240 likes | 513 Views
2. Tulsa Community College . 4 campusesLargest two-year College in Ok.Over 30,000 students served each yearCollege employs 2712 peopleTulsa has a population of about 400,000Area has a population of about 1,000,000For the sixth consecutive year ranked in top 3% nationally in degrees awarded. 3.
E N D
1. The opinions I represent here are not meant as criticism of TCC, its administration or decisions made. Everything I say here is meant to be my own opinions and do not represent TCC. While some of the things I say may seem negative in nature, they are meant to be positive in the sense that they identify challenges we identified in going thru the implementation of this as a new program. The opinions I represent here are not meant as criticism of TCC, its administration or decisions made. Everything I say here is meant to be my own opinions and do not represent TCC. While some of the things I say may seem negative in nature, they are meant to be positive in the sense that they identify challenges we identified in going thru the implementation of this as a new program.
2. 2 Tulsa Community College 4 campuses
Largest two-year College in Ok.
Over 30,000 students served each year
College employs 2712 people
Tulsa has a population of about 400,000
Area has a population of about 1,000,000
For the sixth consecutive year ranked in top 3% nationally in degrees awarded Just a little about who we are. Info sec is only at the nec of tcc although some of the prereq courses are taught at all of our campuses. Our enrollment there is about 6000 students. Just a little about who we are. Info sec is only at the nec of tcc although some of the prereq courses are taught at all of our campuses. Our enrollment there is about 6000 students.
3. 3 Information Security/Cyber Security at TCC Began the end of 2002
Originally placed in Telecommunications
Routers, broadband, etc.
Computer Information Systems program
Networking
University of Tulsa
Center for Information Security At the end of 2002, a telecom instructor made a request to add an information security component to his Telecom curriculum. At the same time, a Computer Information Systems instructor wished to add a security component to his Networking Curriculum. While this was in the process, the University of Tulsa approached our administration about sending one or two instructors thru their CyberSecurity program. Which an NSF grant would pay for.At the end of 2002, a telecom instructor made a request to add an information security component to his Telecom curriculum. At the same time, a Computer Information Systems instructor wished to add a security component to his Networking Curriculum. While this was in the process, the University of Tulsa approached our administration about sending one or two instructors thru their CyberSecurity program. Which an NSF grant would pay for.
4. 4 CSEC Cyber Security Educational Consortium
National Science Foundation ATE (Advanced Technology Education) Center
Regional Center of Excellence
Dedicated to building an information security workforce who will play a critical role in implementing the national strategy to secure cyberspace
$3 million grant from the National Science Foundation to develop programs for cyber security research and education
TCC is one of the founding members of the Oklahoma Center for Information Assurance and Forensics Education, which was renamed to CSEC to reflect the regional rather than limited to Ok. scope of the consortium.
The lead institution of the consortium is the university of tulsa, which is a regional center of excellence and provides guidance to the consortium members. Center of Excellence in Information Assurance Research and Education by NSATCC is one of the founding members of the Oklahoma Center for Information Assurance and Forensics Education, which was renamed to CSEC to reflect the regional rather than limited to Ok. scope of the consortium.
The lead institution of the consortium is the university of tulsa, which is a regional center of excellence and provides guidance to the consortium members. Center of Excellence in Information Assurance Research and Education by NSA
5. 5 CSEC Major goals
Develop and disseminate information assurance and forensic curriculum regionally and nationally.
Provide professional development training and technical support to Oklahoma technology centers, community colleges, and like entities from bordering states.
Design and implement workforce development programs that contribute to economic development and the national homeland security effort The consortium members share the grant from the NSF and they have to satisfy the above to satisfy the grant conditions. We have to share what we have learned.The consortium members share the grant from the NSF and they have to satisfy the above to satisfy the grant conditions. We have to share what we have learned.
6. 6 Challenges Marketing
Internal to the College
Making our current students aware of the program
Making our Academic Counseling Staff aware
External to the College
Making businesses aware of the program
Making our program reflect their needs We use traditional marketing such as newspapers, tv videos, posters, information sessions, free seminars. Student newspapers. We use traditional marketing such as newspapers, tv videos, posters, information sessions, free seminars. Student newspapers.
7. 7 Challenges Finding our place in the Vo-Tech, 2 year, 4 year hierarchy
What is the appropriate technical level to teach the courses
Targeted audience
Technicians
Network Administrators
Managers We needed to identify our target audience. We did surveys, asked advisory committee members, and decided we could serve several different targets with different courses. For example, managers benefit from taking our esm course (enterprise security managementWe needed to identify our target audience. We did surveys, asked advisory committee members, and decided we could serve several different targets with different courses. For example, managers benefit from taking our esm course (enterprise security management
8. 8 Challenges Building Enrollments
Prerequisites
Deciding the prerequisites we wanted our students to have coming into the program We suffer from the public perception that all IT jobs are moving overseas. We had to decide what the prereq’s were and this was complicated by having a telecom track and a networking track. We suffer from the public perception that all IT jobs are moving overseas. We had to decide what the prereq’s were and this was complicated by having a telecom track and a networking track.
9. 9 Challenges Turnover in Administrators/Faculty
Since January 2003
2 Different Provosts
2 Different Deans of Instruction
3 Different Associate Deans
3 Different coordinators of the program We had several personnel changes and that has caused us to have to bring our administrators up to date each time. The history of what has happened before is important to us.We had several personnel changes and that has caused us to have to bring our administrators up to date each time. The history of what has happened before is important to us.
10. 10 Challenges Curriculum
Do we teach to certification
If yes, which one
Choosing text books We had to decide which if any certification to try to prepare our students for. We identified several that were possibilities and we finally decided to use the SCP certification (security certified professional). Again, this was partially driven by the fact that some of our consortium members were doing the SCP curriculum. We have since, decided that we will not use the SCP curriculum or at least use it only in part of our curriculum. We added the COMPTIA security plus course and tell our students of several cert exams our program prepares them for.
SCNA SCNPWe had to decide which if any certification to try to prepare our students for. We identified several that were possibilities and we finally decided to use the SCP certification (security certified professional). Again, this was partially driven by the fact that some of our consortium members were doing the SCP curriculum. We have since, decided that we will not use the SCP curriculum or at least use it only in part of our curriculum. We added the COMPTIA security plus course and tell our students of several cert exams our program prepares them for.
SCNA SCNP
11. 11 Challenges Federal Certifications (CNSS 4011 etc)
The NSF would like our students to be able to receive CNSS (Committee on National Security Systems) certifications
Remember we have an NSF grant
These are very time consuming to complete
We completed an on-line application that took approximately 100 hours to complete Submitted 4011 in 4-05, received confirmation of approval of 4011 after 6 months. Now awaiting approval of 4012.Submitted 4011 in 4-05, received confirmation of approval of 4011 after 6 months. Now awaiting approval of 4012.
12. 12 Challenges Text Books and Lab Books
Finding appropriate level books and especially lab books
Validating the lab exercises
Making sure you have all the equipment the lab exercises call for
Availability, cost, models change We had very little choice for books and lab materials. We now have more choices available. We have had to spend a lot of time validating the lab exercises, finding what works and what does not. We had to buy some lab equipment to support the labs and what they needed. Be aware that models and software changes can cost you a lot over time. BiometricWe had very little choice for books and lab materials. We now have more choices available. We have had to spend a lot of time validating the lab exercises, finding what works and what does not. We had to buy some lab equipment to support the labs and what they needed. Be aware that models and software changes can cost you a lot over time. Biometric
13. 13 Challenges Support for setting up and maintaining labs
Training lab support people to help
Training for instructors that have to learn new lab exercises.
TIME We had limited support for instructors or para professionals to set up and maintain labs. We had to train our lab people in some of the procedures for setting up info sec labs. We continue to train as instructors, both for changes that we have to stay aware of and for new things we have to teach our students. We just do not have enough time.
Our courses are 8 weeks long, to enable us to get students thru the program more rapidly.We had limited support for instructors or para professionals to set up and maintain labs. We had to train our lab people in some of the procedures for setting up info sec labs. We continue to train as instructors, both for changes that we have to stay aware of and for new things we have to teach our students. We just do not have enough time.
Our courses are 8 weeks long, to enable us to get students thru the program more rapidly.
14. 14 Challenges Training for our Instructors
Convincing Area Businesses to allow/support internships
Getting the right advisory committee members and getting their input
Do not forget your own IT infrastructure people Things change, our instructors need to keep updating their skills/knowledge
Businesses have some problems with interns
We have to find and recruit advisorsThings change, our instructors need to keep updating their skills/knowledge
Businesses have some problems with interns
We have to find and recruit advisors
15. 15 Challenges Finding the appropriate place in our Catalog
Telecom?
CIS?
Both?
UP or Workforce Development We changed from tel prefix course numbers to cis prefix numbers, so students could locate our courses more easily.
Articulate with one or more 4 year institution.We changed from tel prefix course numbers to cis prefix numbers, so students could locate our courses more easily.
Articulate with one or more 4 year institution.
16. 16 Challenges Working with the Consortium
Being constrained by the agreed on curriculum.
Hard to change something
Getting agreement among diverse educational institutions, some of whom compete with each other for students. The consortium came up with a model curriculum, that is based on what our lead school, the Univ of Tulsa, does. We have 5 courses that we must teach and The consortium came up with a model curriculum, that is based on what our lead school, the Univ of Tulsa, does. We have 5 courses that we must teach and
17. 17 5 Core Course Offered CIS 2493 - Principles of Information Assurance
CIS 2523 – Secure E-Commerce
CIS 2543 - Network Security
CIS 2563 - Enterprise Security
CIS 2583 - Cyber Forensics
18. 18 Challenges Articulation
Vo-Tech
2 Year Schools
4 Year Universities We are in the process (which is a continuing process) of defining what and how much we will articulate with vo tech. It is a little different than articulating with a 4 year school, when we pass credits to a 4 year school, the students still take at least 2 years (the upper level) courses from the 4 year school.
On the other end, as I said, the 4 year schools don’t really want to take more than the gen ed from us. So we have to articulate on a one-on-one basis and that is a consideration to how we design our program curriculum, because if we are not going to be able to have the students transfer their credits to a 4 year school, we need to tell them at the beginning, do this track or do that track. And the tracks become different. Especially when they are transfer versus get a job after tcc. We end up articulating into specific 4 year school programs. That can get messy. So right now we have a telecom track, a cis track and one track that is transfer to a 4 year institution, but any student can take that track, even if they have no plans to transfer.We are in the process (which is a continuing process) of defining what and how much we will articulate with vo tech. It is a little different than articulating with a 4 year school, when we pass credits to a 4 year school, the students still take at least 2 years (the upper level) courses from the 4 year school.
On the other end, as I said, the 4 year schools don’t really want to take more than the gen ed from us. So we have to articulate on a one-on-one basis and that is a consideration to how we design our program curriculum, because if we are not going to be able to have the students transfer their credits to a 4 year school, we need to tell them at the beginning, do this track or do that track. And the tracks become different. Especially when they are transfer versus get a job after tcc. We end up articulating into specific 4 year school programs. That can get messy. So right now we have a telecom track, a cis track and one track that is transfer to a 4 year institution, but any student can take that track, even if they have no plans to transfer.
19. 19 Challenges OSBI Check
Cyber Security program requires an OSBI check
Other schools do not require the check
How can you be sure of the ethics of the person you are teaching? We also require students to sign an ethics agreement. We talk about ethics in our classes, but how can you be sure. The admin worries about this more than instructors.
Oklahoma State Bureau of Investigation, for felony convictionWe also require students to sign an ethics agreement. We talk about ethics in our classes, but how can you be sure. The admin worries about this more than instructors.
Oklahoma State Bureau of Investigation, for felony conviction
20. 20 Conclusion Choose your target audience
Get local businesses involved
They know about what they need
They will know about your program
Stakeholders This is one of the most important things, from my point of view as a faculty member, teach what is needed, teach the group of people that need to learn that material, market your program to those people, let local employers know about your program.This is one of the most important things, from my point of view as a faculty member, teach what is needed, teach the group of people that need to learn that material, market your program to those people, let local employers know about your program.
21. 21 Conclusion Get your administration’s endorsement
Know what your students final skill set should be
Design your curriculum to meet those goals
22. 22 Conclusion Grant requirements
Increase security awareness
On campus
Community
High schools
Replicate our program They often want programming, usually Java
We need to improve in assessing how good a job we are doing. Are students taking certification exams? Are they finishing a degree with us, are they going on to a 4 year program, are they getting jobs using the skills we helped them develop?
Burning question to graduate of program after they have worked for a year is “what did we not teach you that you needed?”
Often companies will donate equipment to a program
If you have not started, and maybe do not have the resources to build this up, you might want to talk to the (ICS)2 people in booth 179, they did a program on Saturday that included some on-line stuff they could do to help. I am not endorsing that, just making you aware of one option for you to consider. If you did not get a chance to talk to them they have a web site I can give you the addr for if you are interested.They often want programming, usually Java
We need to improve in assessing how good a job we are doing. Are students taking certification exams? Are they finishing a degree with us, are they going on to a 4 year program, are they getting jobs using the skills we helped them develop?
Burning question to graduate of program after they have worked for a year is “what did we not teach you that you needed?”
Often companies will donate equipment to a program
If you have not started, and maybe do not have the resources to build this up, you might want to talk to the (ICS)2 people in booth 179, they did a program on Saturday that included some on-line stuff they could do to help. I am not endorsing that, just making you aware of one option for you to consider. If you did not get a chance to talk to them they have a web site I can give you the addr for if you are interested.
23. 23 How TCC Can Help Tulsa Community College
Provide Advice
Answer Questions
24. 24 Contact Information Dewayne Willis dwillis2@tulsacc.edu
Glenn Jones gjones@tulsacc.edu
Steve St. John sstjohn@tulsacc.edu
Cyber Security Education Consortium: http://www.ociafe.org
Tulsa Community College: http://www.tulsacc.edu/page.asp?durki=3533 The website is not up yet, it will have this powerpoint on it by next weekend, and other material. If anyone wants to give me their business card and or email addr. I will be happy to list their contact info and interests on the website, so at least you can find each other after this session.
One thing we have to do as one of our grant requirements is to disseminate information and help other community colleges start info sec programs.
All of us at TCC will be happy to serve as resources in any way we can. I will also post our syllabuses, and some other info on the above website.
If anyone else here is has something to share about setting up an info sec program I encourage them to make themselves known. I offer them links on the above web site to anything they have on the web.The website is not up yet, it will have this powerpoint on it by next weekend, and other material. If anyone wants to give me their business card and or email addr. I will be happy to list their contact info and interests on the website, so at least you can find each other after this session.
One thing we have to do as one of our grant requirements is to disseminate information and help other community colleges start info sec programs.
All of us at TCC will be happy to serve as resources in any way we can. I will also post our syllabuses, and some other info on the above website.
If anyone else here is has something to share about setting up an info sec program I encourage them to make themselves known. I offer them links on the above web site to anything they have on the web.
25. 25 Video Link mms://streaming.tulsacc.edu/media/tcc/seccyber.wmv