Investigate cybersecurity incidents or crimes related to information technology and digital evidence by collecting and analyzing cybersecurity information.
Program Outcome 3:The graduate operates hardware, software, and virtual environments to ensure effective and efficient information technology system performance and security.
Approaching Competence
Approaching Competence: The submission demonstrates the ability to operate hardware, software, and virtual environments to ensure security, but it does not ensure effective or efficient information technology system performance.
EVALUATOR COMMENTS: ATTEMPT 2
The submission includes an adequate summary of the problem causes. Adequate details of the specific project costs and risks are not evident.
Program Outcome 4:The graduate defends information technology infrastructure by analyzing and mitigating cybersecurity threats.
Approaching Competence
Approaching Competence: The submission demonstrates the ability to defend information technology infrastructure by analyzing cybersecurity threats, but it does not demonstrate how to mitigate cybersecurity threats.
EVALUATOR COMMENTS: ATTEMPT 2
A clear summary of the implementation assessment is provided which is fitting. Adequate details of the documentation to assess the installation, user guides, assessment of the final output, and postimplementation risk assessment is not evident.
Program Outcome 5:The graduate investigates cybersecurity incidents or crimes related to information technology and digital evidence by collecting and analyzing cybersecurity information.
Competent
D. Sources
Competent
E. Professional Communication
Not Evident
Not EvidentContent is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.
EVALUATOR COMMENTS: ATTEMPT 2
This aspect will be assessed when all revisions are present.