Program-Level Learning Outcomes

Program-Level Learning Outcomes

The program of study (PoS) of our CAE-CD is the Bachelor Degree in Information Technology (IT) with the Secure Computing and Networks (SCAN) Minor administered by the Department of Computer Science in the college of Engineering and Computer Science. There are overall 10 Program-Level Learning Outcomes for the program of study. Among them, 8 outcomes are for the BS in Information Technology and 2 outcomes are for the Secure Computing and Networks (SCAN) Minor. 

Program-Level Learning Outcomes (Bachelor of Science in Information Technology)

  1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Use systemic approaches to select, develop, apply, integrate, and administer secure computing technologies to accomplish user goals.
  7. Effectively integrate security standards and best practices into IT-based systems.
  8. Apply technical skills in a diverse IT landscape to recognize and mitigate the potential negative impacts created by the introduction of new IT-based solutions on individuals, communities, and society as a whole.

Program-Level Learning Outcomes (Secure Computing and Networks Minor)

  1. Understand security principles, their design, their components, the different aspects of their implementation and their critical role in accomplishing the security goals of an organization.
  2. Understand cryptographic technique and be able to implement and utilize various security techniques and tools in network-based and host-based cyber defense and operation.