Curriculum - PowerPoint PPT Presentation


PPT – Curriculum PowerPoint presentation | free to view - id: 1fa100-ZDc1Z


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation



Blackhawk Technical College's Needs Assessment Process. Institutional ... Blackhawk Technical College IT Employer Advisory Committee (Rock & Green County ... – PowerPoint PPT presentation

Number of Views:33
Avg rating:3.0/5.0
Slides: 65
Provided by: BTC86


Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Curriculum

Curriculum Workforce Development in
  • Hal Zenisek
  • Blackhawk Technical College
  • Janesville, Wisconsin USA

If it works, try not to be surprised. by Ron
Fischer, WCTC
Introduction The Power of 2
  • Three purposes of this session
  • Share lessons learned developing a 2-year degree
    for information security
  • Share ideas for workforce development
  • Learn from others attending this session
  • Introductions
  • Hal Zenisek
  • Dean
  • Business Information Technology
  • Blackhawk Technical College
  • Janesville, Wisconsin USA

Our Agenda
  • What I plan to talk about!
  • Our Thesis Information is the asset
  • Industry-driven program design
  • Share resources skill standards
  • Course Curriculum development
  • Faculty development
  • Delivery methodologies ideas for workforce
  • Sharing ideas questions

(No Transcript)
Blackhawk Technical College
  • Mission - Career Technical Education including
    workforce economic development
  • Business Information Technology
  • 2-year programs, diplomas, certificates
  • Accounting, Marketing, Management
  • Office Careers
  • IT Cluster
  • Networking Specialist
  • Micro Programmer Specialist
  • Help Desk Assistant
  • Information Systems Security Specialist

The WTCS Associate in Applied Science Degree
  • Applied Associate degree programs as defined by
    Wisconsin Statute are two-year, post-high school
    programs in an area designated and approved by
    the State Board for which the course requirements
    are established by the State Board. Applied
    associate degree programs adhere to the following
  • provide the education and training in
    occupational areas required by the state's
  • shall prepare students to be productive employees
    and to succeed in occupations requiring advanced
    education and training
  • specific degree requirements shall have a
    demonstrated relevance to the needs of employers
    and students as employees
  • all courses shall be of the highest quality as
    demonstrated by national and regional
    accreditation and perceptions of graduates and
  • shall be designed to impart identified
    competencies and program graduates shall achieve
    those competencies.

  • The ADDIE Instructional Design Model
  • Analysis --gt Design --gt Development --gt
    Implementation --gt Evaluation

Analysis needs identification
  • Its about Information Security

Our thesis its all about Information Security!
  • Computers ( even networks) can be replaced,
    information is the asset which has value
    therefore the critical resource.
  • Information security includes assurance,
    confidentiality, availability, integrity, threats
  • What KSAs go with protecting/security
    information information systems?
  • Which competencies fit within our mission
    purpose as a 2-year technical college?
  • Which are the highest priority? Prepare for
    future program outcomes and documenting the
  • KSA technical skills beyond networking, and
    include security management, policy development,
    ethical behavior, and more. Breadth of field
    versus depth of field. Issues inside the
    firewall as well as outside of it.

More on Information Security
  • Information needs to be available and
  • Information needs to be private.
  • Information needs to be trusted.
  • Information systems need to be reliable.
  • Networks make information available.
  • Secure networks help insure privacy protection.
  • However, we felt there is more.

Types of information systems
  • Accounting information systems
  • Financial systems (banking others)
  • Business systems (e-Commerce)
  • Health information systems (medical)
  • Community information systems (Emergency
  • Governmental, education, telecommunications

Blackhawk Technical Colleges Multi-Disciplinary
  • Network Security (4 courses)
  • Programming e-Commerce for information systems
    security (3 courses)
  • Security Management (5)
  • Business Continuity Planning
  • Cyber Law Ethics
  • Security Measures/Countermeasures (intrusion
    detection defending an internetworked system
    against attacks) would be our capstone lab

Program Design A Multi-Disciplinary Approach
  • AAS limited to 68 credits- 12 core courses.
  • Advanced technical certificates36 credits.
  • Target trained incumbent IT professionals and
    technical staff.
  • Elective courses for IT students in other majors
    such as networking programming.
  • Big picture approach cross section of the
    continuum of information systems.
  • From operating systems, buffer overruns, policies
    procedures, to intrusion detection
    appropriate countermeasures.

Blackhawk Technical College found
  • One Wisconsin employer (without a significant Web
    presence) shared their recent experience with a
    spam firewall.
  • Based on 900 users
  • Over 5000 e-mail per hour
  • 2974 were spam (60)
  • 33 had viruses
  • SOP for their IT personnel business was
    transacted without incident with a firewall
    spam filter (plus trained personnel).

Recent Job Advertisement Madison, Wisconsin
  • Enterprise Security Specialist
  • Set overall security strategy, conducts security
    technology research, consults on best practices,
    and coordinates in-house security operations.
  • Bachelors degree, Computer Science
  • 5 years recent experience networks
  • Cisco experience
  • CSSIP and/or Cisco certification.

Blackhawk Technical Colleges Needs Assessment
  • Institutional Advancement survey
  • 51 response rate from 74 employers
  • 53 have problems finding qualified cyber
    security workers
  • 56 indicated the demand would increase over the
    next four years
  • 16 new full-time and 7 new part-time openings
    over next 4 yrs. projected

Blackhawk Technical Colleges Needs Assessment
  • 82 would encourage current employees to
    participate in an educational program
  • 89 would hire a graduate for a cyber security
  • average hourly wage 20.20 (42,000)
  • sent to the WTCS office approved as a new
    emerging occupation
  • approval to proceed with program development

Program Curriculum Design
  • Program Design
  • Course curriculum development

Industry-Driven Design
  • NSA Information Assurance Directorate Skill
    Standard (
  • Relevant industry-based competencies such as the
    Systems Security Certified Practitioner
  • Global Information Assurance Certification
  • Local Chapter of the ISSA (Information Systems
    Security Association - see
  • Alignment with 10 domains of the CISSP or not?
  • Blackhawk Technical College IT Employer Advisory
    Committee (Rock Green County Wisconsin)
    everyone is impacted by this.

Blackhawk Technical College Program Design Process
  • Articulate our thesis correlate it to an
    identified need. Its about Information
  • Draft exit skills statements design program
    outcomes from those. Align refine as we go.
  • Select tentative courses as building blocks to
    program outcomes.
  • Aligned with industry skill standards.
  • Prioritize program course outcomes.
  • Prepare for course level curriculum development.
  • Focused on the learner?

Proposed Exit Skills
  • From the learners point of view
  • From an employers point of view
  • These will evolve into future program outcomes

Proposed Exit Skills
  1. A very good understanding of what information
    security is, as currently defined by both
    industry and government.
  2. A detailed understanding of the man-made and
    natural threats to information systems, and how
    to effectively deal with them.
  3. An extensive knowledge of the information assets
    that need protection.
  4. A detailed knowledge of the various methods for
    countering/preventing internal and external
  5. A detailed knowledge of how to deal with threats.
  6. An understanding that InfoSec is not a single
    thing, nor is it an absolute science or a purely
    technical subject.

Proposed Exit Skills
  1. A detailed methodology for creating and
    maintaining a consistently proven means for
    countering threats in an organizational InfoSec
  2. An understanding that a successful approach to
    security planning, policies, and procedures are
    as much about business process improvement as it
    is about technology.
  3. An understanding of the need to maintain the
    interoperability of the organizational InfoSec
    Program with external systems.
  4. What makes Information Assurance (IA) different
    than InfoSec and the need for IA across the
  5. The knowledge base necessary to obtain common
    InfoSec/IA industry certifications.

What are Program Outcomes in Career Technical
  • Occupational specific knowledge, skills and
    attitudes that learners demonstrate upon
  • Pertain to the holistic program and go beyond
  • Derived from overall tasks performed on the job
    or in life roles.
  • Are not program evaluation the learner is the
    focus not the program.

Program Outcomes Purpose
  • Provides the reader with an overview of what the
    learner will be able to do as a result of the
    learning process.
  • Highest level of achievement that is part of the
    learning process.
  • Are supported by student outcomes assessment

Program Outcomes Guidelines
  • Use lead-in phrase upon completion of the
    Infosec program, the learner will be able to do.
  • Use only one action verb per outcome and
    preferably the application level or above.
  • Consider the nature of the skills and the
    environment in which the learner will perform on
    the job.
  • Write concise clear phrases.
  • Limit of 8 to 10 outcomes validated by advisory
    committee members both for content and for

BTC Infosec Program Outcomes
  • Identify resources, assess threats, analyze
    losses, and understand vulnerabilities of
    information systems.
  • Establish safeguards for automated information
  • Install, configure, and use specialized security
    software, hardware, and firmware components.
  • Troubleshoot potential IT security issues.
  • Implement preventative measures.
  • Respond to threats from viruses, worms, and other
    unauthorized access.

Program Design Model Adds Flexibility
  • No specific hardware or software specifics
    through the use of more generic titles (Operating
    Systems Security).
  • A variety of hardware, firmware, and software
    vendors are covered in courses and found in the
  • Statewide model for other WTCS colleges.
  • Current Issues Trends seminar changes based on
    employer input, technology, and trends.

Program Outcomes Resources
  • DACUM facilitated process
  • Advisory Committee
  • Job Postings
  • Employee Input
  • Industry standards
  • Graduate follow-up studies
  • Internships
  • Other colleges

Program Design Resources
  • NSA
  • Centers for Academic Excellence
  • Skill Standards such as 4011, 12, etc.
  • Protecting Information The Role of Community
    Colleges in Cybersecurity Education

Program Design Resources
  • Cybersecurity Education in Community Colleges.pdf
  • 4011.pdf

Infosec Core Courses Blackhawk Technical
  • INet/WWW
  • Information Security Principles
  • Network Security
  • Internetwork Security I
  • Internetwork Security II
  • Designing Secure Websites
  • Operating Systems Security
  • Security Policies Procedures
  • Information Security Documentation
  • Client/Server Systems Security
  • Security Meaures Countermesaures
  • Business Continuity Planning

Curriculum Development
  • Our plan for getting students to those exit
    skills and program outcomes.

Curriculum Development
  • Its About Information Security
  • Course-level outcomes (blueprint)
  • Competencies
  • Major skills, attitude, or ability needed to
    perform a task effectively
  • Learning Objectives
  • Performance Standards
  • Learning Plans with learning activities
  • Performance Assessment Plans
  • Student Outcomes Assessment Plans

Curriculum Development
  • Competency-based software - WIDS
  • Each course has several competencies that support
    program outcomes.
  • Each competency has learning objectives,
    performance standards, learning plans, and
  • WIDS generated reports include syllabi, Course
    Outcome Summary, and addresses

Worldwide Instructional Design System (WIDS)
4011 Alignment
  • ISSC4011Matrix.xls

Alignment efforts
  • ISSCPCrsAreas 2005.xls

Alignment Efforts Curriculum

WIDS Course Examples
  • Information Security Principles
  • ITSEC-114.doc
  • Network Security
  • ITSEC-124.doc
  • Perimeter Security
  • ITSEC-145.doc

Implementation (Delivery)
Instructional delivery vision
  • Face-to-face traditional learning
  • On-line (distance learning)
  • On-site employee development
  • Technical assistance
  • Seminars, awareness workshops lifelong learning
    for IT and non-IT employees

Real Life Student 1
  • Age, 40 Female
  • Main Frame Programmer Web Site Administrator
    for a number of years
  • Laid off job hunting ready to leave IT for a
    more viable occupation
  • Last time in school was mid 1980s
  • I love this program and am so glad you talked me
    into it. Its the first time Ive ever taken
    time to look at the big picture. I cant wait to
    get a job in this field.

Real Life Student 2
  • Age, 30, Male learned everything he knows
    about IT on-the-job.
  • Local ISP Administrator for a number of years.
  • Last time in school was high school didnt like
    it that much.
  • Strong technical skills a quick study but
    often sees the answer as adding more technology.
  • Doesnt see the need for policies and procedures.
  • A classic practitioner in approach to problem

Serving distance education learners with limited
  • Blackboard?
  • WebCT?
  • Others?
  • IT infrastructure support?
  • College firewalls security?

Distance Learning via the Web
  • Powered by BlackBoard, Inc.
  • Hosted by Milwaukee Area Technical College.
  • Information Security Principles
  • 154-151
  • Disaster Recovery Planning
  • 154-155

Workforce Development
  • Short-course seminars (modules from credit
  • Week-long boot camps
  • Awareness seminars for all employees password
    protocols, basics on viruses, ethics, inside the
  • New hire training for your IT staff?
  • Specific Courses?
  • 12-course, 36-credit certificate?
  • 2-year AAS degree?

  • Program evaluation 3 years
  • Crucial Conversations
  • Lessons Learned
  • The Reflective Practitioner

Next Steps?
  • Plan
  • Do
  • Check
  • Act

Crucial BTC Conversations
  • Is the time right for expanding IT educational
  • So tell me again why do you want to bring viruses
    on the Colleges computers?
  • Arent you teaching hackers to be better hackers?
  • Will there be jobs at the end?
  • Its a great idea for the 4-year college

Key Points the Power of 2
  • We are one dean and one faculty member at a small
    school in central Wisconsin do not
    underestimate the power of 2.
  • It is more than simply computer security. Its
    more than network security. Its all about
    information security.
  • Technical competencies and security management
    oriented competencies are both part of our
    approach. Both in the computer lab make for
    terrific conversations! Integrating this is

Future Vision The Power of 2
  • AAS degree approved for next fall.
  • 22 partnerships for Baccalaureate degrees will
    better serve students the workforce.
  • Distance learning courses support an employed IT
  • Supporting the colleges IT infrastructure with
    advising and technical assistance. Our campus is
    more secure!
  • Better aligning our occupational outcomes with
    related certification programs getting students
    into testing such as the CISSP.
  • Center for Information Assurance?

Transitioning to an AAS
  • 21 credits of General Education
  • 6 credits of Elective courses
  • 42 credits of Program Requirements
  • 18 credits support
  • 34 credits of core
  • Work-based learning component
  • 68 total credits

Academic Partnerships
  • Milwaukee Area Technical Colleges AAS degree
  • University of Illinois, Center for Academic
    Excellence, Champaign
  • National Colloquium for Information Systems
    Security Education or CISSE (http//
  • Wisconsin Technical College System office,
    Madison, Wisconsin (
  • Worldwide Instructional Design Software
  • Franklin University ( pending a
    22 agreement for an online Bachelors degree.

Faculty Development
  • CISSE, June 2005 in Atlanta GA
  • NSA Centers of Academic Excellence
  • NSA Skill Standards 4011 4014 etc.
  • CISSPs 10 domains certification
  • Designing delivering distance learning
  • WIDS Curriculum Development software training

The Other Half of the Power of 2
  • Douglas A. Tabbutt
  • IT Instructor
  • Center for Information Assurance Education
  • Blackhawk Technical College
  • 6004 Prairie Road
  • Janesville, WI USA 53547

Wrap-up Next Steps Expanding The Power of 2
  • Summarize any actions from the audience as a
    result of this presentation?
  • Summarize any follow up action items required
    from Blackhawk Technical College?
  • See me during the conference if you want to talk

At Blackhawk Technical College, Janesville
  • Its about ?

Questions and Discussion