Select Page

Program Educational Objectives and Student Learning Objectives

Jump to: Program Educational Objectives  |  Student Learning Outcomes


Program Educational Objectives

B.S. in Computer Science with Concentration in General Computer Science

ABET PEO 1. Our graduates will be productive professionals in the computing field.
ABET PEO 2. Our graduates will develop professionally through continued formal education and/or professional activities.
ABET PEO 3. Our graduates will demonstrate leadership skills at work.
ABET PEO 4. Our graduates will contribute to community as computing professionals.

B.S. in Digital Forensics and Cybersecurity

FEPAC PEO 1. Our graduates will be productive professionals in the digital forensics and cybersecurity fields.
FEPAC PEO 2. Our graduates will develop professionally through continued formal education and/or professional activities.
FEPAC PEO 3. Our graduates will demonstrate leadership skills at work.
FEPAC PEO 4. Our graduates will contribute to community as digital forensic and cybersecurity professionals.

(top)

Student Learning Outcomes

B.S. in Computer Science with Concentration in General Computer Science (from ABET)

  1.  Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3.  Communicate effectively in a variety of professional contexts.
  4.  Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5.  Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Apply computer science theory and software development fundamentals to produce computing-based solutions. [CS]

(top)

B.S. in Digital Forensics and Cybersecurity

By the time of graduation, students will be able to:

  1. Understand programming and computing hardware and software systems.
  2. Design, implement and secure a computing network or data system.
  3. Set up systems and policies for cybersecurity incident response.
  4. Detect, identify and document the security breaches of a computing network or data system.
  5. Contain the harm or damage caused by security breach to a computing network or data system, eradicate the intrusion, and recover or restore the system to its original state.
  6. Work collaboratively and effectively with team members, law enforcement, and related personnel for cybersecurity incident response or to accomplish a digital forensic investigation.
  7. Conduct digital forensic investigations that conform to accepted professional and ethical standards.
  8. Apply appropriate laws, regulations and procedures to handle digital evidence in a digital forensic investigation.
  9. Identify potential digital evidence, and necessary techniques, skills, and tools needed for preserving and collecting the evidence.
  10. Use current techniques, skills, and tools necessary for digital evidence analysis.
  11. Present digital evidence in a professional and legal environment.

(top)