Upload
ngotuyen
View
218
Download
1
Embed Size (px)
Citation preview
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 1/10
Bachelor of Science in Cybersecurity (emajor)New Degree/Major Program v3.0
Introduction
This form serves as the approval process of record for new degree and major proposals atKennesaw State University.
There are several external Board of Regents documents that may need to be completed inorder to launch this process. You will find links to these documents here, as well as at theKSU Curriculum resources site. We advise that you first collect any necessary externaldocumentation before proceeding with the new program approval process.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
General Information
If the proposed new program will have an impact on courses or programs inother departments, please contact the appropriate department chairs forfurther discussion before moving on.
Impact of newprogram?* I have conferred with other departments that might be impacted by
this proposal. An executive summary of those discussions isattached.
This proposal does not impact offerings in other departments.
Program Name* Bachelor of Science in Cybersecurity (emajor)
CIP Code* 11.1003
CIP was checkedby EnterpriseInformationManagement
Yes No
Type of DegreeBS
If new orunlisted degreetype, list here:
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 2/10
Type of ProgramDegree/Major
If new orunlisted programtype, list here:
Department ofOwnership* Institute for Cybersecurity Workforce Development
If owned by newor unlisted
department, listhere:
Institute for Cybsersecurity Workforce Development
CurriculumType* Program
Shared Core
AcademicPolicies
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 3/10
The Bachelor of Science in Cybersecurity is a fully online degree that hasthe primary objective of meeting the high demand for professional degreesin the area of cybersecurity. The degree has core requirements, majorrequirements, major specilizations, and required electives. The majorcontains those courses considered fundamental to the cybersecurity fieldand the electives give the student some flexibility in choice.
Admission Criteria
All students must meet the admission requirements for freshmen and/ortransfer students as determined by KSU as documented athttp://admissions.kennesaw.edu/. Admission to the University will require a2.5 GPA in 17 units of required high school coursework as recalculated byKennesaw State as well as a minima score requirements for Freshmen andTransfer Freshmen must score an SAT Total Score on 1600 Scale: 1030AND SAT Reading Test Score: 25 AND SAT Math Section Score: 490 orACT Composite score of 20 AND ACT English subscore of 18 AND ACTMath subscore of 18. Other categories of admission have differingrequirements as published at http://admissions.kennesaw.edu/. All students must meet the graduation requirements for undergraduatestudents as determined by KSU and also complete all Major courserequirements with a grade of ‘C’ or better.
The proposed B.S. in Cybersecurity eMajor will be housed in the Institute ofCybersecurity Workforce Development at the University. This degree isintended to be an access degree, enabling a much broader set of optionsenabling the use of articulation agreements with the technical collegesystem and eCore affiliates across the State of Georgia.
Admission to the BSCYBR degree program eMajor will be open to anystudent who has completed (or is scheduled to complete) the GeneralEducation and Area F – Lower Division Major Requirements through anyrecognized and transferrable method. That includes transfer of credit fromother Institutions (following KSU policies for transfer of credit), eCorecourses documented by KSU, KSU courses taken on campus as well asKSU online courses. Once accepted as into the eMajor BSCYBR, studentswill be eligible to register for courses offered at the eMajor tuition rate.
ProgramDescription
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 4/10
The purpose of the Bachelor of Science in Cybersecurity (BSCYBR)program is to create technologically capable, businessaware cybersecurityprofessionals capable of applying technical skills and the knowledge ofsecurity management to protect computerized information systems from awide variety of of threats, and to manage the risks associated with moderninformation technology usage. Cybersecurity is a computingbaseddiscipline involving technology, people, information, and processes toenable assured operations. It involves the creation, operation, analysis, andtesting of secure computer systems. It is an interdisciplinary course ofstudy, including aspects of information technology, law, policy, humanfactors, ethics, and risk management often in the context of adversaries.
The Department of Homeland Security and the National Security Agencyhave jointly designated Kennesaw State University as a National Center ofAcademic Excellence in Cyber Defense Education with specialized focusareas in Security Policy Development & Compliance and Systems SecurityAdministration.
The Institute for Cybersecurity workforce development requires that BSCYBR candidates must earn a grade of "C" or better in all upper divisioncourses in order to be counted toward their degree.
USING THE PROGRAM BUILDER:
In order to build or edit a program, you must first add all courses to be included in theprogram of study through the view curriculum courses tab. Then, to add cores (sections ofthe program of study, e.g., Upperlevel Division Requirements), click on the view curriculumschema tab. Changes to the program of study will not be recorded unless these steps arecompleted.
ProgramBuilder*
General Education (4344 Credit Hours)
See the KSU catalog for complete listing of requirements.
The area A math requirement is (MATH 1111and MATH 1112) or MATH 1113. The area Brequirement is COM 1100 (Human Communication). The area D math requirement is MATH 1190 (CalculusI) or MATH 1160 (Elementary Applied Calculus). Thearea E requirement is either ECON 2100 (Principles ofMicroeconomics) or CRJU 1101 (Foundations ofCriminal Justice).
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 5/10
Lower Division Major Requirements (AreaF) (18 Credit Hours)
ACCT 2100 ACCT 2100 Introduction to FinancialAccountingMATH 2332 Probability and Data AnalysisorMATH 1107 Introduction to StatisticsorECON 2300 Business StatisticsCS 1301 Programming Principles IorCSE 1301 Programming and Problem Solving IIT 1324 Advanced Programming PrinciplesCSE 2300 Discrete Structures for ComputingorMATH 2345 Discrete MathematicsOne Hour from Area D (Students recommended to takeBLAW 2200 – Business Law. The extra 2 hours of thiscourse will count toward free electives.)
Upper Division Major Requirements (36Credit Hours)
Upper Divison Technical Core
IT 3123 Hardware and Software ConceptsIT 3423 Operating Systems Concepts &AdministrationIT 4323 Data Communications & NetworkingIT 4423 Linux/Unix Administration
Upper Division Security Core
CYBR 3100 Principles of Information SecurityCYBR 3200 Network SecurityCYBR 3210 Client Systems SecurityCYBR 3300 Management of Information Security ina Global EnvironmentCYBR 4200 Perimeter DefenseCYBR 4220 Server Systems Security
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 6/10
CYBR 4330 Incident Response and ContingencyPlanning
Capstone
CYBR 4810 Cyber Defense
Upper Division Major Specializations (9Credit Hours)
All BSCYBER students are required to take a minimum of 9credit hours as an upperlevel specialization. They mustchoose one of the following tracks and complete all of thecourses listed. The options are:
Systems Security Track
CSE 3153 Database Systems
CYBR 4843 Ethical Hacking for Effective DefenseorCYBR 4883 Infrastructure Defense
CYBR 4350 Management of Digital Forensics andeDiscoveryorCYBR 4853 Computer Forensics
Network Security Track
IT 4333 Network Configuration & AdministrationCYBR 4833 Wireless SecurityCYBR 4893 Internet of Things: Applications andSecurity
Cyber Crime Track
Note: Requires CRJU 1101 as Area E GeneralEducation requirement, otherwise students must takeas a Free Elective.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 7/10
CRJU 3305 Technology and Criminal JusticeCRJU 4305 Technology and Cyber Crime
CYBR 4350 Management of Digital Forensics andeDiscoveryorCYBR 4853 Computer Forensics
Major Electives (9 Credit Hours)
Students should choose 9 credit hours from the following:
CYBR 3396 Cooperative StudyCYBR 3398 InternshipCYBR 4400 Directed StudyCYBR 4490 Special TopicsCYBR 4700 Emerging Issues in CybersecurityAny 3xxx or 4xxx IS/ISA/IT/CS/CRJU course the studentcan meet the prerequisites for except restricted ISA or ITSecurity course (see advisor for complete listing)Optional programs of study that may be consideredcontemporaneously with the degree:Information Technology Minor (Embedded) Students earning a major in Cybersecuritywill automatically earn the Minor in InformationTechnology.Criminal Justice Minor (9 + 3 Credit Hours) Students desiring a minor in criminal justice should takethe CJ track outlined above AND the following courses asmajor and free electives. Note the 4th course will countas a free elective. • CRJU 3310 Police in America • CRJU 3332 Corrections OR CRJU 3352 JuvenileDelinquency and Corrections • CRJU 3300 Criminal Courts OR CRJU 3315 CriminalProcedure • One CRJU course from approved minor elective list(see catalog for listing and availability)Crisis Preparedness Minor (9 + 3 Credit Hours) Students desiring a minor in crisis preparedness shouldtake the following courses as major and free electives.Note the 4th course will count as a free elective. Required Courses (6 Credit Hours) Note: BSCYBRstudents take ISA 3300 and ISA 4330 in lieu of ISA 3330. • PR 4460 Crisis Communication • POLS 4200 Homeland Security Administration Elective Courses (6 Credit Hours as Free electives)selected from the following: • CRJU 3400 Ideological/Group Violence and LawEnforcement • CRJU 4100 Ethics in Criminal Justice • PR 4670 Crisis Leadership Communication • POLS 4437 Global Security
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 8/10
Free Electives (8 Credit Hours)
Any course(s) in the university curriculum.
Program Total (123 Credit Hours)
Note: A new course proposal must be submitted for all new courses in this program.
Required Attachements
PROGRAM PROSPECTUS
Purpose of the prospectus:
A program prospectus is the initial submission of a potential degree and/or major that isconsistent with the institution’s mission and that the institution deems a priority. Theprospectus is designed to allow institutions to submit program ideas for feedback withoutexpending substantial resources toward the development of a full new program proposal.
The primary purpose of the prospectus is to “make the case” for submitting a formalproposal for the new program. There are three key criteria that should be addressed in theprospectus: 1) Justification of Need; 2) Demand; and 3) NonDuplication. The prospectusrequires institutions to provide clear evidence of how a proposed degree and/or majormeets need, demand, and does not lead to unnecessary program duplication in theUniversity System. All prospectuses are expected to include data or evidence to supportthe need and demand for the program. Of course, the stronger the evidence accompanyinga prospectus, the greater the likelihood the institution will be invited to submit a formalproposal.
New Program Prospectus Form
I have attachedthe
Degree/ProgramProposal
Prospectus*
Yes
How will theproposed
program bedelivered?*
Facetoface Distance Learning
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 9/10
Please complete and attach the appropriate BOR Formal Proposal form.
Formal Proposal for a New Degree/Major Program: Facetoface
Formal Proposal for a New Degree/Major Program: Distance Learning
I have attached aNew
Degree/MajorProposal Formal
Proposal.*
Yes
ACADEMIC PROGRAM ASSESSMENT PLAN
Academic Program Improvement
The Academic Program Improvement (API) system was designed for faculty to moreeffectively report on assessments, analysis of those assessments and resultingimprovements to academic programs.
The API system improves efficiency by replacing the AOL and part of the CPR reportingprocesses, and by administering report reviews through established governancestructures.
Each academic program that leads to a credential (certificate or degree) will report. Eachdistinct implementation of a program (e.g., on campus, marketed and/or implemented asfully off site, or marketed and/or implemented as fully online) reports separately using datathat is disaggregated from other implementations.
Go to information on academic program assessment.
I have attachedan Academic
ProgramAssessment
Plan*
Yes
If this proposal is for a doctoral program, please complete and attach an Applied DoctoralSupplemental Form.
Is this proposalfor a doctoralprogram?*
Yes. I have attached an Applied Doctoral Supplemental Form.
No.
Routing Information
Name ofdepartmental
contact*
Herbert Mattord
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4468/print 10/10
Is this aneducation
degree/majorprogramproposal
originating fromoutside the
Bagwell Collegeof Education?*
Yes No
Level ofprogram* Undergraduate Graduate
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 1/8
CYBR 3100 Principles of Information SecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course in the BBAInformation Security and Assurance program (ISA 3100) and is used here as an Upper Division Major Requirement for the BS in Cybersecurity eMajor. Key points: 1) There are no material changes to this course that would impact anyother program.2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity3) The primary need is for variance in prerequisites for courses in theBSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 2/8
Prefix* CYBR Number* 3100
Title* Principles of Information Security
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* Completion of Programming Principles I (CS 1301 or CSE 1301) (or itstransfer equivalent) with a grade of 'C' or better and admission to the Bachelor of Science in Cybersecurity eMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course offers a foundation in the various technical andadministrative aspects of Cybersecurity and provides the terminologyand principles for understanding the key issues associated withprotecting information assets, determining the levels of protection andresponse to security incidents, as well as designing a consistent,reasonable cybersecurity system.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The introductory course in programming is believed to be a validindicator of readiness to advance to the level of academic preparationnecessary to successfully complete this course.
What is thedesired sequenceof prerequisites?
Only one.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a colisting of an existing course and relies on theestablished instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a colisting of an existing course and relies on theestablished instructional methodologies for that course.
Course Title forLabel*
Principles of Info Security
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
2
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4528/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 1/8
CYBR 3200 Network SecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BBAInformation Security and Assurance program (ISA 3200) and isused here as an Upper Division Major Requirement for the BS inCybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity 3) The primary need is for variance in prerequisites for courses in theBSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 2/8
Prefix* CYBR Number* 3200
Title* Network Security
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Principles of Cybersecurity (CYBR 3100) orequivalent AND admission to the Bachelor of Science in Cybersecurity EMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course provides a complete foundation of the cybersecurity ofnetworked information systems, providing a detailed examination ofprinciples, theory, tools, techniques, and technologies used in networkcybersecurity.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
This course is a purposeful duplication of an existing course and relies onthe established pre and corequisite flows.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Network Security
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4551/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 1/8
CYBR 3210 Client Systems SecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BBAInformation Security and Assurance program (ISA 3210) and isused here as an Upper Division Major Requirement for the BS inCybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity 3) The primary need is for variance in prerequisites for courses in theBSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 2/8
Prefix* CYBR Number* 3210
Title* Client Systems Security
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 0
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* Completion of Programming Principles I (CS 1301 or CSE 1301) (or itstransfer equivalent) with a grade of 'C' or better and admission to theBachelor of Science in Cybersecurity EMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course explores client computer system technology, security, andcontrol of vulnerabilities. It will include relevant computer architectures,and operating systems and will provide the detailed technical coveragenecessary to protect computer information system clients by presentingthe knowledge of client platform computer hardware components, clientnetwork devices and interfaces, as well as the structure and usage ofcommon client operating system software from a cybersecurityperspective.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The introductory course in programming is believed to be a validindicator of readiness to advance to the level of academic preparationnecessary to successfully complete this course.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 4/8
How often arethe requiredprerequisites
offered?
Every term
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Client Systems Security
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4554/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 1/8
CYBR 3300 Management of Information Security in a GlobalEnvironmentNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents crosslisting of an existing course in the BBAInformation Security and Assurance program (ISA 3300) and is usedhere as an Upper Division Major Requirement for the BS in Cybersecurityemajor. There are no material changes to this course that would impact anyother program. The new course number is designed to facilitate emajorusage and crosslisting of the established courses being used to supportthe proposed BSCybersecurity.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 2/8
Course Information
Prefix* CYBR Number* 3300
Title* Management of Information Security in a Global Environment
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* Completion of Principles of Cybersecurity (CYBR 3100) or equivalent witha grade of ‘C’ or better AND admission to the Bachelor of Science inCybersecurity EMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course explores managerial aspects of cybersecurity and theadministration of strategic planning processes as well as the policies,procedures, and staffing functions necessary to organize and administerthe cybersecurity functions of an organization.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The principles of security course is believed to be a valid indicator ofreadiness to advance to the level of academic preparation necessary tosuccessfully complete this course.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Please see the attached syllabus.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Mgmnt of Inf Sec
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.x
LibraryResouces*
Please see the attachments to the program application.x
Equipment* Please see the attachments to the program application.x
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4552/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 1/8
CYBR 3396 Cooperative StudyNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Internship/Practicum
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
BSCYBR upper division major elective
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 2/8
Prefix* CYBR Number* 3396
Title* Cooperative Study
Lecture Hours* 0
LaboratoryHours*
0
Credit Hours* 13
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Principles of Cybersecurity (CYBR 3100) orequivalent AND admission to the Bachelor of Science in Cybersecurity EMajor program of study AND approval of the coordinator of cooperativeeducation/internships (KSU Career Services).
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This is a supervised creditearning work experience for a minimum oftwo academic semesters with a previously approved business firm,private agency, or government agency. For sophomore, junior, or seniorstudents who wish to obtain onthejob experience in conjunction withtheir academic education.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The principles of security course is believed to be a valid indicator ofreadiness to advance to the level of academic preparation necessary tosuccessfully complete this course.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 5/8
Please see the attached syllabus
Course content* Please see the attached syllabus
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
N/A
Outline the planfor continuous
courseassessment.*
N/A
Course Title forLabel*
Cooperative Study
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
0
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
2
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4579/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 1/8
CYBR 3398 InternshipNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Internship/Practicum
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
BS CYBR upper division major elective
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 2/8
Prefix* CYBR Number* 3398
Title* Internship
Lecture Hours* 0
LaboratoryHours*
0
Credit Hours* 19
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Principles of Cybersecurity (CYBR 3100) orequivalent and admission to the Bachelor of Science in Cybersecurity EMajor program of study as well approval of the coordinator ofcooperative education/internships (KSU Career Services).
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
A supervised creditearning work experience for one academic semesterwith a previously approved business firm, private agency, or governmentagency. The work experience may not be with a current employer. Thecourse will be graded on an S/U basis. The number of credit hoursapplicable to degree requirements is limited.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The principles of security course is believed to be a valid indicator ofreadiness to advance to the level of academic preparation necessary tosuccessfully complete this course
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Please see the attached syllabus.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Internship
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
0
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
2
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4580/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 1/8
CYBR 4200 Perimeter DefenseNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents crosslisting of an existing course in the BBAInformation Security and Assurance program (ISA 4200) and is usedhere as an Upper Division Major Requirement for the BS in Cybersecurityemajor. There are no material changes to this course that would impact anyother program. The new course number is designed to facilitate emajorusage and crosslisting of the established courses being used to supportthe proposed BSCybersecurity.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 2/8
Prefix* CYBR Number* 4200
Title* Perimeter Defense
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Network Security (CYBR 3200) or equivalentAND Data Communications & Networking (IT 4323) or equivalent ANDadmission to the Bachelor of Science in Cybersecurity EMajor programof study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
An exploration of cybersecurity techniques, tools, and technologies usedto protect an organizations network infrastructure. The course willexamine the evaluation, selection, deployment, and administration offirewall, VPN, IDPS, and other applications used to defend organizationalnetworks and information assets from attacks.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course.
What is thedesired sequenceof prerequisites?
No sequence required.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Please see the attached syllabus.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Perimeter Defense
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4555/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 1/8
CYBR 4220 Server Systems SecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents crosslisting of an existing course in the BBAInformation Security and Assurance program (ISA 4220) and is usedhere as an Upper Division Major Requirement for the BS in Cybersecurityemajor. There are no material changes to this course that would impact anyother program. The new course number is designed to facilitate emajorusage and crosslisting of the established courses being used to supportthe proposed BSCybersecurity.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 2/8
Prefix* CYBR Number* 4220
Title* Server Systems Security
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Network Security (CYBR 3200) or equivalentand Linux/Unix Administration (IT 4423) or equivalent AND admission tothe Bachelor of Science in Cybersecurity EMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course offers the detailed technical knowledge and skills necessaryto protect computer server information system by presenting theknowledge of server platform computer hardware components, servernetwork devices and interfaces, as well as the structure and usage ofcommon server operating system software from a cybersecurityperspective. Additional learning regarding ongoing maintenance andoperational issues of server computing systems will also be included.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course.
What is thedesired sequenceof prerequisites?
No sequence is required.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 4/8
How often arethe requiredprerequisites
offered?
Every semester.
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Please see the attached syllabus.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Server Sys Sec
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4558/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 1/8
CYBR 4330 Incident Response and Contingency PlanningNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents crosslisting of an existing course in the BBAInformation Security and Assurance program (ISA 4330) and is usedhere as an Upper Division Major Requirement for the BS in Cybersecurityemajor. There are no material changes to this course that would impact anyother program. The new course number is designed to facilitate emajorusage and crosslisting of the established courses being used to supportthe proposed BSCybersecurity.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 2/8
Prefix* CYBR Number* 4330
Title* Incident Response and Contingency Planning
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Management of Information Security in aGlobal Environment (CYBR 3300) or equivalent AND admission to theBachelor of Science in Cybersecurity EMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course offers coverage of the cybersecurity contingency planning. Itincludes the detailed aspects of incident response planning, disasterrecovery planning, and business continuity planning. Developing andexecuting plans to deal with incidents in the organization is a criticalfunction in cybersecurity. This course focuses on the planning processesfor the execution of response to human and nonhuman incidents incompliance with these policies.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The management of security course includes specific content required forsuccessfully completion this course.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Inc. Resp & Cont Plng
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4559/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 1/8
CYBR 4350 Management of Digital Forensics and eDiscoveryNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents crosslisting of an existing course in the BBAInformation Security and Assurance program (ISA 4350) and is usedhere as an Upper Division Major Requirement for the BS in Cybersecurityemajor. There are no material changes to this course that would impact anyother program. The new course number is designed to facilitate emajorusage and crosslisting of the established courses being used to supportthe proposed BSCybersecurity.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 2/8
Prefix* CYBR Number* 4350
Title* Management of Digital Forensics and eDiscovery
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Client Systems Security (CYBR 3210) orequivalent and Operating Systems Concepts & Administration (IT 3423)or equivalent AND admission to the Bachelor of Science in CybersecurityEMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course explores the key issues in digital forensics: the detection,isolation and response to security breaches and attacks. It providesspecific procedures required to respond to a computer crime incident andalso provides coverage of the entire digital forensic sequence and theeDiscovery process within organizations.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course.
What is thedesired sequenceof prerequisites?
Sequence of prereqs is not a factor.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 4/8
How often arethe requiredprerequisites
offered?
Each semester
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Please see the attached syllabus.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Mgmt Dig Forensics & EDiscv
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4561/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 1/8
CYBR 4400 Directed StudyNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
BSCYBR upper division major elective.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 2/8
Prefix* CYBR Number* 4400
Title* Directed Study
Lecture Hours* 0
LaboratoryHours*
0
Credit Hours* 13
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* Approval of Instructor and Department Chair.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course enables the study of special topics of an advanced naturethat are not in the regular course offerings. Students will complete aresearch project on a topic in the subject area of cybersecuritysupervised by a faculty member. Credit hours vary from one to threedepending on the nature and content of the project student involved. Upto three credits may be applied to the major area.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
Explainassessment
findings which
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 3/8
led to coursedevelopment.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
Approval of the Chair is required.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 5/8
Varies by offering.
Course content* Varies by offering.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Varies by offering.
Outline the planfor continuous
courseassessment.*
Varies by offering.
Course Title forLabel*
Directed Studies
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4577/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 1/8
CYBR 4490 Special Topics in CybersecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
BSCYBR upper division elective
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 2/8
Prefix* CYBR Number* 4490
Title* Special Topics in Cybersecurity
Lecture Hours* 13
LaboratoryHours*
0
Credit Hours* 13
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* Junior/Senior Standing, additional requirement will vary by topic.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
Special topics proposed by faculty, approved by the Department Chair.Offered on a demand basis. Can be repeated for credit if not duplicatetopic.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
Allows flexible delivery of topical courses.
Explainassessment
findings which
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 3/8
led to coursedevelopment.*
This is a standard course in Departments across KSU.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
Varies by offering.
What is thedesired sequenceof prerequisites?
Varies by offering.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Other
If other, pleasestate frequency
Based on need anddemand.
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 5/8
Varies by offering.
Course content* Varies by offering.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Varies by offering.
Outline the planfor continuous
courseassessment.*
Varies by offering.
Course Title forLabel*
Special Topics
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
0
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
2
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4578/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 1/8
CYBR 4700 Emerging Issues in CybersecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
BS CYBR, UpperDivision Elective
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 2/8
Prefix* CYBR Number* 4700
Title* Emerging Issues in Cybersecurity
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in CYBR 3100 and permission of Department.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course explores emerging issues in cybersecurity. The content ofeach offering will vary based on current issues and concerns in thecybersecurity industry.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course will allow the BS CYBR to include emerging issues andtechnologies allowing the course content to be rapidly adjusted to thecurrent events in the industry.
Explainassessment
findings which
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 3/8
led to coursedevelopment.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Please list all ofthe facultyapproveddegree(s)
required to teachthis course*
Sufficient preparation to teach this course will be either a Masterslevelor Doctorallevel degree in any securityrelated or computingrelatedfield OR a minimum of five years practical experience in cybersecurityemployment or consulting in the topic being covered by the course. Thiscourse is one that would benefit from being taught by a practicingprofessional in the field of cybersecurity.
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The principles of security course is believed to be a valid indicator ofreadiness to advance to the level of academic preparation necessary tosuccessfully complete this course
What is thedesired sequenceof prerequisites?
This course is a purposeful duplication of an existing course and relies onthe established pre and corequisite flows.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Other
If other, pleasestate frequency
On demand
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 5/8
Unique to each offering.
Course content* Unique to each offering.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
Unique to each offering.
Outline the planfor continuous
courseassessment.*
Unique to each offering.
Course Title forLabel*
Emerg Issues in Cybersecurity
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 7/8
Please see the BSCYBR program proposal supporting materials.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the BSCYBR program proposal supporting materials.
ComputerTechnology*
Please see the BSCYBR program proposal supporting materials.
LibraryResouces*
Please see the BSCYBR program proposal supporting materials.
Equipment* Please see the BSCYBR program proposal supporting materials.
Space* Please see the BSCYBR program proposal supporting materials.
Other NecessaryResources
Please see the BSCYBR program proposal supporting materials.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4927/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 1/8
CYBR 4810 Cyber DefenseNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BBAInformation Security and Assurance program (ISA 4810) and isused here as an Upper Division Major Requirement for the BS inCybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity 3) The primary need is for variance in prerequisites for courses in theBSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 2/8
Prefix* CYBR Number* 4810
Title* Cyber Defense
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Server Systems Security (CYBR 4220) orequivalent AND Perimeter Defense (CYBR 4200) or equivalent ANDadmission to the Bachelor of Science in Cybersecurity EMajor programof study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course is a semesterlong simulation using the virtual systems,software, practices, and procedures necessary for the protection ofcomputer systems and networks. Students learn how to protect networksand systems as deployed in a typical organization. Course topics includepolicy and practice associated with the protection of communicationresources, intrusion detection systems, firewalls, and use of various toolsfor system and network protection.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
This course is a purposeful duplication of an existing course and relies onthe established pre and corequisite flows.
What is thedesired sequenceof prerequisites?
No preference.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Cyber Defense
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4560/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 1/8
CYBR 4833 Wireless SecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BSInformation Technology program (IT 4833) and is used here asan Upper Division Major Requirement for the BS in Cybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity The primary need is for variance in prerequisites for courses in the BSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 2/8
Prefix* CYBR Number* 4833
Title* Wireless Security
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Network Security (CYBR 3200) or equivalentand Data Communications & Networking (IT 4323) or equivalent ANDadmission to the Bachelor of Science in Cybersecurity EMajor programof study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course explores the theory and practice of securing wirelessnetworks from threats and attacks. Topics include Cryptography,Network Security Protocols, Security and Layered Architecture, VoiceOriented Wireless Networks, DataOriented Wireless Networks, Securityin Traditional Wireless Networks, Security in Wireless LAN, and Securityin Wireless Ad Hoc Networks.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course.
What is thedesired sequenceof prerequisites?
No preference.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Wireless Security
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4564/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 1/8
CYBR 4843 Ethical Hacking for Effective DefenseNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BSInformation Technology program (IT 4843) and is used here asan Upper Division Major Requirement for the BS in Cybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity The primary need is for variance in prerequisites for courses in the BSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 2/8
Prefix* CYBR Number* 4843
Title* Ethical Hacking for Effective Defense
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 0
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Network Security (CYBR 3200) or equivalentand Data Communications & Networking (IT 4323) or equivalent ANDadmission to the Bachelor of Science in Cybersecurity EMajor programof study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course explores the identification and validation of network andsystem vulnerabilities by taking an adversarial approach to network,system, and data access. Topics include network attacks and defenses,Operating System and application vulnerabilities, social engineeringattacks, and malware. Ethical, legal implications of network attacks arealso discussed.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course.
What is thedesired sequenceof prerequisites?
No preference.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Every year
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Ethical Hacking
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4563/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 1/8
CYBR 4853 Computer ForensicsNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BSInformation Technology program (IT 4853) and is used here asan Upper Division Major Requirement for the BS in Cybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity The primary need is for variance in prerequisites for courses in the BSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 2/8
Prefix* CYBR Number* 4853
Title* Computer Forensics
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Client Systems Security (CYBR 3210) orequivalent and Operating Systems Concepts & Administration (IT 3423)or equivalent AND admission to the Bachelor of Science in CybersecurityEMajor program of study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course is an exploration of the tools and techniques used to conductdigital investigations. It will include digital evidence collection, recovery,and analysis. Topics are Legal issues relating to digital evidence,recovery of deleted files and discovery of hidden information,reconstruction of user activity from email, temporary Internet files andcached data, assessment of the integrity of system memory and processarchitecture to reveal malicious code.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
Computer Forensics
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4562/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 1/8
CYBR 4883 Infrastructure DefenseNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BSInformation Technology program (IT 4883) and is used here asan Upper Division Major Requirement for the BS in Cybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity The primary need is for variance in prerequisites for courses in the BSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 2/8
Prefix* CYBR Number* 4883
Title* Infrastructure Defense
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Network Security (CYBR 3200) or equivalentand Data Communications & Networking (IT 4323) or equivalent ANDadmission to the Bachelor of Science in Cybersecurity EMajor programof study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course is an overview of the cybersecurity aspects of infrastructuredefensive techniques. It will include tools and techniques for vulnerabilityassessment as well as penetration testing processes. There will be afocus on processes and techniques for improving the defensive capabilityof that infrastructure.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Graduate levelcourses only:
Please list all ofthe facultyapproveddegree(s)
required to teachthis course
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course.
What is thedesired sequenceof prerequisites?
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 4/8
How often arethe requiredprerequisites
offered?
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 5/8
Please see the attached syllabus.
Course content* Please see the attached syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course
Course Title forLabel*
Infrastructure Defense
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4575/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 1/8
CYBR 4893 Internet of Things: Applications and SecurityNew Course v3.0
General Information
This form serves as the approval process of record for new course proposals at KennesawState University.
For detailed assistance, please enable help text. Direct all questions concerning this andother forms to [email protected].
Anticipated Implementation Date:
Term/Year*Fall 2017
Type of Course*Lecture
Classification ofCourse* Upper
Division
*If this course will satisfy a program requirement or elective, please list all programs andarea of each program that will be impacted.
For example: BFA in Art, UpperDivision Major Requirements.
Program(s)impacted*
This course represents the purposeful duplication of an existing course inthe BSInformation Technology program (IT 4893) and is used here asan Upper Division Major Requirement for the BS in Cybersecurity emajor. Key points: 1) There are no material changes to this course that would impact anyother program. 2) The new course number is designed to facilitate emajor usage andusage of the established courses being used to support the proposed BSCybersecurity The primary need is for variance in prerequisites for courses in the BSCYBR course sequence subsequent to the entry courses in the major.
*In order to ensure that courses are added to their relevant program areas, please completethe Change to Program Name, Requirements or Policies form.
Course Information
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 2/8
Prefix* CYBR Number* 4893
Title* Internet of Things: Applications and Security
Lecture Hours* 3
LaboratoryHours*
0
Credit Hours* 3
Level of Course* Undergraduate Graduate
Learning SupportPrerequisites
Prerequisites* A grade of ‘C’ or better in Network Security (CYBR 3200) or equivalentand Data Communications & Networking (IT4323) or equivalent andadmission to the Bachelor of Science in Cybersecurity EMajor programof study.
Coursesconsideredconcurrent
prerequisites:
Course Corequisites*
None
CatalogDescription*
This course introduces core knowledge and skills required to develop,design and secure IoT solutions. Students will analyze requirements,develop humandevice interaction and learn about broader trends andcharacteristics in IoT. In addition, students will evaluate the securitydesign of IoTconnected products.
Explain how thisspecific coursefits within thecontext of theinstitution'smission.*
This course is a purposeful duplication of an existing course and relies onthe established institutional context for that course.
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 3/8
Explainassessment
findings whichled to course
development.*
A panel of interdisciplinary faculty members selected this course fromexisting KSU curriculum to include in this proposal so as to leverage theexisting course work and faculty capabilities.
Please list all ofthe facultyapproveddegree(s)
required to teachthis course*
Sufficient preparation to teach this course will be either a Masterslevelor Doctorallevel degree in any securityrelated or computingrelatedfield OR a minimum of five years practical experience in cybersecurityemployment or consulting in the topic being covered by the course. Thiscourse is one that would benefit from being taught by a practicingprofessional in the field of cybersecurity.
What is thesubstance of
content in eachprerequisite thatcommands itsinclusion as aprerequisite tothe proposed
course?*
The courses listed are believed to be a valid indicator of readiness toadvance to the level of academic preparation necessary to successfullycomplete this course. IT 4823 includes content on data communications and networkingessential to successful completion of the degree. CYBR 3200 includes content on network security essential to successfulcompletion of the degree.
What is thedesired sequenceof prerequisites?
No preference.
What is therationale forrequiring the
above sequenceof prerequisites?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 4/8
How often arethe requiredprerequisites
offered?
At least every Fall and Spring and Summer term as can be supported byenrollment.
Give any otherjustification for
the course.
How often willthis course be
offered?*Everysemester/term
If other, pleasestate frequency
Type of Delivery* On Kennesaw Campus: FacetoFace
On Marietta Campus: FacetoFace
Fully at a distance online
Hybrid
Offsite location
Name of offsitelocation (ifapplicable)
All sections of the course will be taught with the understanding that the following apply:
LearningOutcomes*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 5/8
See course syllabus.
Course content* See course syllabus.
Whatinstructional
methodologieswill be
incorporated intothe course to
stimulate groupprocess andeducationaloutcomes?*
This course is a purposeful duplication of an existing course and relies onthe established instructional methodologies for that course.
Outline the planfor continuous
courseassessment.*
This course is a purposeful duplication of an existing course and relies onthe established assessment methodologies for that course.
Course Title forLabel*
IoT: Apps & Security
Grades Allowed* Regular S/U
How many timescan you reenrollin this course toimprove grade?*
1
Is this courserepeatable for
credit?*
Yes
No
If yes, howmany times mayit be taken for
credit?
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 6/8
Will this coursebe included in
GeneralEducation?*
Yes
No
Will this coursebe included in
Area F?*
Yes
No
If this course isused to satisfy
CPC, what areas?
Are special feesor tuition
required for thiscourse?*
Yes No
If yes, the academic department must submit the Request for New or Change in Course Feeform to the Office of Budget and Planning for approval. Special fees will not be assessed atthe section if the request has not been approved. Special course fees are not retroactive.Please followup with each special course fee request in a timely manner.
Check toconfirm.* I have attached a course syllabus.
The institution hasreviewed the UniversitySystem of Georgia list ofcommon course prefixes,numbers, anddescriptions. (USGAcademic AffairsHandbook, 2.4.(0))
Is this course incompliance?* Yes
No
If this course isfor an Area F
major or degreeprogram, does itmeet the USG
Area F guidelinesfor that
program?*
Yes
No
NA
Note: USG Area F guidelines can be reviewed here.
Resources and Funding
What resourceswill be redirectedto accommodate
this course?*
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 7/8
Please see the attachments to the program application.
What resources will be used to accommodate this course? Explain the costs for each of the following items (personnel, computer technology, space,equipment, other).
Personnel* Please see the attachments to the program application.
ComputerTechnology*
Please see the attachments to the program application.
LibraryResouces*
Please see the attachments to the program application.
Equipment* Please see the attachments to the program application.
Space* Please see the attachments to the program application.
Other NecessaryResources
Please see the attachments to the program application.
General Education or Area F ONLY
If this course has been approved as a General Education course requirement, Please attachthe USG Core Course Proposal form found athttp://curriculum.kennesaw.edu/resources/borformsinfo.php
I have completedand attached theUSG Core CourseProposal form.*
Yes
No
NA
Routing Information
Department ofOwnership* Institute for Cybersecurity Workforce Development
12/7/2016 Curriculog
https://kennesaw.curriculog.com/proposal:4961/print 8/8
DepartmentalContact*
Herb Mattord
Is this aneducation coursefrom outside theBagwell Collegeof Education?*
Yes
No