Programs Outcomes |
Courses | KU Alignment | |
---|---|---|---|
PLO-1 | Prepare students with the cybersecurity principles, technical knowledge, and skills needed to protect data, computer systems, and networks. | CIS 430, CIS 330, CIS 150 | 2-F, 5-TC, 21-O, 8-TC, 22-O |
PLO-2 | Prepare students with the cybersecurity principles, technical knowledge, and skills needed to protect data, computer systems, and networks. | CIS 430, CIS 330, CIS 300 | 1-F, 7-TC, 13-O, 11-NTC |
PLO-3 | Describe and apply appropriate ethical, security implications, and moral standards to modern computing environments and understand cybersecurity terminology | CIS 330, CIS 371, CIS 475 | 3-F, 16-O & 20-O |
PLO-4 | Analyze and evaluate systems with respect to maintaining operations in the presence of risks and threats. | CIS 300, CIS 150 | 9-NTC, 10-NTC |
PLO-5 | Identify and use appropriate resources to stay abreast of the latest industry development tools, cryptographic systems elements, cyberspace activities, and techniques to reduce the cybersecurity risk by exhibit best practices or research findings. | CIS 430, CIS 300, CIS 371, CIS 475 | 4-T, 1-F, 16-O, 20-O |
PLO-6 | Determine appropriate data models to design database applications to enforce information integrity, security, and confidentiality by using SQL and Design principles. | CIS 412, CIS 410 | 17-O, 18-O |
PLO-7 | Describe the fundamental problem-solving techniques and overview of a scripting language to automate the administrative task and create an appropriate solution within the context of cybersecurity. | CIS 250, CIS 150 | 6-TC |
PLO-8 | Compare and contrast information security /assurance to deals with social, political, legal, and ethical issues within the organization and protect organization data. | CIS 300 | 10-NTC, 19-O |
PLO-9 | Evaluate network security solutions/Internet crimes/ or cloud computing methodology to prevent and detect intrusions. | CIS 300 | 12-NTC |
PLO-10 | Discuss and evaluate network security solutions, Internet crimes, and cloud computing methodology to ensure security for their employees, customers, and asset. | CIS 371, CIS 475, CIS 302 | 15-O, 14-O |