Nov 23, 2024  
2022-2023 General Catalog 
    
2022-2023 General Catalog [ARCHIVED CATALOG–FOR INFORMATION ONLY]

Program Learning Outcomes: Cybersecurity/Cyber Security and Information Assurance


Cybersecurity (BS)

  • Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • Apply security principles and practices to maintain operations in the presence of risks and threats.

Cybersecurity (Minor)

  • Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • Apply security principles and practices to maintain operations in the presence of risks and threats.

Cybersecurity Essentials (Certificate)

  • Apply security principles and practices to maintain operations in the presence of risks and threats.

Cyber Security and Information Assurance (MS)

  • Explore security risks, threats, and vulnerabilities while designing and building working solutions to protect the computing assets of an organization.
  • Develop, apply, and institutionalize risk management practices and assessment from cyber security perspective.
  • Examine, analyze and interpret legal & ethical aspects from cyber security perspectives.
  • Explore the role information assurance plays in cyber security, particularly in the development and deployment of frameworks and how one must account for this in security planning.
  • Design and implement technical solutions to secure systems.