How many student devices are you expecting?
Do you currently drop all of these into one VLAN, or do you have a different VLAN per "block", or some other method of breaking the network up for these devices?
I was going to say use a single SSID, but sometimes using two provides a natural way for breaking up the network.
What RADIUS server are you using?
With regard to wired BYOD and 802.1x - Windows machines in particular don't have the 802.1x service running by default. You have to enable it through group policy. So in a BYOD environnent this wont work well.
I would tend to make the default VLAN (whatever you use for that) a "challenge" VLAN. If you 802.1x challenge the device and it can authenticate you can drop it into another VLAN.
If it can't authenticate you can leave it in the default VLAN but then further up the stack to the MX and configure this VLAN for splash page authentication.
Then those BYOD devices that can properly handle 802.1x will, and those that can't get a splash page (and can authenticate via RADIUS using their web browser).
In Windows gorup policy you can configure a device to authenticate with its machine account, the user account, or both (it does machine first and then user when the user logs into the machine). Note when doing both or user authentication you really want to be using Windows 10 (works much better).
In a windows environment you really want to do a minimum of machine authentication. Otherwise the machine can't talk to the domain at the point the login prompt appearrs. So you can't apply group policy prior to login, and you can't log in without using cached credentials.
In your case, assuming you have all Windows 10, you can probably go with machine+user authentication.