Trainings to Go are hour-long training plans that include a PowerPoint, handouts, and training guides. Click the trainings to get tips on how to customize professional development plans to fit different staff needs, training time frames, and training goals.
Training Starters help you plan trainings on key topics related to the subject matter. Click the different training starters for tips on creating trainings that address your program needs and next steps.
The Notebook is a useful way to jot down notes as you go through the various topics available on the You For Youth website.
If you'd like to use the notebook, please sign in if you already have an account or register now to join the Y4Y community!
We have detected that cookies are not enabled on your browser. You must have cookies enabled to avoid receiving this message on every Y4Y portal page.
You are accessing a U.S. Federal Government computer system intended to be solely accessed by individual users expressly authorized to access the system by the U.S. Department of Education. Usage may be monitored, recorded, and/or subject to audit. For security purposes and in order to ensure that the system remains available to all expressly authorized users, the U.S. Department of Education monitors the system to identify unauthorized users. Anyone using this system expressly consents to such monitoring and recording. Unauthorized use of this information system is prohibited and subject to criminal and civil penalties. Except as expressly authorized by the U.S. Department of Education, unauthorized attempts to access, obtain, upload, modify, change, and/or delete information on this system are strictly prohibited and are subject to criminal prosecution under 18 U.S.C § 1030, and other applicable statutes, which may result in fines and imprisonment. For purposes of this system, unauthorized access includes, but is not limited to:
Any access by an employee or agent of a commercial entity, or other third party, who is not the individual user, for purposes of commercial advantage or private financial gain (regardless of whether the commercial entity or third party is providing a service to an authorized user of the system); and
Any access in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or any State.
If system monitoring reveals information indicating possible criminal activity, such evidence may be provided to law enforcement personnel.