Program Educational Objectives
Program educational objectives are based on the needs of the computer science program’s constituencies. Within a few years of graduation, the computer science program will enable students to attain the following:
- An ability to be competitively employable within the field of computer science and cybersecurity.
- An ability to pursue graduate level education in the field of computer science and cybersecurity.
- Graduates function on professional teams and communicate effectively with speaking and writing.
- Graduates respect professional and ethical issues as well as a commitment to quality and dependability.
- Graduates remain current, professionally.
- Graduates protect society, the common good, necessary public trust and confidence, and the infrastructure.
- Graduates advance and protect the profession.
Student Outcomes
1. Students possess an ability to apply knowledge of computing and cybersecurity appropriate to the discipline.
2. Students possess an ability to analyze a problem and identify and define the computer and cybersecurity requirements appropriate to its resolution.
3. Students possess an ability to function effectively on teams to accomplish a common goal.
4. Students possess an understanding of professional, ethical, legal, security and social issues and responsibilities.
5. Students possess an ability to communicate effectively with a range of audiences.
6. Students possess an ability to analyze the local and global impact of computing and cybersecurity on individuals, organizations, and society.
7. Students demonstrate an understanding of the need for and an ability to engage in self-directed continuing professional development.
8. Students possess an ability to use current techniques, skills, and tools necessary for computing and cybersecurity practice.
9. Students possess an ability to analyze a problem and identify and define the security risks and requirements appropriate to its solution.
10. Students possess an ability to demonstrate comprehension of the tradeoffs involved in the application of cybersecurity.
11. Students possess an ability to gather evidence and plan an appropriate response to a cybersecurity attack on a system or organization.