1 / 24

Tulsa Community College

2. Tulsa Community College . 4 campusesLargest two-year College in Ok.Over 30,000 students served each yearCollege employs 2712 peopleTulsa has a population of about 400,000Area has a population of about 1,000,000For the sixth consecutive year ranked in top 3% nationally in degrees awarded. 3.

shakira
Download Presentation

Tulsa Community College

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. The opinions I represent here are not meant as criticism of TCC, its administration or decisions made. Everything I say here is meant to be my own opinions and do not represent TCC. While some of the things I say may seem negative in nature, they are meant to be positive in the sense that they identify challenges we identified in going thru the implementation of this as a new program. The opinions I represent here are not meant as criticism of TCC, its administration or decisions made. Everything I say here is meant to be my own opinions and do not represent TCC. While some of the things I say may seem negative in nature, they are meant to be positive in the sense that they identify challenges we identified in going thru the implementation of this as a new program.

    2. 2 Tulsa Community College 4 campuses Largest two-year College in Ok. Over 30,000 students served each year College employs 2712 people Tulsa has a population of about 400,000 Area has a population of about 1,000,000 For the sixth consecutive year ranked in top 3% nationally in degrees awarded Just a little about who we are. Info sec is only at the nec of tcc although some of the prereq courses are taught at all of our campuses. Our enrollment there is about 6000 students. Just a little about who we are. Info sec is only at the nec of tcc although some of the prereq courses are taught at all of our campuses. Our enrollment there is about 6000 students.

    3. 3 Information Security/Cyber Security at TCC Began the end of 2002 Originally placed in Telecommunications Routers, broadband, etc. Computer Information Systems program Networking University of Tulsa Center for Information Security At the end of 2002, a telecom instructor made a request to add an information security component to his Telecom curriculum. At the same time, a Computer Information Systems instructor wished to add a security component to his Networking Curriculum. While this was in the process, the University of Tulsa approached our administration about sending one or two instructors thru their CyberSecurity program. Which an NSF grant would pay for.At the end of 2002, a telecom instructor made a request to add an information security component to his Telecom curriculum. At the same time, a Computer Information Systems instructor wished to add a security component to his Networking Curriculum. While this was in the process, the University of Tulsa approached our administration about sending one or two instructors thru their CyberSecurity program. Which an NSF grant would pay for.

    4. 4 CSEC Cyber Security Educational Consortium National Science Foundation ATE (Advanced Technology Education) Center Regional Center of Excellence Dedicated to building an information security workforce who will play a critical role in implementing the national strategy to secure cyberspace $3 million grant from the National Science Foundation to develop programs for cyber security research and education TCC is one of the founding members of the Oklahoma Center for Information Assurance and Forensics Education, which was renamed to CSEC to reflect the regional rather than limited to Ok. scope of the consortium. The lead institution of the consortium is the university of tulsa, which is a regional center of excellence and provides guidance to the consortium members. Center of Excellence in Information Assurance Research and Education by NSATCC is one of the founding members of the Oklahoma Center for Information Assurance and Forensics Education, which was renamed to CSEC to reflect the regional rather than limited to Ok. scope of the consortium. The lead institution of the consortium is the university of tulsa, which is a regional center of excellence and provides guidance to the consortium members. Center of Excellence in Information Assurance Research and Education by NSA

    5. 5 CSEC Major goals Develop and disseminate information assurance and forensic curriculum regionally and nationally. Provide professional development training and technical support to Oklahoma technology centers, community colleges, and like entities from bordering states. Design and implement workforce development programs that contribute to economic development and the national homeland security effort The consortium members share the grant from the NSF and they have to satisfy the above to satisfy the grant conditions. We have to share what we have learned.The consortium members share the grant from the NSF and they have to satisfy the above to satisfy the grant conditions. We have to share what we have learned.

    6. 6 Challenges Marketing Internal to the College Making our current students aware of the program Making our Academic Counseling Staff aware External to the College Making businesses aware of the program Making our program reflect their needs We use traditional marketing such as newspapers, tv videos, posters, information sessions, free seminars. Student newspapers. We use traditional marketing such as newspapers, tv videos, posters, information sessions, free seminars. Student newspapers.

    7. 7 Challenges Finding our place in the Vo-Tech, 2 year, 4 year hierarchy What is the appropriate technical level to teach the courses Targeted audience Technicians Network Administrators Managers We needed to identify our target audience. We did surveys, asked advisory committee members, and decided we could serve several different targets with different courses. For example, managers benefit from taking our esm course (enterprise security managementWe needed to identify our target audience. We did surveys, asked advisory committee members, and decided we could serve several different targets with different courses. For example, managers benefit from taking our esm course (enterprise security management

    8. 8 Challenges Building Enrollments Prerequisites Deciding the prerequisites we wanted our students to have coming into the program We suffer from the public perception that all IT jobs are moving overseas. We had to decide what the prereq’s were and this was complicated by having a telecom track and a networking track. We suffer from the public perception that all IT jobs are moving overseas. We had to decide what the prereq’s were and this was complicated by having a telecom track and a networking track.

    9. 9 Challenges Turnover in Administrators/Faculty Since January 2003 2 Different Provosts 2 Different Deans of Instruction 3 Different Associate Deans 3 Different coordinators of the program We had several personnel changes and that has caused us to have to bring our administrators up to date each time. The history of what has happened before is important to us.We had several personnel changes and that has caused us to have to bring our administrators up to date each time. The history of what has happened before is important to us.

    10. 10 Challenges Curriculum Do we teach to certification If yes, which one Choosing text books We had to decide which if any certification to try to prepare our students for. We identified several that were possibilities and we finally decided to use the SCP certification (security certified professional). Again, this was partially driven by the fact that some of our consortium members were doing the SCP curriculum. We have since, decided that we will not use the SCP curriculum or at least use it only in part of our curriculum. We added the COMPTIA security plus course and tell our students of several cert exams our program prepares them for. SCNA SCNPWe had to decide which if any certification to try to prepare our students for. We identified several that were possibilities and we finally decided to use the SCP certification (security certified professional). Again, this was partially driven by the fact that some of our consortium members were doing the SCP curriculum. We have since, decided that we will not use the SCP curriculum or at least use it only in part of our curriculum. We added the COMPTIA security plus course and tell our students of several cert exams our program prepares them for. SCNA SCNP

    11. 11 Challenges Federal Certifications (CNSS 4011 etc) The NSF would like our students to be able to receive CNSS (Committee on National Security Systems) certifications Remember we have an NSF grant These are very time consuming to complete We completed an on-line application that took approximately 100 hours to complete Submitted 4011 in 4-05, received confirmation of approval of 4011 after 6 months. Now awaiting approval of 4012.Submitted 4011 in 4-05, received confirmation of approval of 4011 after 6 months. Now awaiting approval of 4012.

    12. 12 Challenges Text Books and Lab Books Finding appropriate level books and especially lab books Validating the lab exercises Making sure you have all the equipment the lab exercises call for Availability, cost, models change We had very little choice for books and lab materials. We now have more choices available. We have had to spend a lot of time validating the lab exercises, finding what works and what does not. We had to buy some lab equipment to support the labs and what they needed. Be aware that models and software changes can cost you a lot over time. BiometricWe had very little choice for books and lab materials. We now have more choices available. We have had to spend a lot of time validating the lab exercises, finding what works and what does not. We had to buy some lab equipment to support the labs and what they needed. Be aware that models and software changes can cost you a lot over time. Biometric

    13. 13 Challenges Support for setting up and maintaining labs Training lab support people to help Training for instructors that have to learn new lab exercises. TIME We had limited support for instructors or para professionals to set up and maintain labs. We had to train our lab people in some of the procedures for setting up info sec labs. We continue to train as instructors, both for changes that we have to stay aware of and for new things we have to teach our students. We just do not have enough time. Our courses are 8 weeks long, to enable us to get students thru the program more rapidly.We had limited support for instructors or para professionals to set up and maintain labs. We had to train our lab people in some of the procedures for setting up info sec labs. We continue to train as instructors, both for changes that we have to stay aware of and for new things we have to teach our students. We just do not have enough time. Our courses are 8 weeks long, to enable us to get students thru the program more rapidly.

    14. 14 Challenges Training for our Instructors Convincing Area Businesses to allow/support internships Getting the right advisory committee members and getting their input Do not forget your own IT infrastructure people Things change, our instructors need to keep updating their skills/knowledge Businesses have some problems with interns We have to find and recruit advisorsThings change, our instructors need to keep updating their skills/knowledge Businesses have some problems with interns We have to find and recruit advisors

    15. 15 Challenges Finding the appropriate place in our Catalog Telecom? CIS? Both? UP or Workforce Development We changed from tel prefix course numbers to cis prefix numbers, so students could locate our courses more easily. Articulate with one or more 4 year institution.We changed from tel prefix course numbers to cis prefix numbers, so students could locate our courses more easily. Articulate with one or more 4 year institution.

    16. 16 Challenges Working with the Consortium Being constrained by the agreed on curriculum. Hard to change something Getting agreement among diverse educational institutions, some of whom compete with each other for students. The consortium came up with a model curriculum, that is based on what our lead school, the Univ of Tulsa, does. We have 5 courses that we must teach and The consortium came up with a model curriculum, that is based on what our lead school, the Univ of Tulsa, does. We have 5 courses that we must teach and

    17. 17 5 Core Course Offered CIS 2493 - Principles of Information Assurance CIS 2523 – Secure E-Commerce CIS 2543 - Network Security CIS 2563 - Enterprise Security CIS 2583 - Cyber Forensics

    18. 18 Challenges Articulation Vo-Tech 2 Year Schools 4 Year Universities We are in the process (which is a continuing process) of defining what and how much we will articulate with vo tech. It is a little different than articulating with a 4 year school, when we pass credits to a 4 year school, the students still take at least 2 years (the upper level) courses from the 4 year school. On the other end, as I said, the 4 year schools don’t really want to take more than the gen ed from us. So we have to articulate on a one-on-one basis and that is a consideration to how we design our program curriculum, because if we are not going to be able to have the students transfer their credits to a 4 year school, we need to tell them at the beginning, do this track or do that track. And the tracks become different. Especially when they are transfer versus get a job after tcc. We end up articulating into specific 4 year school programs. That can get messy. So right now we have a telecom track, a cis track and one track that is transfer to a 4 year institution, but any student can take that track, even if they have no plans to transfer.We are in the process (which is a continuing process) of defining what and how much we will articulate with vo tech. It is a little different than articulating with a 4 year school, when we pass credits to a 4 year school, the students still take at least 2 years (the upper level) courses from the 4 year school. On the other end, as I said, the 4 year schools don’t really want to take more than the gen ed from us. So we have to articulate on a one-on-one basis and that is a consideration to how we design our program curriculum, because if we are not going to be able to have the students transfer their credits to a 4 year school, we need to tell them at the beginning, do this track or do that track. And the tracks become different. Especially when they are transfer versus get a job after tcc. We end up articulating into specific 4 year school programs. That can get messy. So right now we have a telecom track, a cis track and one track that is transfer to a 4 year institution, but any student can take that track, even if they have no plans to transfer.

    19. 19 Challenges OSBI Check Cyber Security program requires an OSBI check Other schools do not require the check How can you be sure of the ethics of the person you are teaching? We also require students to sign an ethics agreement. We talk about ethics in our classes, but how can you be sure. The admin worries about this more than instructors. Oklahoma State Bureau of Investigation, for felony convictionWe also require students to sign an ethics agreement. We talk about ethics in our classes, but how can you be sure. The admin worries about this more than instructors. Oklahoma State Bureau of Investigation, for felony conviction

    20. 20 Conclusion Choose your target audience Get local businesses involved They know about what they need They will know about your program Stakeholders This is one of the most important things, from my point of view as a faculty member, teach what is needed, teach the group of people that need to learn that material, market your program to those people, let local employers know about your program.This is one of the most important things, from my point of view as a faculty member, teach what is needed, teach the group of people that need to learn that material, market your program to those people, let local employers know about your program.

    21. 21 Conclusion Get your administration’s endorsement Know what your students final skill set should be Design your curriculum to meet those goals

    22. 22 Conclusion Grant requirements Increase security awareness On campus Community High schools Replicate our program They often want programming, usually Java We need to improve in assessing how good a job we are doing. Are students taking certification exams? Are they finishing a degree with us, are they going on to a 4 year program, are they getting jobs using the skills we helped them develop? Burning question to graduate of program after they have worked for a year is “what did we not teach you that you needed?” Often companies will donate equipment to a program If you have not started, and maybe do not have the resources to build this up, you might want to talk to the (ICS)2 people in booth 179, they did a program on Saturday that included some on-line stuff they could do to help. I am not endorsing that, just making you aware of one option for you to consider. If you did not get a chance to talk to them they have a web site I can give you the addr for if you are interested.They often want programming, usually Java We need to improve in assessing how good a job we are doing. Are students taking certification exams? Are they finishing a degree with us, are they going on to a 4 year program, are they getting jobs using the skills we helped them develop? Burning question to graduate of program after they have worked for a year is “what did we not teach you that you needed?” Often companies will donate equipment to a program If you have not started, and maybe do not have the resources to build this up, you might want to talk to the (ICS)2 people in booth 179, they did a program on Saturday that included some on-line stuff they could do to help. I am not endorsing that, just making you aware of one option for you to consider. If you did not get a chance to talk to them they have a web site I can give you the addr for if you are interested.

    23. 23 How TCC Can Help Tulsa Community College Provide Advice Answer Questions

    24. 24 Contact Information Dewayne Willis dwillis2@tulsacc.edu Glenn Jones gjones@tulsacc.edu Steve St. John sstjohn@tulsacc.edu Cyber Security Education Consortium: http://www.ociafe.org Tulsa Community College: http://www.tulsacc.edu/page.asp?durki=3533 The website is not up yet, it will have this powerpoint on it by next weekend, and other material. If anyone wants to give me their business card and or email addr. I will be happy to list their contact info and interests on the website, so at least you can find each other after this session. One thing we have to do as one of our grant requirements is to disseminate information and help other community colleges start info sec programs. All of us at TCC will be happy to serve as resources in any way we can. I will also post our syllabuses, and some other info on the above website. If anyone else here is has something to share about setting up an info sec program I encourage them to make themselves known. I offer them links on the above web site to anything they have on the web.The website is not up yet, it will have this powerpoint on it by next weekend, and other material. If anyone wants to give me their business card and or email addr. I will be happy to list their contact info and interests on the website, so at least you can find each other after this session. One thing we have to do as one of our grant requirements is to disseminate information and help other community colleges start info sec programs. All of us at TCC will be happy to serve as resources in any way we can. I will also post our syllabuses, and some other info on the above website. If anyone else here is has something to share about setting up an info sec program I encourage them to make themselves known. I offer them links on the above web site to anything they have on the web.

    25. 25 Video Link mms://streaming.tulsacc.edu/media/tcc/seccyber.wmv

More Related