Student Learning Outcomes

Learning outcomes for the Information Technology undergraduate program

  • Graduates will demonstrate the ability to communicate effectively both orally and in writing.
  • Graduates will demonstrate knowledge of the legal and ethical environment impacting business organizations and exhibit an understanding and appreciate of the ethical implications of decisions.
  • Graduates will demonstrate an understanding of and appreciate for the importance of the impact of globalization and diversity in modern organizations.
  • Graduates will demonstrate an ability to engage in critical thinking by analyzing situations and constructing and selecting viable solutions to solve problems.
  • Graduates will demonstrate an ability to work effectively with others.
  • Graduates will demonstrate knowledge of current information, theories and models, and techniques and practices in all of the major business disciplines including the general areas of Accounting and Finance, Information Technologies, Management, Marketing, and Quantitative Analysis.

Learning outcomes for the Information Technology - Cybersecurity undergraduate program

  • Security Foundations – Students will demonstrate knowledge of the foundational aspects of cybersecurity. 

  • Web Applications Students will demonstrate knowledge of current theory and techniques for securing web applications.
  • Legal IssuesStudents will demonstrate understanding of legal issues at the federal, state, and international levels.
  • Forensic AnalysisStudents will demonstrate knowledge of prescribed practices involved in forensic analysis of digital assets following an information security breach.
  • IT Infrastructure – Students will demonstrate knowledge of current theory and techniques for securing enterprise IT infrastructure.

Information Technology - Cybersecurity undergraduate program Course Level Learning Goals

📘 ITC 235 – Computer Hardware and Operating Systems   

LG: Identify and explain core components of modern computer systems, and install, configure, and troubleshoot operating systems (e.g., Windows, Linux) and apply basic system administration tasks. 

 

📘 ITC 260 – Programming Logic and Design for Business 

LG: Develop structured algorithms using programming logic constructs such as sequence, selection, and iteration. 

 

📘 ITC 295 – Database Management Systems Concepts and Design 

LG: Design normalized relational database schemas and create and manage database queries, reports, and constraints to support business decision-making and data integrity. 

 

📘 ITC 388 – Information Systems Analysis and Design 

LG: Apply systems development life cycle (SDLC) methods to analyze, model, and design business information systems and create system documentation. 

 

📘 ITC 330 – Introduction to Networking 

LG: Describe the fundamental components and functions of computer networks, including the OSI and TCP/IP models,  and configure and troubleshoot basic network devices 

 

📘 ITC 430 – Advanced Networking 

LG: Design and implement complex network architectures incorporating VLANs, routing protocols, and access control measures, and analyze network performance and security through monitoring tools, packet inspection, and policy-based management. 

 

📘 ITC 360 - Fundamentals of Cybersecurity 

LG: Security Foundations – Students will demonstrate knowledge of the foundational aspects of cybersecurity. 

 

📘 ITC 566 - Web Application Security 

LG: Web Applications – Students will demonstrate knowledge of current theory and techniques for securing web applications 

 

📘 ITC 564 - Introduction to Ethical Hacking 

LG: Legal Issues – Students will demonstrate understanding of legal issues at the federal, state, and international levels. 

 

📘 ITC 565 - Computer Forensics 

LG: Forensic Analysis – Students will demonstrate knowledge of prescribed practices involved in forensic analysis of digital assets following an information security breach. 

 

📘 ITC 563 - Introduction to Network Security 

LG: IT Infrastructures – Students will demonstrate knowledge of current theory and techniques for securing enterprise IT infrastructure