at least one full refresh per year with monthly micro-modules and quarterly phishing simulations. RansomLeak supports all three rhythms.

Who in a school needs this training?

Every staff member with access to student PII. That includes teachers, IT and IS, registrars, bursars, financial aid, admissions, advising, athletics records, contractors with system access, and student workers in offices that touch SIS or financial data. K-12 districts often include school-board members and substitute teachers.

Can K-12 districts and universities use the same platform?

Yes. The catalogue is shared, but assignment templates differ by audience. K-12 templates emphasize ransomware response, phishing, smishing, and FERPA disclosure; higher-ed templates add GLBA, research-data MFA, COPPA-as-agent, and tuition-redirect BEC. Both run on the same platform with the same SCORM exports.

Does the platform integrate with our LMS?

Every exercise exports as SCORM 1.2 and 2004, tested with 50+ LMSes including Canvas, Blackboard, Moodle, D2L Brightspace, Schoology, and Workday. For institutions without a central LMS, the standalone cloud platform offers SSO, MFA, real-time analytics, and audit-ready reporting.

What does the audit evidence look like for accreditors?

Per-employee completion records, scores, time-to-complete, role assignments, and topic coverage maps. Reports export as PDF, CSV, and Excel for accreditor and FSA program-review evidence. The compliance-mapping page links each exercise to its specific FERPA, GLBA, or NIST 800-171 control.

Bring This Program to Education

Book a 30-minute walkthrough tailored to your workforce, LMS stack, and audit timeline.