Program Educational Objectives
- Contributing to the work force in their specialty such as but not limited to computer forensics, mobile security, network security, software security, database security, or information security.
- Advancing their careers via continuous learning and professional development through the attainment of professional certification, professional study and research or graduate education.
- Assuming positions of leadership within their organization.
- Contributing to economic development and society through the prevention and detection of cyber threats in the computer-based information systems for business, government, and other organizations.
- An ability to design, implement and evaluate a computer-based information system, process, component, or program to meet desired business or organizational specifications
- An ability to apply knowledge of information systems, programming and mathematics appropriate to the disciplinei??
- An ability to demonstrate sufficient background knowledge in Operating Systems, Networking, Data Communication, Database Technology, Information Systems Planning, and Project Management
- An ability to analyze an information systems problem, define performance specifications to solve the problem and identify feasible solutions while recognizing the local and global impact of computing on individuals, organizations and society
- An ability to function effectively on teams and to be able to communicate effectively with a range of audiences
- An ability to use current techniques, skills, and tools necessary for information systems practices by recognizing the need for, and the ability to engage in, continuing professional development
- An ability to understand professional, ethical, legal, security and social issues and responsibilities
- An ability to demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence.
- An ability to properly report the findings of a cyber forensic investigation in both written form (using proper grammar, writing style, and citation) and in oral form (i.e., within the context of a trial, hearing, or deposition).
- An ability to Identify and analyze legal issues within technology, such as: on-line contracts, computer crime, fraud, privacy, defamation, hate speech, indecency, obscenity, cyber- squatting, and intellectual property.
- An ability to demonstrate various techniques for preventing unauthorized attacks to computer networks and apply measures for minimizing the damage caused by network intruders.
- An ability to evaluate and implement the needed information security controls for any information system and to provide an assurance framework where the security processes or controls, or both, are embedded in information systems technologies.
- An ability to evaluate and implement an I/T Governance Framework Taxonomy such as COBIT (Control Objectives for Information and Related Technology) to provide the student with an integrated theoretical and practical perspective of technology and information systems governance, control and assurance.
- An ability to examine the contents of mobile devices such as a cell phone, smart phone or GPS, and also be able to determine the necessary protocols which are necessary to handle external media and devices that may have connected with handheld devices.
Enrollment and Graduation Data
Spring Term Enrollment:
2012: 48 Students Enrolled; 1 Graduate
2013: 100 Students Enrolled; 11 Graduates
2014: 137 Students Enrolled; 22 Graduates
2015: 144 Students Enrolled; 23 Graduates