{"id":37909,"date":"2024-11-21T17:44:16","date_gmt":"2024-11-21T22:44:16","guid":{"rendered":"https:\/\/cas.umw.edu\/computerscience\/?page_id=37909"},"modified":"2024-11-21T18:00:45","modified_gmt":"2024-11-21T23:00:45","slug":"student-learning-outcomes-for-cybersecurity-majors","status":"publish","type":"page","link":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/","title":{"rendered":"Student Learning Outcomes for Cybersecurity Majors"},"content":{"rendered":"\n<ol class=\"wp-block-list\">\n<li>Students will be able to solve computational problems using algorithms and data structures.<\/li>\n\n\n\n<li>Students will be able to successfully use industry-standard programming environments in developing applications.<\/li>\n\n\n\n<li>Students will be able to analyze, design, implement, and document computer-based systems that satisfy specifications. \u00a0<\/li>\n\n\n\n<li>Students will be able to analyze and compare alternative solutions to problems and systems.<\/li>\n\n\n\n<li>Students will be able to capture, digitize, represent, organize, and transform data such that it can be used efficiently in computations. \u00a0<\/li>\n\n\n\n<li>Students will be able to work effectively on a team to develop quality software and systems. \u00a0<\/li>\n\n\n\n<li>Students will be able to communicate effectively in both writing and speaking in a professional context.<\/li>\n\n\n\n<li>Students will be able to recognize and apply the social, ethical, and security responsibilities of computer scientists.<\/li>\n\n\n\n<li>Students will understand that continuous learning is fundamental for computer scientists and articulate the learning strategies that are most effective for them.<\/li>\n\n\n\n<li>Students will articulate their interests, skills, and strengths related to their professional identities.<\/li>\n\n\n\n<li>Students will be able to understand and apply the fundamentals of cryptography, data security, and data privacy. \u00a0<\/li>\n\n\n\n<li>Students will be able to understand the underlying technology of and apply industry standards to secure computer systems and networks. \u00a0<\/li>\n\n\n\n<li>Students will be able to assess the current threat environment to information systems and identify the appropriate security mechanisms to counter these threats. \u00a0<\/li>\n\n\n\n<li>Students will be able to protect information systems and attest to the assurance of the past and current state of processes and data.<\/li>\n\n\n\n<li>Students will be able to recognize and apply the security and legal responsibilities of computer scientists.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"mailto:xwu@umw.edu\">For More Information<div class='arrow'><\/div><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":29245,"featured_media":0,"parent":37899,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"umw_cb_additional_links":[[]],"jetpack_post_was_ever_published":false,"_advisory_expires_time":"","_advisory_meta_include":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":{"0":"post-37909","1":"page","2":"type-page","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Student Learning Outcomes for Cybersecurity Majors - Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Student Learning Outcomes for Cybersecurity Majors\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T23:00:45+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/\",\"url\":\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/\",\"name\":\"Student Learning Outcomes for Cybersecurity Majors - Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/cas.umw.edu\/computerscience\/#website\"},\"datePublished\":\"2024-11-21T22:44:16+00:00\",\"dateModified\":\"2024-11-21T23:00:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Department of Computer Science\",\"item\":\"https:\/\/cas.umw.edu\/computerscience\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Institute for Cybersecurity\",\"item\":\"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Student Learning Outcomes for Cybersecurity Majors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cas.umw.edu\/computerscience\/#website\",\"url\":\"https:\/\/cas.umw.edu\/computerscience\/\",\"name\":\"Computer Science\",\"description\":\"Computer Science at Mary Washington\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cas.umw.edu\/computerscience\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Student Learning Outcomes for Cybersecurity Majors - Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/","og_locale":"en_US","og_type":"article","og_title":"Student Learning Outcomes for Cybersecurity Majors","og_url":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/","og_site_name":"Computer Science","article_modified_time":"2024-11-21T23:00:45+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/","url":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/","name":"Student Learning Outcomes for Cybersecurity Majors - Computer Science","isPartOf":{"@id":"https:\/\/cas.umw.edu\/computerscience\/#website"},"datePublished":"2024-11-21T22:44:16+00:00","dateModified":"2024-11-21T23:00:45+00:00","breadcrumb":{"@id":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/student-learning-outcomes-for-cybersecurity-majors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Department of Computer Science","item":"https:\/\/cas.umw.edu\/computerscience\/"},{"@type":"ListItem","position":2,"name":"Institute for Cybersecurity","item":"https:\/\/cas.umw.edu\/computerscience\/institute-for-cyber-security\/"},{"@type":"ListItem","position":3,"name":"Student Learning Outcomes for Cybersecurity Majors"}]},{"@type":"WebSite","@id":"https:\/\/cas.umw.edu\/computerscience\/#website","url":"https:\/\/cas.umw.edu\/computerscience\/","name":"Computer Science","description":"Computer Science at Mary Washington","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cas.umw.edu\/computerscience\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P2yvY2-9Rr","_links":{"self":[{"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/pages\/37909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/users\/29245"}],"replies":[{"embeddable":true,"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/comments?post=37909"}],"version-history":[{"count":0,"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/pages\/37909\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/pages\/37899"}],"wp:attachment":[{"href":"https:\/\/cas.umw.edu\/computerscience\/wp-json\/wp\/v2\/media?parent=37909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}