Topic outline

  • Francis Tuttle Technololgy Center Cyber Security

    The Francis Tuttle Technology Center Cyber Security Program is working to meet the nation's  ever increasing need for cyber security professionals.    The program is designed  for adult, high school juniors and seniors seeking to join this field.

    • Francis Tuttle was one of the founding members of CSEC.  The Cyber Security Education Consortium is a cohesive partnership of community colleges and career and technology centers in Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas and the University of Tulsa.  CSEC is comprised of 42 active two-year academic institutions.

    As a National Science Foundation Advanced Technological Education Regional Center, CSEC's objectives are to:  (i) develop and disseminate cyber security curricula; (ii) train instructors and build thriving cyber security programs; and (iii)create a cadre of skilled professionals who will stimulate job growth and economic development in an eight-state region:  Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas.

    A Francis Tuttle the program career majors are designed to fit specific levels of employment in the IT  field and help the student gain the industry certifications need to become employed. 

    All the majors are modular and stackable, to enable the student to match their training to their employment goals.    In addition, they can transfer most if not all credits from a lower level major to a higher level major.

    In addtition, we have aligned the majors and courses with The Workforce Framework  a national resource that categorizes, organizes, and describes cybersecurity work. The National Initiative for Cybersecurity Education (NICE) developed the Workforce Framework to provide educators, students, employers, employees, training providers and policy makers with a systematic way to for organizing the way we think and talk about cybersecurity work, and what is required of the cybersecurity workforce.   See additional links

  • The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information.

    Text and media areas: 6
  • The intent of this Knowledge Unit is to provide students with the ability to create simple scripts/programs to automate and perform simple operations. This knowledge should include basic security practices in developing scripts/programs (e.g., bounds checking, input validation).

    Text and media areas: 11
  • The intent of this Knowledge Unit is to provide students with a basic awareness of the options available to mitigate threats within a system.

    Text and media areas: 15
  • The intent of this Knowledge Unit is to provide students with basic information about the threats that may be present in the cyber realm.

    Text and media areas: 21
  • The intent of this Knowledge Unit is to provide students with basic security design fundamentals that help create systems that are worthy of being trusted.

    Text and media areas: 14
  • The intent of this Knowledge Unit is to provide students with basic concepts of information assurance fundamentals.

    Text and media areas: 13
  • The intent of this Knowledge Unit is to provide students with a basic ability to understand where and how cryptography is used.

    Text and media areas: 17
  • The intent of this Knowledge Unit is to provide students with an understanding of the basic components in an information technology system and their roles in system operation.

    Text and media areas: 10
  • The intent of this Knowledge Unit is to provide students with basic understanding of network components and how they interact.

    Text and media areas: 10
  • The intent of this Knowledge Unit is to provide students with and understanding of information assurance in context and the rules and guidelines that control them.

    Text and media areas: 13 URLs: 9 File: 1 Forum: 1
  • The intent of this Knowledge Unit is to provide students with skill to perform basic operations involved in system administration.

    Text and media areas: 18 Assignments: 26 Files: 7
  • File: 1 Text and media area: 1
  • Files: 6
  • Course Files

    File: 1
  • Folder: 1