CIS Graduate

Student Learning Outcomes for the Master’s in Computer Science

The Master’s in Computer Science program enables students to attain, by the time of graduation:

  1. Broad knowledge of Computer Science which includes computer programming skills, data structures, computer organization, operating systems, algorithm design, and automata theory.

  2. Depth of knowledge in at least one area of specialization within Computer Science. These areas include, but may not be limited to: software and algorithms, computer networking, data analytics, and cybersecurity.

  3. An ability to recognize, design and implement efficient software solutions to problems.

  4. An ability to demonstrate understanding of published technical literature and communicate effectively in oral and written manner.

  5. An ability to work effectively in teams to accomplish a common goal.

  6. An understanding of professional, ethical, security, and social issues and responsibilities.

  7. Preparedness to obtain employment, advance one’s career, or move on to more advanced graduate study in computer science or related fields.

Student Learning Outcomes for the Master’s in Cybersecurity

The Master’s in Cybersecurity program enables students to attain, by the time of graduation:

  1. An ability to detect, analyze and respond to cyber-attacks in computer and network systems.

  2. An ability to compare and contrast the legal and ethical aspects of cybersecurity at the State, Federal, and International level.

  3. An ability to effectively integrate the acquired knowledge in cybersecurity to propose solutions for real world problems.

  4. An ability to collect, investigate and process digital evidence established at a crime scene for effective recovery of information.

  5. An ability to examine the legal, social, regulatory, ethical, and technical issues related to securing information systems and critical infrastructures.

  6. An ability to continuously monitor, maintain, and enhance the protection of e-based systems through widely accepted standards, procedures and policies.

  7. An ability to conduct risk and vulnerability assessments of existing and proposed ICT (Information and Communication Technology) systems.

  8. An ability to communicate effectively both in written and oral form.

  9. An ability to function effectively on teams to achieve a common goal.