Bachelor of Science in Cybersecurity

Education Delivery method:

  1. Classroom sessions online
  2. Simulated laboratory sessions online
The program will utilize both trainer-led videos and instructor-led.
Trainer-led video or machine tutoring system will facilitate robust learning for long-term retention, fact transfer, and future references.
Instructor-led in a live virtual classroom setting (synchronous or asynchronous ) will ensure quality discourse and learning outcomes.
Other methods will be employed based on the curriculum and dynamic experiences in the cohorts. This will address the classic example-problem dimension of the assistance dilemma when individuals learn. GAU will use several instructional strategies: examples only, examples-problems, and problems only to bring student cybersecurity knowledge, skill, and abilities to the desired or higher potential level of awareness and capability.

Curriculum

Program Learning Outcome

The curriculum is influenced by the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework and the Chartered Institute of Information Security’s knowledge, skills, and roles frameworks. NICE has a broader influence on developing requisite knowledge, skills, and abilities (KSA) characteristic of a student on the pathway to a bachelor’s degree. The introductory courses will prepare students with the foundational awareness benchmarked with the Common Body of Knowledge and industry certification bodies that attest to CompTIA Security Plus and (ISC)2 Systems Security Certified professional.
The curriculum will also benchmark accreditation agencies and accredited institutions such as the Center of Academic Excellence in Cyber Defense (CD) and follow the checklist specified by the National Centers of Academic Excellence in Cybersecurity (NCAE-C).

The nature of the work, and consequently, the workforce, can be described using the building blocks presented in the following sections.
These building blocks incorporate the following attributes:
  • Agility—People, processes, and technology mature and must adapt to change. Therefore, the NICE Framework enables organizations to keep pace with a constantly evolving ecosystem.
  • Flexibility—While every organization faces similar challenges, there is no one-size-fits-all solution to those common challenges. Therefore, the NICE Framework enables organizations to account for the organization’s unique operating context.
  • Interoperability—While every solution to common challenges is unique, those solutions must agree upon consistent use of terms. Therefore, the NICE Framework enables organizations to exchange workforce information using a common language.
  • Modularity—While cybersecurity risk remains the basis of this document, there are other risks that organizations must manage within the enterprise. Therefore, the NICE Framework enables organizations to communicate about other types of workforces within an enterprise and across organizations or sectors (e.g., privacy, risk management, software engineering/development).
The NICE Framework is comprised of seven categories:
  1. Analysis
  2. Collect and Operate
  3. Investigate
  4. Operate and Maintain
  5. Oversee and Govern
  6. Protect and Defend
  7. Security Provision
Program Learning Outcome
Program Outline General Education Courses
Program Learning Outcome

Assessment and Evaluation

Assessment
Georgetown American University utilizes direct assessment methods in two formats, formative and summative.

Formative Assessment methods
  • Quizzes – may be used as a formative assessment for students during their course delivery
  • Midterm Feedback – this is a mandatory procedure across all schools at Georgetown American University. At the mid of each term or block, the faculty will assess students using a standardized form accessible on the management system. The mid-term review serves as a feedback mechanism to inform students of their strengths and/or weaknesses during the first half of the term and to provide recommendations for improvements.
Summative Assessment methods
  • Quizzes – standardized quizzes are used as a summative assessment during course delivery and will often be given at the end of the week. The quizzes will be delivered using the Examsoft platform.
  • Standardized examinations – standardized examinations
Evaluation
GAU will use test-based surveys, questionnaires to collect knowledge and skills data across the cohorts. The questionnaire tool evaluates standards such as the NICE Framework and UK Cyber Security Essentials. This approach characterizes attributes across coded rating scores for responses relative to the course or training objectives. The feedback data will serve as inputs to the computation stage of the evaluation model. (See Appendix A) Progress or balanced scorecard will represent the capability ratings, range, and priority ratings based on student and teacher responses to questionnaires.
© Copyright 2020 GAU