Change display time — Currently: Mountain Daylight Time (MDT) (Event time)

Learn Your Google Admin Console Step By Step

,
Colorado Convention Center, Bluebird Ballroom 2A

Listen and learn: Edtalk
Save to My Favorites

Presenters

Photo
Digital Resource & Content Specialist
Ysleta ISD
@BuenrostroErick
Erick Buenrostro is a Google Certified Trainer and Cyber Security specialist working for the Ysleta ISD in El Paso, TX. Erick has worked in the Education field for the past 11 years, spear-heading projects such as the 1:1 device initiatives for students and teachers, district conferences, and the newly formed eSports initiative. Erick has a passion for learning and discovering the best ways to help improve student and teacher success.
Photo
Innovative Learning Specialist
I have been an educator for 31 years, spending the last 11 at the district level as a Technology Integration Specialist. I am a Minecraft™ Ambassador, a Microsoft™ Education Expert, a Google™ Certified Trainer and Coach, and an Apple™ Learning Coach. I love helping teachers to find innovative ways to use technology tools effectively in the classroom. I also love to code my spreadsheets with Google Apps Script. When I am away from the office, I love to drive with my husband to NMSU and watch my amazing and super handsome twin sons play in the NMSU Pride of New Mexico Band.

Session description

The Google Admin Console is an always-updating ecosystem, and when managed correctly, it can improve end-user experience, security, and usability. Attendees can expect to walk away with security recommendations and best practices to balance teacher and student usability, alongside security.

Purpose & objective

The Google Admin Console is a constantly evolving software that controls the safety and classroom experience of all users for a school district. The purpose of this presentation is to show the features of the Admin Console, and further discuss the instructional and security implications of changes made within.

Participants will be able to:
1. navigate to the Admin Console,
2. understand what features are free and what features belong to Paid subscriptions,
3. make educated decisions on security features, and
4. learn about 10 major features of the admin console in depth.

More [+]

Outline

1. Overview - Google Admin Console (5 Minute), General question to audience to understand knowledge level

2. Free vs Paid - Understanding the Subscription model (10 Minutes),

3. App Access Control (7 Minutes) - Check for Understanding

4. Devices, Chromebooks (15 Minutes) - Q/A available, audience participation

5. Reporting (7 Minutes) - Q/A available, audience participation

6. Security (15 Minutes) - Q/A available, audience participation

7. Closing

More [+]

Supporting research

Guide: https://resources.promevo.com/knowledgebase/google-admin-console/getting-started/admin-console-beginners-guide

Existing Course Certifications: https://www.cloudskillsboost.google/course_templates/90
https://workspace.google.com/blog/training-and-support/benefits-of-google-workspace-administrator-certification

Established Tech Magazine Publication: https://www.techrepublic.com/article/how-to-get-started-with-the-google-workspace-admin-console/

More [+]

Session specifications

Topic:
Safety, security & student data privacy
Grade level:
PK-12
Skill level:
Intermediate
Audience:
Chief technology officers/superintendents/school board members, Technology coordinators/facilitators
Attendee devices:
Devices useful
Attendee device specification:
Laptop: Chromebook, Mac, PC
Participant accounts, software and other materials:
Access to Google Admin Console Required.
ISTE Standards:
For Education Leaders:
Visionary Planner
  • Share lessons learned, best practices, challenges and the impact of learning with technology with other education leaders who want to learn from this work.
Systems Designer
  • Lead teams to collaboratively establish robust infrastructure and systems needed to implement the strategic plan.
  • Protect privacy and security by ensuring that students and staff observe effective privacy and data management policies.