Academic Program Review Cyber Security College of Southern Nevada 2017

Similar documents
Academic Program Review Networking College of Southern Nevada 2017

CTE Program Proposal. NAME OF COLLEGE: Bakersfield College. FACULTY CONTACT: Creighton Magers DATE: 11/19/2015

Developing Career-Relevant Academic Programs

Wyoming Community College Commission Request for New Pilot or Revised Degree or Certificate

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

Appendix D P a g e

INFORMATION TECHNOLOGY ADMINISTRATION INFORMATION TECHNOLOGY ANALYSIS INFORMATION TECHNOLOGY SUPPORT SPECIALIST INTERNET SERVICES TECHNOLOGY

Technical Certificate Approval/ Designation Form Template

Annual Program Assessment Review

CYBERSECURITY: Scholarship and Job Opportunities

Bachelor of Applied Science Degree IT NETWORKING

Networking Technology. Associate in Applied Science Networking Fundamentals Diploma Cisco Networking Certificate Network Security Certificate

Kutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in

Comprehensive Program Review Report

College Of. Technological Innovation

Bachelor Business Engineering Technology (Hons) in Networking System (BNS)

Collaboration on Cybersecurity program between California University and Shippensburg University

Digital Forensics. Graduate Certificate

Computer Information Technology

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM

Finding information about Credentials and in-demand Technology Skills. CareerOneStop Credentials Center and O*NET OnLine

Dual Credit. Earning college credit while in high school

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Computer Networking Technologies and Information Assurance & Cybersecurity

Secure Systems Administration and Engineering

COMPUTER AND INTERNETWORKING TECHNOLOGIES

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Guidelines for Texas Skill Standards Based Program Recognition

Restructuring IT Pathways to the Workforce: Ivy Tech s Computing and Informatics Programs

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Curriculum Certification Renewal Application Page 1 of 3

Certification. What: Who: Where:

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

The Process! Professional-Technical Certification For Faculty at Shoreline Community College

Carpentry. Program Name. Program CIP Code

Programs that Work. March 7,

Networking Technology

Secure Systems Administration and Engineering

Bismarck State College

Computer Support Technician

FORM 7: Certificate Approval and Modification

Program Approval Form

CENT - COMPUTING, ELECTRONICS, AND NETWORKING TECHNOLOGY

GRADUATE PROGRAMS IN ENTERPRISE AND CLOUD COMPUTING

The Cisco Networking Academy at Erie Community College

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

The Cisco Networking Academy at ECC Information Packet

CSI Program Action Plan Table (Department)

Health Education Community Health Education

CONSTRUCTION EDUCATION UPDATE MANAGEMENT OF CONSTRUCTION MONTGOMERY COLLEGE - ROCKVILLE, MD

Cyber Security Occupations. in San Diego County

Office Administration

Travis Doom, Associate Professor and Associate Chair, Computer Science & Engineering

COMPUTER INFORMATION SYSTEMS

INFORMATION TECHNOLOGY, BS

Knox Technical Center Certified Administrative Assistant 225 hours

Agenda item: (Board Office to complete) USF Board of Trustees October 7, 2010

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

This document supersedes Appendix C of GFC Document 877, Revised and Approved September 20, REVIEW OF CERTIFICATE PROGRAMS

Computer Network Engineering

Architectural Technology

COMPUTER INFORMATION SYSTEMS. Five Year INSTITUTIONAL REVIEW. By David McNair. May 15, 2009

X Prefix/suffix Course Learning Outcomes

Assessment Tool Benchmark Time Frame Person/Group Analysis Assessment Method Responsible

Frame for Evaluation. Spring Semester

PROGRAM REVIEW. Southern West Virginia Community and Technical College Information Technology, Associate in Applied Science.

Iowa Cyber Alliance Protecting the nation through cyber education Doug Jacobson Information Assurance Center Iowa State University

What can I do with a major in Computer Science?

Master degree program Technical legislation, standardization and quality management

Nuts and Bolts of the Career and Professional Education Act (CAPE)

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

DIABLO VALLEY COLLEGE CATALOG

Cisco Certified Entry Networking Technician (CCENT)

Faculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science

Information Systems and Tech (IST)

HOMELAND SECURITY PROGRAM PROSPECTUS. Associate of Science and Certificate of Achievement in Homeland Security

Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET

SOUTH DAKOTA BOARD OF REGENTS. Budget and Finance ******************************************************************************

Seneca. August 26,20II

This document supersedes Appendix C of GFC Document 877, Revised and Approved September 20, REVIEW OF CERTIFICATE PROGRAMS

I. General regulations

SECTION 4: OUTCOME MEASURE 6 Multiple Documents: Initial Level: TExES State Content Exam Data Chart

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

Department of Math, Science, and Technology. Oglala Lakota College. BS in Information Technology. Assessment Plan

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Appendix C P a g e

Computer Information Systems Technology (CIS)

CTE Updates COPYRIGHT 2016, TEXAS EDUCATION AGENCY J O H N E L L I S C T E E X A M R E I M B U R S E M E N T

STC Catalog & Handbook

Blending Information Systems Security and Forensics Curricula

Program Student Learning Outcomes (Fall 2014)

Computer Science & IT

School of Engineering & Computational Sciences

Associate in Science and Bachelor of Science in Information Technology

Career and Professional Education (CAPE) Act

Business Information Technology

Department of Business Information Technology

Knox Technical Center CNC Machinist Certification

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Transcription:

Academic Program Review Cyber Security College of Southern Nevada 2017

ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be provided by the person responsible for program assessment For each section below, please provide the requested information for the degree program under consideration. Program: _ Computing & Information Technology Cyber Security Program Department: _ Computing & Information Technology Program contact person: Department Chair: Margaret Taylor, CyberSecurity Program Director: Arthur Salmon Current Academic Year: (Please use your assessment data submitted most recently in October: results and analysis shown below should be that which was reported for the prior academic year, and outcomes, methods and improvement plan should be drawn from the current academic year assessment plan) MEASURABLE OUTCOMES Evaluate computer hardware and software. Develop organization security policies. Explain how to use networking tools and devices to detect and mitigate security attacks. Manage the security of a network system. Manage a networking project. METHODS FOR ASSESSING OUTCOMES Students build a computer and install software. Students also complete skill assessment lab. Students are required to develop security plans, the plans are assessed for completeness and appropriateness. Students are required to complete several skill based labs. Skills are assessed using both online and handson lab environments. Students are required to complete several skill based labs. Skills are assessed using both online and handson lab environments Students are required to complete a project plan and report in several classes. RESULTS AND ANALYSIS (based on current year assessment data; please also comment on results obtained based on outcomes designed and measured as a result of prior year findings): The measurements concluded that 27 30% of students did not achieve outcomes at an acceptable level. The previous year did not produce data as the measurement tasks were developed. IMPROVEMENT PLAN (please be specific and ensure that improvement plan is data driven): It was determined that the outcomes and assessment methodology would be reviewed by faculty and the Advisory Council. A committee was formed that included faculty and representatives from both the private and government sectors. The committee is scheduled to report there outcomes to the Advisory Council this semester.

ACADEMIC EVALUATION WORKSHEET: PROGRAM Date Submitted: Submitted by: Margaret Taylor PROG. CODE: See List 1 PROGRAM: _See List 1 DEPARTMENT: Computer & Information Technology (CIT) Data for Semester: _ Fall 2016_ ASSOC. PREFIX: _CF, CIT, CS, CSCO, IS PROGRAM Performance Indicators Data to be provided by Institutional Research & Chair/Program Dir/Lead Faculty DECLARED MAJORS ENROLLED Headcount (unduplicated) 419 SUPPLY AND DEMAND (Limited Entry Programs only) Is this a limited entry program? NO Students attempting to gain limited entry (unduplicated) IR does not provide this data. This data should be provided by the department or program where it is relevant. GRADUATES AND DEGREES/CERTIFICATES IN PRIOR GRADUATE YEAR (Aug, Dec, and May) Graduate Year: 2016 2017 Graduates* 15 Degrees/Certificates* 15 (total) Degrees: 15 Certificates: 0 If more than one program catalog code is included, IR will list each program separately. STUDENT SUCCESS Placement/transfer rates (where applicable) Licensure success rates (where applicable) IR does not provide this data. This data should be provided by the department or program where it is available HISTORICAL DATA PROGRAM Note 2 1 year change 3 year change Declared majors 31% 41% Graduates (prior grad year) 27% 80% Degrees/Certificates (prior yr) Degrees: 187% 60% Certificates: If more than one program catalog code is included, IR will list each program separately.

Notes and Comments: 1 This page combines all of the CIT Software Degrees listed below. All of these are different iterations of the same degree. Degree Code Degree Name CITCSDF CT Computing and Information Technology [Cyber Security Digital Forensics CITCSDFAAS Computing and Information Technology [Cyber Security Digital Forensics CITCSNAAS Computing and Information Technology [Cyber Security Network Security] CITCRIMAAS Computing and Information Technology [Electronic Crime Investigation] CITECI CT Computing and Information Technology [Electronic Crime Investigation] CITNESEAA Computing and Information Technology [Network Security] EENESECAAS Electronic Engineering Technology [Network Security] 2 Note: I do not have the actual declared majors for all three time periods. The numbers stated are Enrolled Majors as specified on the IR reports. There were 1,171 Cyber Security declared majors as of Fall 2017.

ADDITIONAL EVALUATION NARRATIVE QUESTIONS PROGRAM Date Submitted: Submitted by: _Margaret Taylor Data to be provided by Chair/Program Dir/Lead Faculty Please respond on this form or attach additional pages. Answer only questions that are relevant to this discipline. CORE MISSION: 1 How does this program relate to the Mission and Core Themes of the College? (See appendix) The Computing & Information Technology Cyber Security Program includes a Digital Forensics Certificate, Digital Forensics AAS degree, and Network Security AAS degree. The program prepares students to assist in providing support for information technology, cyber security, forensics, or data network technician. Curriculum covers Internet and Computer Forensics, Digital Crime Investigation, Advances Computer Forensics, Cisco Networking, Introduction to Programming, and Project Management. The Computing & Information Technology Cyber Security Program degrees prepares graduates as technicians and the certificate of achievement prepares students for entry level positions in Information Technology support. The Computing & Information Technology Cyber Security Program AAS graduates provides opportunities to pursue a four year degree and several institutions. This supports the mission of CSN and the School of Advanced and Applied Technologies to change lives by preparing students to obtain employment or to transfer to a four year program of student. 2 To the best of your knowledge, how and to what extent is this program essential because of state laws, regulations, outside agency regulations, Board of Regents or Legislative priorities? N/A 3 How and to what extent does this program relate to programs at other NSHE institutions (for example, overlapping programs, articulation or transfer relationships, etc.)? The Computing & Information Technology Cyber Security Program requires general education courses in Communication, English, History, Mathematics, and Science to complete the degree. Graduates with the AAS degree can pursue a bachelor s of applied science (BAS) degree in Engineering Technology Management Computer Information Option at Nevada State College or the new BAS degree in Project Management at CSN. 4 How and to what extent does this program relate to programs at non NSHE colleges in Southern Nevada? The Computing & Information Technology Cyber Security Program graduates are well positioned to pursue a bachelor s degree at several non NSHE colleges. Students learn a core of skills they can apply to the required general education courses across the academic spectrum. The technical courses may be applied to several degrees offered by non NSHE college programs. 5 How and to what extent does this program depend upon prerequisite courses from other disciplines at CSN? The Computing & Information Technology Cyber Security Program majority of prerequisite courses are in the areas of Communications, English, and Mathematics. 6 How and to what extent does this program utilize other college resources for academic support (for example, library, technology, counseling, disability resource center, tutoring, writing or math centers, etc.)? The Computing & Information Technology Cyber Security Program, like all other degree programs, depends upon college services such as the library, counseling, Disability Resource Center, Centers for Academic Success, and the writing and mathematics centers. All of the Computing and Information Technology courses depend upon the services provided by the Office of Technology Services at CSN. Many of these classes are offered in Distance Education and Hybrid format.

QUALITY: 7 Does this program have an advisory board, or does the department have an advisory board relevant to this program? Describe briefly. The Computing & Information Technology Department has a Cyber Security/Networking Advisory Board and a Software Advisory Board. Each of these entities meet a minimum of once each semester the combined group meets annually or more often as deemed appropriate by the Board Chairs. Currently the Cyber Security Advisory Board has created a sub committee to review all forensics course and degree outcomes with the intent of making recommendations to the department. 8 If this program has a specialized accreditation, is this accreditation necessary for alumni licensure or employability? The Computing & Information Technology Cyber Security Program designation as a Center of Academic Excellence Cyber Defense Education Two Year (CAE 2Y) is not necessary for students or alumni licensure or employability. However, many employers focus cyber security recruiting efforts at CAE designated colleges. 9 How and to what extent does this program contribute to CSN's regional or national reputation? The Computing & Information Technology Cyber Security Program designation as a Center of Academic Excellence Cyber Defense Education Two Year (CAE 2Y) has brought national attention to CSN. Our program is recognized as a college that introduces students to industry standards and state of the art cyber security techniques and methodologies. Students have access to classrooms that provide a hands on learning experience. Our students also compete at national cyber defense competitions. Competition experience is a leading factor for recruitment. DEMAND: 10 Describe the level and nature of external demand for this program (for example, occupational data, labor statistics, employer surveys, student surveys, etc.)? The current demand and projected demand for Cybersecurity/Information Security Analysts is expected to grow much faster than average. The anticipated growth percentages gets larger each year. The job outlook for 2016 2026 is currently 28%. With a projected annual median pay of $92,600 per year. Many local companies recruit CSN students for internships. Many students are offered full time employment before graduation. 11 Describe the level and nature of external financial or practical support for this program (for example, grants, donations, employer or clinical partnerships, etc.)? Over the past few years the Computing & Information Technology Cyber Security Program has received significant funding through Grants. Perkins Grants: part of $59,000 for this academic year Donations: Gifts of approximately $10,000 have been received this year CyberWatch West has provided assistance with several security activities Three Cyber Security students received a scholarship to attend the Community College Cybersecurity Education (3CS) Conference in Portland, OR this year 12 What other options exist for students in the region to earn this degree or certificate? There are several options for the Computing & Information Technology Cyber Security Program graduates have several options to continue their education. Students completing any of the Cyber Security Degrees are eligible to enter the BAS Engineering Technology Computer Information Emphasis Program at Nevada State College

(NSC). CSN and NSC have in place a 3+1 agreement. These student have complete the prerequisites for either the Networking Infrastructure Analyst or Virtualization Analyst tracks. Students are also prepared to enter CSN s new BAS Project Management program. There are also matriculation agreements that allow students to pursue a Bachelor s Degree at: o Capella University o Regis University o Southern Utah University o University of Phoenix o University of Maryland