FT Cyber Security Resources - G. Porter
Topic outline
-
Francis Tuttle Technololgy Center Cyber Security
The Francis Tuttle Technology Center Cyber Security Program is working to meet the nation's ever increasing need for cyber security professionals. The program is designed for adult, high school juniors and seniors seeking to join this field.
- Francis Tuttle was one of the founding members of CSEC. The Cyber Security Education Consortium is a cohesive partnership of community colleges and career and technology centers in Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas and the University of Tulsa. CSEC is comprised of 42 active two-year academic institutions.
As a National Science Foundation Advanced Technological Education Regional Center, CSEC's objectives are to: (i) develop and disseminate cyber security curricula; (ii) train instructors and build thriving cyber security programs; and (iii)create a cadre of skilled professionals who will stimulate job growth and economic development in an eight-state region: Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas.
A Francis Tuttle the program career majors are designed to fit specific levels of employment in the IT field and help the student gain the industry certifications need to become employed.
All the majors are modular and stackable, to enable the student to match their training to their employment goals. In addition, they can transfer most if not all credits from a lower level major to a higher level major.
In addtition, we have aligned the majors and courses with The Workforce Framework a national resource that categorizes, organizes, and describes cybersecurity work. The National Initiative for Cybersecurity Education (NICE) developed the Workforce Framework to provide educators, students, employers, employees, training providers and policy makers with a systematic way to for organizing the way we think and talk about cybersecurity work, and what is required of the cybersecurity workforce. See additional links
-
Click Headings to Expand Section
-
The intent of this Knowledge Unit is to provide students with basic security design fundamentals that help create systems that are worthy of being trusted.
-
1.5.1 Topics(s)
-
Separation (of domains)
-
Isolation
-
Encapsulation
-
Least Privilege
-
Simplicity (of design)
-
Minimization (of implementation)
-
Fail Safe Defaults / Fail Secure
-
Modularity
-
Layering
-
Least Astonishment
-
Open Design
-
Usability
-
1.5.2 Outcome(s): Students will be able to:
____ List the first principles of security
____ Describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies
____ Analyze common security failures and identify specific design principles that have been violated
____ Identify the needed design principle when given a specific scenario
____ Describe why good human machine interfaces are important to system use
____ Understand the interaction between security and system usability and the importance for minimizing the affects of security mechanisms
-