Cyber Security, Minor
Student Learning Outcomes
- The ability to analyze, integrate and synthesize information and cyber security concepts.
- The ability to understand and utilize information. data into methodologies and frameworks to identify cyber security threats and exploits for analysis and resolution.
- The ability to understand appropriate application of cyber security defense (CD) tools, CD techniques, hardware/ software and I.T. safeguards to defend IS systems from cyber exploits, attacks.
- The ability to develop team skills to work effectively on CSU Pueblo cyber team field projects.
- The ability to communicate cyber security issues clearly, in writing and orally to an audience, particularly with regard to the technical analysis of cyber-threat issues, solutions and tactics.
- Understand the best application of Info Security Models, Cyber Sec Planning and Policies to analyze, integrate appropriate cyber security methodologies into viable solutions.
- As a team project members, the ability to develop and communicate Threat-Vulnerability-Asset (TVA) grids and IT solutions for cyber attack and vulnerability risk analysis.
- Demonstrate the ability to develop Disaster Recovery, Business Continuity and Risk Mitigation Strategies and solutions within financial, ethical and cyber Law boundaries.
Outcomes Assessment Activities
- The CIS program primarily uses a direct-assessment approach. Artifacts of student work pertinent to a particular learning outcome are collected. These artifacts are then evaluated by faculty external to the course in which the artifact was collected to determine students’ level of mastery. Each learning outcome has been separated into sub-skills, or “measurable objectives”, that are components of the overall learning objectives. Students’ level of mastery is assessed using rubrics which have been developed for this purpose. To ensure inter-rater reliability, we implement processes whereby raters meet before and after artifacts are assessed. In addition, for follow-up (loop-closing) activities on subsequent artifact evaluation, the same raters are utilized, when possible, for consistency and reliability.
- The CIS program meets annually with the CIS Industrial Advisory Committee to get feedback on the effectiveness of the CIS curriculum in meeting the needs of the IT industry along the Colorado Front Range. The CIS program also requires CIS graduates to complete a survey to determine the effectiveness of the program and curriculum in preparing them for jobs in IT.
Specific Program Requirements
Course | Title | Credits |
---|---|---|
CIS 120 | Introduction to Programming with Python | 3-4 |
or CIS 171 | Introduction to Java Programming | |
CIS 210 | Introduction to Cyber Security | 3 |
CIS 250 | Introduction to Business Analytics | 3 |
CIS 289 | Network Concepts | 3 |
CIS 315 | Linux Fundamentals | 3 |
CIS 460 | Cyber Security & Defense | 3 |
CIS 461 | IT Security Risk Management | 3 |
CIS 462 | Computer Forensics | 3 |
Total Credits | 24-25 |