Program Coordinator: Alice Fischer, Ph.D.
The bachelor's degree program in Computer Science with a concentration in Cybersecurity is nationally accredited by the Computing Accreditation Commission of the Accreditation Board for Engineering and Technology (CAC/ABET). Its objectives are to inform, challenge, and train our diverse student body for a constantly changing world of technology. This program develops a solid body of knowledge and understanding of computer hardware, software, and theory, as defined by the Association for Computing Machinery (ACM) curriculum guidelines. The concentration in cybersecurity embodies part of the NSA Cyber Operations requirements.
Students enrolled in this concentration will enter the cybersecurity workforce as cybersecurity analysts, engineers, offensive security specialists, responders, and investigators, depending on their course choices.
At the time of graduation, every student should have achieved the following program outcomes:
• An ability to apply knowledge of computing and mathematics appropriate to computer science.
• An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution.
• An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs.
• An ability to function effectively on teams to accomplish a common goal.
• An understanding of professional, ethical, legal, security, and social issues and responsibilities.
• An ability to communicate effectively with a range of audiences.
• An ability to analyze the local and global impact of computing on individuals, organizations, and society.
• Recognition of the need for and an ability to engage in continuing professional development.
• An ability to use current techniques, skills, and tools necessary for computing practice.
• An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer-based systems in a way that demonstrates comprehension in the tradeoffs involved in design choices.
• An ability to apply design and development principles in the construction of software systems of varying complexity.
The ability to investigate, protect and test the security of systems.
The program consists of a required core that exposes students to a wide range of computing and technology topics, including the study of databases, hardware, networks, programming, software design, and security. Advanced courses and the senior design project are selected from either cyber forensics, or cybersecurity.
Typical initial job titles include applications developer, software engineer, digital forensic examiner, cybersecurity analyst, or security engineer. Later titles might be system analyst, team leader, software consultant, or system administrator.
Internship Requirement
An internship enriches the academic experience of the student, providing exposure to a working computing environment and the interpersonal relationships of a workplace. Each internship is a partnership between the student and an employer or organization, with oversight by the academic advisor. Students must complete 60 credits toward the bachelor's degree before an internship is attempted. To complete the internship, a student must perform at least 200 hours of relevant work related to security, submit an essay about the experience, and submit evaluations completed by both the student and the work supervisor. The internship requirement may be satisfied through employment, community service, or some other activity that is approved by the student's advisor.
UPE Honor Society
The university has a chapter of the national honor society for computer science, Upsilon Pi Epsilon. Outstanding juniors and seniors are invited by the chapter to join this organization and participate in its service projects.