ABCDEFGHIJKLMNOPQRSTUVWXYZAAABACADAEAFAG
1
Required Program Courses
2
OutcomesCSIA 105CSIA 106CSIA 135CSIA 210CSIA 215CSIA 225CSIA 235CSIA 260INFM 109NETI 105NETI 114/ NETI 116/ SVAD 117NETI 115SVAD 111ITSP 135ITSP 136IVYT 115SDEV 120CPIN 269CPIN 279Assessment
3
Demonstrate proficiency in the use of scripting languages to write simple scripts including simple linear and looping scripts. (CT DF, CT NP, CT NS, TC, AAS)FALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSETRUEFALSEFALSEFALSETRUEFALSEFALSEprojects, assignments
4
Write simple and compound conditions within a programming language or similar environment. (CT DF, CT NP, CT NS, TC, AAS)FALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEFALSEprojects, assignments
5
Identify the bad actors/entities in cyberspace, compare and contrast their resources, capabilities/techniques, motivations, and aversion to risk. (CT DF, CT NP, CT NS, TC, AAS, AS)TRUETRUEFALSEFALSEFALSETRUEFALSEFALSETRUETRUEFALSEFALSETRUETRUEFALSEFALSETRUEFALSEFALSEdiscussion, quizzes, exams, assignments
6
Simulate different types of attacks and their characteristics. (CT DF, CT NP, CT NS, TC, AAS)TRUEFALSEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignments, projects, discussions
7
List the first principles of security and describe why each principle is important to security and how it enables the development of security mechanisms that can implement desired security policies. (CT DF, CT NP, CT NS, TC, AAS, AS)TRUETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions
8
Illustrate basic security design fundamentals that help create systems that are worthy of being trusted. (CT DF, CT NP, CT NS, TC, AAS, AS)TRUETRUEFALSEFALSETRUEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSETRUEFALSEFALSETRUEFALSEFALSEassignment, quizzes, discussions, projects
9
Describe potential system attacks and the actors/entities that might perform them and choose the appropriate cyber defense tools, methods and components to demonstrate cyber defense methods to prepare a system to repel attacks and deploy appropriate measures in the event of a system breach. (CT DF, CT NP, CT NS, TC, AAS)TRUETRUEFALSETRUETRUETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions, projects
10
Demonstrate the fundamental concepts of information assurance/cyber defense that can be used to provide system security. (CT DF, CT NP, CT NS, TC, AS)TRUETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions, projects
11
Construct the architecture of a typical, complex system and identify significant vulnerabilities, risks, and points at which specific security technologies/methods should be employed. (CT DF, CT NP, CT NS, TC, AAS)FALSEFALSEFALSETRUETRUEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions, projects
12
Describe strengths and weaknesses, modes, and issues that have to be addressed in an implementation and describe how cryptography can be used. (CT DF, CT NP, CT NS, TC, AAS, AS)TRUETRUETRUEFALSEFALSETRUETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions, projects
13
Use the hardware components of modern computing environments and their individual functions. (CT DF, CT NP, CT NS, TC, AAS, AS)TRUETRUETRUETRUETRUETRUETRUETRUEFALSETRUETRUETRUETRUETRUETRUETRUEFALSEFALSEFALSEassignment, quizzes, discussions, projects
14
Describe and apply the fundamental and higher concepts, technologies, components and issues related to communications and data networks. (CT DF, CT NP, CT NS, TC, AAS, AS)FALSEFALSEFALSETRUETRUETRUEFALSEFALSEFALSETRUETRUETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions, projects
15
List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data. (CT DF, CT NP, CT NS, TC, AAS, AS)TRUETRUETRUEFALSEFALSEFALSETRUETRUEFALSEFALSEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions, projects
16
Describe the responsibilities related to the handling of information about vulnerabilities and how the type of legal dispute including civil, criminal, and private affects the evidence used to resolve industry-wide issues. (CT DF, CT NP, CT NS, TC, AAS)TRUETRUETRUEFALSEFALSEFALSETRUETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignment, quizzes, discussions, projects
17
Understand the detailed methodological approach to computer forensics and evidence analysis. (CT DF, CT NP, AAS)FALSEFALSETRUEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignments, quizzes, discussions
18
Understand federal, state, and local cyber defense partners/structure. (CT DF, CT NP, CT NS, TC, AAS, AS)FALSEFALSETRUEFALSEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignments, quizzes, discussions
19
Apply ethical reasoning (CT DF, AAS)FALSEFALSETRUEFALSEFALSETRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEFALSEassignments, quizzes, discussions
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100