FT Cyber Security Resources - G. Porter
Topic outline
-
Francis Tuttle Technololgy Center Cyber Security
The Francis Tuttle Technology Center Cyber Security Program is working to meet the nation's ever increasing need for cyber security professionals. The program is designed for adult, high school juniors and seniors seeking to join this field.
- Francis Tuttle was one of the founding members of CSEC. The Cyber Security Education Consortium is a cohesive partnership of community colleges and career and technology centers in Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas and the University of Tulsa. CSEC is comprised of 42 active two-year academic institutions.
As a National Science Foundation Advanced Technological Education Regional Center, CSEC's objectives are to: (i) develop and disseminate cyber security curricula; (ii) train instructors and build thriving cyber security programs; and (iii)create a cadre of skilled professionals who will stimulate job growth and economic development in an eight-state region: Oklahoma, Arkansas, Colorado, Kansas, Louisiana, Missouri, Tennessee and Texas.
A Francis Tuttle the program career majors are designed to fit specific levels of employment in the IT field and help the student gain the industry certifications need to become employed.
All the majors are modular and stackable, to enable the student to match their training to their employment goals. In addition, they can transfer most if not all credits from a lower level major to a higher level major.
In addtition, we have aligned the majors and courses with The Workforce Framework a national resource that categorizes, organizes, and describes cybersecurity work. The National Initiative for Cybersecurity Education (NICE) developed the Workforce Framework to provide educators, students, employers, employees, training providers and policy makers with a systematic way to for organizing the way we think and talk about cybersecurity work, and what is required of the cybersecurity workforce. See additional links
-
Click Headings to Expand Section
-
The intent of this Knowledge Unit is to provide students with a basic ability to understand where and how cryptography is used.
-
1.7.1 Topics(s)
-
Symmetric Cryptography (DES, Twofish)
-
Public Key Cryptography
-
Public Key Infrastructure
-
Certificates
-
Hash Functions (MD4, MD5, SHA-1, SHA-2, SHA-3)
-
For integrity
-
For Protecting Authentication Data
-
Collision Resistance
-
Digital Signatures (Authentication)
-
Key Management (Creation, Exchange/Distribution)
-
Cryptographic Modes (Strengths and Weaknesses)
-
Types of Attacks (Brute Force, Chosen Plaintext, Known Plaintext, Differential and Linear Cryptanalysis, etc.)
-
Common Cryptographic Protocols
-
DES -> AES (Evolution from DES to AES)
-
Security Functions (Data Protection, Data Integrity, Authentication)
-
1.7.2 Outcome(s): Students will be able to:
____ Identify the elements of a cryptographic system
____ Describe the differences between symmetric and asymmetric algorithms
____ Describe which cryptographic protocols, tools and techniques are appropriate for a given situation
____ Describe how crypto can be used, strengths and weaknesses, modes, and the issues that must be addressed in an implementation (e.g., key management), etc
-