Cybersecurity

TED WENDT, PH.D., MATHEMATICS, ENGINEERING, COMPUTER SCIENCE, AND PHYSICS, DEPT. CHAIR

SHAUN E. SCOTT, ED.D.

NATHAN WILLIAMS, B.S.

DIANE BURKE, M.Ed, M.S.

 

The Cybersecurity degree option is recommended for those who intend to pursue graduate studies in computer science, or with to obtain employment in the cybersecurity field. This program equips individuals with the knowledge and skills to protect computer systems, networks, and data from cyber threats. The Cybersecurity program will focus on topics like network security, cryptography, risk management, incident response, and secure software development as well as certification preparation. Students also learn to identify vulnerabilities, assess risks, and implement security measures to safeguard information.

Student Learning Outcomes:

Cybersecurity

At the completion of the Cybersecurity program, students will:

  • Design and implement comprehensive cybersecurity strategies and controls, applying industry-standard frameworks for threat detection to safeguard data and systems against cyberattacks.
  •  Formulate and enforce cybersecurity policies and incident response procedures that comply with legal and regulatory requirements, while upholding ethical and professional standards to protect individual rights and privacy.
  • Investigate cybersecurity incidents using digital forensic techniques and execute effective incident response and recovery plans to minimize the impact of security breaches.
  • Apply ethical hacking methodologies using industry-standard tools to identify and address vulnerabilities in networks and systems.
  • Implement continuous monitoring systems to detect and respond to emerging cyber threats and vulnerabilities, including specialized strategies for securing mobile and cloud environments.
  • Demonstrate comprehensive knowledge of cybersecurity theory, systems, and applications by integrating foundational principles with current industry practices.
  • Employ strong analytical, critical thinking and problem-solving skills to address complex cybersecurity challenges by formulating clear problem statements and developing effective algorithmic solutions that mitigate risks and achieve organizational goals.
  • Demonstrate an ability to communicate effectively with a range of stakeholders (i.e. coders, end users, data entry, management, vendors, etc.).
  • Conduct industry-relevant cybersecurity research, synthesize findings, and communicate evidence-based solutions effectively to both technical and non-technical stakeholders.