Title: Curriculum
1Curriculum Workforce Development in
Cyber-Security
- Hal Zenisek
- Blackhawk Technical College
- Janesville, Wisconsin USA
2If it works, try not to be surprised.by Ron
Fischer, WCTC
3Introduction The Power of 2
- Three purposes of this session
- Share lessons learned developing a 2-year degree
for information security - Share ideas for workforce development
- Learn from others attending this session
- Introductions
- Hal Zenisek
- Dean
- Business Information Technology
- Blackhawk Technical College
- Janesville, Wisconsin USA
- hzenisek_at_blackhawk.edu
4Our Agenda
- What I plan to talk about!
- Our Thesis Information is the asset
- Industry-driven program design
- Share resources skill standards
- Course Curriculum development
- Faculty development
- Delivery methodologies ideas for workforce
development - Sharing ideas questions
5(No Transcript)
6www.blackhawk.edu
7Blackhawk Technical College www.blackhawk.edu
- Mission - Career Technical Education including
workforce economic development - Business Information Technology
- 2-year programs, diplomas, certificates
- Accounting, Marketing, Management
- Office Careers
- IT Cluster
- Networking Specialist
- Micro Programmer Specialist
- Help Desk Assistant
- Information Systems Security Specialist
8The WTCS Associate in Applied Science Degree
- Applied Associate degree programs as defined by
Wisconsin Statute are two-year, post-high school
programs in an area designated and approved by
the State Board for which the course requirements
are established by the State Board. Applied
associate degree programs adhere to the following
principles - provide the education and training in
occupational areas required by the state's
economy - shall prepare students to be productive employees
and to succeed in occupations requiring advanced
education and training - specific degree requirements shall have a
demonstrated relevance to the needs of employers
and students as employees - all courses shall be of the highest quality as
demonstrated by national and regional
accreditation and perceptions of graduates and
employers - shall be designed to impart identified
competencies and program graduates shall achieve
those competencies.
9ADDIE
- The ADDIE Instructional Design Model
- Analysis --gt Design --gt Development --gt
Implementation --gt Evaluation
10Analysis needs identification
- Its about Information Security
11Our thesis its all about Information Security!
- Computers ( even networks) can be replaced,
information is the asset which has value
therefore the critical resource. - Information security includes assurance,
confidentiality, availability, integrity, threats
vulnerabilities. - What KSAs go with protecting/security
information information systems? - Which competencies fit within our mission
purpose as a 2-year technical college? - Which are the highest priority? Prepare for
future program outcomes and documenting the
need. - KSA technical skills beyond networking, and
include security management, policy development,
ethical behavior, and more. Breadth of field
versus depth of field. Issues inside the
firewall as well as outside of it.
12More on Information Security
- Information needs to be available and
- Information needs to be private.
- Information needs to be trusted.
- Information systems need to be reliable.
- Networks make information available.
- Secure networks help insure privacy protection.
- However, we felt there is more.
13Types of information systems
- Accounting information systems
- Financial systems (banking others)
- Business systems (e-Commerce)
- Health information systems (medical)
- Community information systems (Emergency
Response) - Governmental, education, telecommunications
others
14Blackhawk Technical Colleges Multi-Disciplinary
Approach
- Network Security (4 courses)
- Programming e-Commerce for information systems
security (3 courses) - Security Management (5)
- Business Continuity Planning
- Cyber Law Ethics
- Security Measures/Countermeasures (intrusion
detection defending an internetworked system
against attacks) would be our capstone lab
experience.
15Program Design A Multi-Disciplinary Approach
- AAS limited to 68 credits- 12 core courses.
- Advanced technical certificates36 credits.
- Target trained incumbent IT professionals and
technical staff. - Elective courses for IT students in other majors
such as networking programming. - Big picture approach cross section of the
continuum of information systems. - From operating systems, buffer overruns, policies
procedures, to intrusion detection
appropriate countermeasures.
16Blackhawk Technical College found
- One Wisconsin employer (without a significant Web
presence) shared their recent experience with a
spam firewall. - Based on 900 users
- Over 5000 e-mail per hour
- 2974 were spam (60)
- 33 had viruses
- SOP for their IT personnel business was
transacted without incident with a firewall
spam filter (plus trained personnel).
17Recent Job Advertisement Madison, Wisconsin
- Enterprise Security Specialist
- Set overall security strategy, conducts security
technology research, consults on best practices,
and coordinates in-house security operations. - Bachelors degree, Computer Science
- 5 years recent experience networks
- Cisco experience
- CSSIP and/or Cisco certification.
18Blackhawk Technical Colleges Needs Assessment
Process
- Institutional Advancement survey
- 51 response rate from 74 employers
- 53 have problems finding qualified cyber
security workers - 56 indicated the demand would increase over the
next four years - 16 new full-time and 7 new part-time openings
over next 4 yrs. projected
19Blackhawk Technical Colleges Needs Assessment
Data
- 82 would encourage current employees to
participate in an educational program - 89 would hire a graduate for a cyber security
program - average hourly wage 20.20 (42,000)
- sent to the WTCS office approved as a new
emerging occupation - approval to proceed with program development
20Program Curriculum Design
- Program Design
- Course curriculum development
21Industry-Driven Design
- NSA Information Assurance Directorate Skill
Standard (www.nsa.gov) - Relevant industry-based competencies such as the
Systems Security Certified Practitioner
(www.isaca.org) - Global Information Assurance Certification
(www.giac.org) - Local Chapter of the ISSA (Information Systems
Security Association - see www.issa.org). - Alignment with 10 domains of the CISSP or not?
- Blackhawk Technical College IT Employer Advisory
Committee (Rock Green County Wisconsin)
everyone is impacted by this.
22www.aacc.nche.edu
23Blackhawk Technical CollegeProgram Design Process
- Articulate our thesis correlate it to an
identified need. Its about Information
Security! - Draft exit skills statements design program
outcomes from those. Align refine as we go. - Select tentative courses as building blocks to
program outcomes. - Aligned with industry skill standards.
- Prioritize program course outcomes.
- Prepare for course level curriculum development.
- Focused on the learner?
24Proposed Exit Skills
- From the learners point of view
- From an employers point of view
- These will evolve into future program outcomes
25Proposed Exit Skills
- A very good understanding of what information
security is, as currently defined by both
industry and government. - A detailed understanding of the man-made and
natural threats to information systems, and how
to effectively deal with them. - An extensive knowledge of the information assets
that need protection. - A detailed knowledge of the various methods for
countering/preventing internal and external
threats. - A detailed knowledge of how to deal with threats.
- An understanding that InfoSec is not a single
thing, nor is it an absolute science or a purely
technical subject.
26Proposed Exit Skills
- A detailed methodology for creating and
maintaining a consistently proven means for
countering threats in an organizational InfoSec
Program. - An understanding that a successful approach to
security planning, policies, and procedures are
as much about business process improvement as it
is about technology. - An understanding of the need to maintain the
interoperability of the organizational InfoSec
Program with external systems. - What makes Information Assurance (IA) different
than InfoSec and the need for IA across the
enterprise. - The knowledge base necessary to obtain common
InfoSec/IA industry certifications.
27What are Program Outcomes in Career Technical
Education?
- Occupational specific knowledge, skills and
attitudes that learners demonstrate upon
completion. - Pertain to the holistic program and go beyond
courses. - Derived from overall tasks performed on the job
or in life roles. - Are not program evaluation the learner is the
focus not the program.
28Program Outcomes Purpose
- Provides the reader with an overview of what the
learner will be able to do as a result of the
learning process. - Highest level of achievement that is part of the
learning process. - Are supported by student outcomes assessment
plans.
29Program Outcomes Guidelines
- Use lead-in phrase upon completion of the
Infosec program, the learner will be able to do. - Use only one action verb per outcome and
preferably the application level or above. - Consider the nature of the skills and the
environment in which the learner will perform on
the job. - Write concise clear phrases.
- Limit of 8 to 10 outcomes validated by advisory
committee members both for content and for
understanding.
30BTC Infosec Program Outcomes
- Identify resources, assess threats, analyze
losses, and understand vulnerabilities of
information systems. - Establish safeguards for automated information
systems. - Install, configure, and use specialized security
software, hardware, and firmware components. - Troubleshoot potential IT security issues.
- Implement preventative measures.
- Respond to threats from viruses, worms, and other
unauthorized access.
31Program Design Model Adds Flexibility
- No specific hardware or software specifics
through the use of more generic titles (Operating
Systems Security). - A variety of hardware, firmware, and software
vendors are covered in courses and found in the
lab. - Statewide model for other WTCS colleges.
- Current Issues Trends seminar changes based on
employer input, technology, and trends.
32Program Outcomes Resources
- DACUM facilitated process
- Advisory Committee
- Job Postings
- Employee Input
- Industry standards
- Graduate follow-up studies
- Internships
- Other colleges
33Program Design Resources
- NSA
- www.nsa.gov
- Centers for Academic Excellence
- Skill Standards such as 4011, 12, etc.
- Protecting Information The Role of Community
Colleges in Cybersecurity Education
www.aacc.nche.edu.
34Program Design Resources
- Cybersecurity Education in Community Colleges.pdf
- 4011.pdf
- www.nsa.gov/ia/index.cfm
- CISSP www.isc2.org
35Infosec Core Courses Blackhawk Technical
College
- INet/WWW
- Information Security Principles
- Network Security
- Internetwork Security I
- Internetwork Security II
- Designing Secure Websites
- Operating Systems Security
- Security Policies Procedures
- Information Security Documentation
- Client/Server Systems Security
- Security Meaures Countermesaures
- Business Continuity Planning
36Curriculum Development
- Our plan for getting students to those exit
skills and program outcomes.
37www.samsa.com
38Curriculum Development
- Its About Information Security
- Course-level outcomes (blueprint)
- Competencies
- Major skills, attitude, or ability needed to
perform a task effectively - Learning Objectives
- Performance Standards
- Learning Plans with learning activities
- Performance Assessment Plans
- Student Outcomes Assessment Plans
39Curriculum Development
- Competency-based software - WIDS
- Each course has several competencies that support
program outcomes. - Each competency has learning objectives,
performance standards, learning plans, and
assessment. - WIDS generated reports include syllabi, Course
Outcome Summary, and addresses
40Worldwide Instructional Design System (WIDS)
www.wids.org
414011 Alignment
42Alignment efforts
43Alignment Efforts Curriculum
44WIDS Course Examples
- Information Security Principles
- ITSEC-114.doc
- Network Security
- ITSEC-124.doc
- Perimeter Security
- ITSEC-145.doc
45Implementation (Delivery)
46Instructional delivery vision
- Face-to-face traditional learning
- On-line (distance learning)
- On-site employee development
- Technical assistance
- Seminars, awareness workshops lifelong learning
for IT and non-IT employees
47Real Life Student 1
- Age, 40 Female
- Main Frame Programmer Web Site Administrator
for a number of years - Laid off job hunting ready to leave IT for a
more viable occupation - Last time in school was mid 1980s
- I love this program and am so glad you talked me
into it. Its the first time Ive ever taken
time to look at the big picture. I cant wait to
get a job in this field.
48Real Life Student 2
- Age, 30, Male learned everything he knows
about IT on-the-job. - Local ISP Administrator for a number of years.
- Last time in school was high school didnt like
it that much. - Strong technical skills a quick study but
often sees the answer as adding more technology. - Doesnt see the need for policies and procedures.
- A classic practitioner in approach to problem
solving.
49Serving distance education learners with limited
resources
- Blackboard?
- WebCT?
- Others?
- IT infrastructure support?
- College firewalls security?
50 www.etechcollege.com
51Distance Learning via the Web
- Powered by BlackBoard, Inc.
- Hosted by Milwaukee Area Technical College.
- www.matc.edu
- Information Security Principles
- 154-151
- Disaster Recovery Planning
- 154-155
52Workforce Development
- Short-course seminars (modules from credit
courses) - Week-long boot camps
- Awareness seminars for all employees password
protocols, basics on viruses, ethics, inside the
firewall - New hire training for your IT staff?
- Specific Courses?
- 12-course, 36-credit certificate?
- 2-year AAS degree?
53Evaluation
- Program evaluation 3 years
- Crucial Conversations
- Lessons Learned
- The Reflective Practitioner
54Next Steps?
55Crucial BTC Conversations
- Is the time right for expanding IT educational
programs? - So tell me again why do you want to bring viruses
on the Colleges computers? - Arent you teaching hackers to be better hackers?
- Will there be jobs at the end?
- Its a great idea for the 4-year college
56Key Points the Power of 2
- We are one dean and one faculty member at a small
school in central Wisconsin do not
underestimate the power of 2. - It is more than simply computer security. Its
more than network security. Its all about
information security. - Technical competencies and security management
oriented competencies are both part of our
approach. Both in the computer lab make for
terrific conversations! Integrating this is
powerful.
57Future Vision The Power of 2
- AAS degree approved for next fall.
- 22 partnerships for Baccalaureate degrees will
better serve students the workforce. - Distance learning courses support an employed IT
workforce. - Supporting the colleges IT infrastructure with
advising and technical assistance. Our campus is
more secure! - Better aligning our occupational outcomes with
related certification programs getting students
into testing such as the CISSP. - Center for Information Assurance?
58Transitioning to an AAS
- 21 credits of General Education
- 6 credits of Elective courses
- 42 credits of Program Requirements
- 18 credits support
- 34 credits of core
- Work-based learning component
- 68 total credits
59Academic Partnerships
- Milwaukee Area Technical Colleges AAS degree
(www.matc.edu) - University of Illinois, Center for Academic
Excellence, Champaign - National Colloquium for Information Systems
Security Education or CISSE (http//www.ncisse.org
). - Wisconsin Technical College System office,
Madison, Wisconsin (www.wtcsystem.org). - Worldwide Instructional Design Software
(www.wids.org). - Franklin University (www.franklin.edu) pending a
22 agreement for an online Bachelors degree.
60Faculty Development
- CISSE, June 2005 in Atlanta GA
- NSA Centers of Academic Excellence
- NSA Skill Standards 4011 4014 etc.
- CISSPs 10 domains certification
- Designing delivering distance learning
- WIDS Curriculum Development software training
61The Other Half of the Power of 2
- Douglas A. Tabbutt
- IT Instructor
- Center for Information Assurance Education
- Blackhawk Technical College
- 6004 Prairie Road
- Janesville, WI USA 53547
- dtabbutt_at_blackhawk.edu
62Wrap-up Next StepsExpanding The Power of 2
- Summarize any actions from the audience as a
result of this presentation? - Summarize any follow up action items required
from Blackhawk Technical College? - See me during the conference if you want to talk
further.
63At Blackhawk Technical College, Janesville
Wisconsin
64Questions and Discussion
?
?
?
?
?
?
?