College of Engineering, Informatics, and Applied Sciences2021-2022

School of Informatics, Computing and Cyber Systems

Cybersecurity, Bachelor of Science

Learning Outcomes

Purpose Statement

Computing has become integral to the infrastructure of modern society.  From banking and health to education and business, our world runs on algorithms and computing machines.  Software and hardware are ubiquitous in every aspect of modern life.  This infrastructure is powerful, complex—and highly vulnerable. Small design flaws or less than vigilant safety guards can lead to attacks and exploits that can cost businesses hundreds of billions of dollars and valuable consumer trust, and loss of infrastructure critical to modern civilization.  At the same time there is a shortage of workers with the skills needed to secure these systems.

The BSCYB degree provides exceptional career flexibility and a broad range of opportunities in cybersecurity with an emphasis on secure software and hardware development. Coursework prepares students with the technical skills to analyze and understand cybersecurity exploits and to design hardened computational systems.  The degree also incorporates criminal justice, intelligence studies, and business management coursework to prepare students for the legal and social context in which cybersecurity practice happens.  This degree also provides a strong foundation for further graduate study in an MS or PhD program.

Student Learning Outcomes

  1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Apply security principles and practices to maintain operations in the presence of risks and threats.

Go to mobile site