FT Cyber Security Resources - G. Porter
Topic outline
-
Francis Tuttle Technololgy Center Cyber Security
The Francis Tuttle Technology Center Cyber Security Program is working to meet the nation's ever increasing need for cyber security professionals. The program is designed for adult, high school juniors and seniors seeking to join this field.
- Francis Tuttle was one of the founding members of CSEC. The Cyber Security Education Consortium is a cohesive partnership of community colleges and career and technology centers in Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas and the University of Tulsa. CSEC is comprised of 42 active two-year academic institutions.
As a National Science Foundation Advanced Technological Education Regional Center, CSEC's objectives are to: (i) develop and disseminate cyber security curricula; (ii) train instructors and build thriving cyber security programs; and (iii)create a cadre of skilled professionals who will stimulate job growth and economic development in an eight-state region: Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas.
A Francis Tuttle the program career majors are designed to fit specific levels of employment in the IT field and help the student gain the industry certifications need to become employed.
All the majors are modular and stackable, to enable the student to match their training to their employment goals. In addition, they can transfer most if not all credits from a lower level major to a higher level major.
In addtition, we have aligned the majors and courses with The Workforce Framework a national resource that categorizes, organizes, and describes cybersecurity work. The National Initiative for Cybersecurity Education (NICE) developed the Workforce Framework to provide educators, students, employers, employees, training providers and policy makers with a systematic way to for organizing the way we think and talk about cybersecurity work, and what is required of the cybersecurity workforce. See additional links
-
Click Headings to Expand Section
-
The intent of this Knowledge Unit is to provide students with a basic awareness of the options available to mitigate threats within a system.
-
1.3.1 Topic(s):
-
Network mapping (enumeration and identification of network components)
-
Network security techniques and components
-
Access controls, flow control, cryptography, firewalls, intrusion detection systems, etc
-
Applications of Cryptography
-
Malicious activity detection / forms of attack
-
Appropriate Countermeasures
-
Trust Relationships
-
Defense in Depth
-
Layering of security mechanisms to achieve desired security
-
Patching
-
OS and Application Updates
-
Vulnerability Scanning
-
Vulnerability Windows (0-day to patch availability)
-
1.3.2 Outcome(s): Students will be able to:
____ Describe potential system attacks and the actors that might perform them
____ Describe cyber defense tools, methods and components
____ Apply cyber defense methods to prepare a system to repel attacks
____ Describe appropriate measures to be taken should a system compromise occur.
-