The document provides information on the 3+1 Accelerated Degree Program in Computer Science at Saint Leo University, which allows students to earn a bachelor's degree and a Master of Science in Cybersecurity in just four years. It details the program overview, admission requirements, undergraduate and graduate curricula, academic advising support, and career outlook for graduates. Notable aspects of the program include no entrance exams for the graduate portion, preferential admission to the graduate program, and the ability to enter the workforce earlier with an advanced degree.
Bachelor of it Meloburne in Australia industry is a dynamic and rapidly growing market. You'll graduate from our Bachelor of Information Technology with the technical, analytical, managerial, leadership and interpersonal skills required for success in the IT industry. Visit Us at https://www.vit.edu.au/bachelor-of-information-technology-systems/
WELCOME TO CALIFORNIA UNIVERSITY OF MANAGEMENT AND SCIENCES
Congratulations for taking this first step towards achieving your dream career in I.T.
Whether you just graduated from high school or a professional looking to advance your career in I.T., CALUMS offers undergraduate and graduate degrees in Computer Information Systems (CIS) to provide students with basic and advanced information systems skills to succeed in the information technology field.
Bachelor of it Meloburne in Australia industry is a dynamic and rapidly growing market. You'll graduate from our Bachelor of Information Technology with the technical, analytical, managerial, leadership and interpersonal skills required for success in the IT industry. Visit Us at https://www.vit.edu.au/bachelor-of-information-technology-systems/
WELCOME TO CALIFORNIA UNIVERSITY OF MANAGEMENT AND SCIENCES
Congratulations for taking this first step towards achieving your dream career in I.T.
Whether you just graduated from high school or a professional looking to advance your career in I.T., CALUMS offers undergraduate and graduate degrees in Computer Information Systems (CIS) to provide students with basic and advanced information systems skills to succeed in the information technology field.
VIT’s Master of Information Technology and Systems (MITS) is a Post-Graduate course at Australian Qualification Framework (AQF) Level 9. This prestigious course offers a substantial opportunity for those who want to succeed in the world of Information Technology.
Webinar slides nov 2021 brad sims for slideshareCapitolTechU
Capitol Technology University Webinar presented Nov. 18, 2021 by Dr. Brad Sims. The presentation, Maximizing your transfer credit and apprenticeship experience to complete a degree, looked at the various ways students can leverage their prior college courses, military training, apprentice training, and certifications to earn up to 70 to 90 credits toward a 120 credit fully accredited bachelor's degree in a technology field.
CDAC run large no or courses , having various centers across India, Bytes Softech is CDAC ATC in New Delhi that also run CDAC affiliated courses this PDF give a simple gimps
for more info please visit http://bytessoftech.com
or http://www.facebook.com/bytesedu
or call Tel No: 011-46579380, 40503451
Meeting the Cybersecurity Skills Challenge with CompTIA Security+CompTIA
In this document:
- Meeting the Cybersecurity Skills Challenge with CompTIA Security+
- Measuring CompTIA Security+ Difficulty
- Why Hybrid Testing Approaches Work Best
- Mapping the NICE Cybersecurity Workforce Framework
In Our Certified SOC Analyst course, candidates are taught by the industry’s most experienced trainers to acquire trending and in-demand technical skills. A Certified SOC Analyst Certification focuses on creating new career opportunities through extensive and meticulous knowledge paired with enhanced capabilities for a dynamic contribution to a SOC team.
A comprehensive Incident Handler Certification program was created to provide organizations with the skills and knowledge needed to manage post-breach consequences, and thereby reduce the financial and reputational consequences of an incident.
Addmissions are open to Computer Technician certificate program offered by Northwest State Community College of Ohio. The computer technician must have experience working on personal computers, experience working on networks and some programming experience.
In this document:
- Adapting IT Operations with CompTIA Cloud+
- Measuring CompTIA Cloud+ Difficulty
- Why Hybrid Testing Approaches Work Best
- Mapping the NICE Cybersecurity Workforce Framework
Bachelor of Information Technology Melbournevitseo1
Bachelor of Information Technology Melbourne industry is a dynamic and rapidly growing market. You'll graduate from our Bachelor of Information Technology with the technical, analytical, managerial, leadership and interpersonal skills required for success in the IT industry.
Information Technology Program: JCU SingaporeJcu Singapore
Modern business and society is increasingly computer reliant. In recent years the Internet and local computer networks have become essential everyday business tools. Not surprisingly, the IT industry is one of the world’s fastest-growing industries, and IT graduates can expect exciting and rewarding careers, anywhere in the world.
Query Individual AssignmentPrepare a query to report courses t.docxmakdul
Query Individual Assignment
Prepare a query to report courses that need to be completed for a Computer Science Minor, given a student ID.
Computer Science Minor
Students may minor in computer science by completing 18 credits of computer science courses. Those considering a minor in computer science should seek guidance from the CS undergraduate coordinator as early as possible. Students must complete the following courses:
Required Courses
• CSCI 2210 - Java Programming
• CSCI 2212 - Intermediate C Programming
• CSCI 2226 - Data Structures and Algorithms
• CSCI 3326 - Algorithm Design and Analysis
• Plus two CS electives at the 350 level or higher
Computer Science, B.S.
Return to: Tagliatela College of Engineering
Program Coordinator: Alice Fischer, Ph.D.
The bachelor’s degree program in computer science is nationally accredited by the Computing Accreditation Commission of the Accreditation Board for Engineering and Technology (CAC/ABET). Its objectives are to inform, challenge, and train our diverse student body for a constantly changing world of technology. This program develops a solid body of knowledge and understanding of computer hardware, software, and theory, as defined by the Association for Computing Machinery (ACM) curriculum guidelines.
At the time of graduation, every student should have achieved the following program outcomes:
· An ability to apply knowledge of computing and mathematics appropriate to computer science.
· An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution.
· An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs.
· An ability to function effectively on teams to accomplish a common goal.
· An understanding of professional, ethical, legal, security, and social issues and responsibilities.
· An ability to communicate effectively with a range of audiences.
· An ability to analyze the local and global impact of computing on individuals, organizations, and society.
· Recognition of the need for and an ability to engage in continuing professional development.
· An ability to use current techniques, skills, and tools necessary for computing practice.
· An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer-based systems in a way that demonstrates comprehension in the tradeoffs involved in design choices.
· An ability to apply design and development principles in the construction of software systems of varying complexity.
· Have a substantial body of knowledge and understanding of computer hardware, software, and theory, as defined by the Association for Computing Machinery (ACM) guidelines.
The program consists of a required core that exposes students to a wide range of computing and technology topics, including the study of databases, hardware, networks, programming, software design, and security. Advanced c ...
VIT’s Master of Information Technology and Systems (MITS) is a Post-Graduate course at Australian Qualification Framework (AQF) Level 9. This prestigious course offers a substantial opportunity for those who want to succeed in the world of Information Technology.
Webinar slides nov 2021 brad sims for slideshareCapitolTechU
Capitol Technology University Webinar presented Nov. 18, 2021 by Dr. Brad Sims. The presentation, Maximizing your transfer credit and apprenticeship experience to complete a degree, looked at the various ways students can leverage their prior college courses, military training, apprentice training, and certifications to earn up to 70 to 90 credits toward a 120 credit fully accredited bachelor's degree in a technology field.
CDAC run large no or courses , having various centers across India, Bytes Softech is CDAC ATC in New Delhi that also run CDAC affiliated courses this PDF give a simple gimps
for more info please visit http://bytessoftech.com
or http://www.facebook.com/bytesedu
or call Tel No: 011-46579380, 40503451
Meeting the Cybersecurity Skills Challenge with CompTIA Security+CompTIA
In this document:
- Meeting the Cybersecurity Skills Challenge with CompTIA Security+
- Measuring CompTIA Security+ Difficulty
- Why Hybrid Testing Approaches Work Best
- Mapping the NICE Cybersecurity Workforce Framework
In Our Certified SOC Analyst course, candidates are taught by the industry’s most experienced trainers to acquire trending and in-demand technical skills. A Certified SOC Analyst Certification focuses on creating new career opportunities through extensive and meticulous knowledge paired with enhanced capabilities for a dynamic contribution to a SOC team.
A comprehensive Incident Handler Certification program was created to provide organizations with the skills and knowledge needed to manage post-breach consequences, and thereby reduce the financial and reputational consequences of an incident.
Addmissions are open to Computer Technician certificate program offered by Northwest State Community College of Ohio. The computer technician must have experience working on personal computers, experience working on networks and some programming experience.
In this document:
- Adapting IT Operations with CompTIA Cloud+
- Measuring CompTIA Cloud+ Difficulty
- Why Hybrid Testing Approaches Work Best
- Mapping the NICE Cybersecurity Workforce Framework
Bachelor of Information Technology Melbournevitseo1
Bachelor of Information Technology Melbourne industry is a dynamic and rapidly growing market. You'll graduate from our Bachelor of Information Technology with the technical, analytical, managerial, leadership and interpersonal skills required for success in the IT industry.
Information Technology Program: JCU SingaporeJcu Singapore
Modern business and society is increasingly computer reliant. In recent years the Internet and local computer networks have become essential everyday business tools. Not surprisingly, the IT industry is one of the world’s fastest-growing industries, and IT graduates can expect exciting and rewarding careers, anywhere in the world.
Query Individual AssignmentPrepare a query to report courses t.docxmakdul
Query Individual Assignment
Prepare a query to report courses that need to be completed for a Computer Science Minor, given a student ID.
Computer Science Minor
Students may minor in computer science by completing 18 credits of computer science courses. Those considering a minor in computer science should seek guidance from the CS undergraduate coordinator as early as possible. Students must complete the following courses:
Required Courses
• CSCI 2210 - Java Programming
• CSCI 2212 - Intermediate C Programming
• CSCI 2226 - Data Structures and Algorithms
• CSCI 3326 - Algorithm Design and Analysis
• Plus two CS electives at the 350 level or higher
Computer Science, B.S.
Return to: Tagliatela College of Engineering
Program Coordinator: Alice Fischer, Ph.D.
The bachelor’s degree program in computer science is nationally accredited by the Computing Accreditation Commission of the Accreditation Board for Engineering and Technology (CAC/ABET). Its objectives are to inform, challenge, and train our diverse student body for a constantly changing world of technology. This program develops a solid body of knowledge and understanding of computer hardware, software, and theory, as defined by the Association for Computing Machinery (ACM) curriculum guidelines.
At the time of graduation, every student should have achieved the following program outcomes:
· An ability to apply knowledge of computing and mathematics appropriate to computer science.
· An ability to analyze a problem, and identify and define the computing requirements appropriate to its solution.
· An ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs.
· An ability to function effectively on teams to accomplish a common goal.
· An understanding of professional, ethical, legal, security, and social issues and responsibilities.
· An ability to communicate effectively with a range of audiences.
· An ability to analyze the local and global impact of computing on individuals, organizations, and society.
· Recognition of the need for and an ability to engage in continuing professional development.
· An ability to use current techniques, skills, and tools necessary for computing practice.
· An ability to apply mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of computer-based systems in a way that demonstrates comprehension in the tradeoffs involved in design choices.
· An ability to apply design and development principles in the construction of software systems of varying complexity.
· Have a substantial body of knowledge and understanding of computer hardware, software, and theory, as defined by the Association for Computing Machinery (ACM) guidelines.
The program consists of a required core that exposes students to a wide range of computing and technology topics, including the study of databases, hardware, networks, programming, software design, and security. Advanced c ...
The article ‘Types of Computer Degrees’ comprehensively discusses various in-demand computer degrees. The article encompasses detailed information about the course curriculum and job prospects related to degrees in computer science, computer programming and computer technology and networking.
B.Sc Information Technology covers all the technical aspects such as software, database, networking, etc. Ample emphasis is also given on the mathematical and theoretical foundations of computing.
The Bachelor of Information Technology and Systems (BITS) focuses on delivering knowledge and skills in computer networking, application development and computer-based software to meet the current IT industry needs. The course ensures that graduates develop a broad and coherent body of knowledge in the underlying principles and concepts of information technology.
Achieved a degree in another discipline and now searching for a way to intensively develop your computing skills? Are you an IT graduate who is seeking to increase your knowledge in specialist areas?
Erau cybersecurity and security degreesERAUWebinars
Slides from a degree briefing presented in April 2018 covering Embry-Riddle degrees in Aviation Security and Cybersecurity. Covers the BS in Aviation Security, the MS in Cybersecurity Management and Policy, the MS in Cybersecurity Engineering, and Non-credit Aviation Cybersecurity 3-day course.
Future Prospects of Computer Engineering in India | Marwadi Universitymarwadiuniversity
Computer Science Engineering emphasizes the primary elements of computer programming as well as networking. This course is the most lucrative and competitive course to opt as the demand for computer engineers is increasing in India.
To experience excellent career advancement, enrol in one of the top BSc in Computer Science Colleges in Pune, MIT ACSC.
To know more details you can visit here: https://mitacsc.ac.in/blog/blogdetail.php?bsc-in-computer-science-colleges-in-pune
Diploma in IT Networking Courses qualification provides the skills and knowledge for an individual to be competent in high-level network management and engineering. This course also includes Microsoft Certified Administrator exam preparation.Visit Us at:https://www.vit.edu.au/courses/diploma-of-information-technology-networking/
The Bachelor of Information Technology Courses in Australia is an innovative program designed with input from major IT industry partners. All students can enrolled in the Bachelor of Information Technology. Refer to Entry Requirements: https://www.vit.edu.au/courses/bachelor-of-information-technology-and-systems-bits/
The study of computers and computational systems is known as computer science. Software and hardware systems in computers are the primary focus of computer science research. Algorithms, databases, software development, and programming are all important skills for these professionals to have. Analytical, mathematical, and problem-solving skills are typically demonstrated by those who are drawn to the field.
Graduates with a master's degree in computer science are prepared for high-paying careers in computer and information technology (IT). New computer technologies are created by computer scientists to address issues in education, healthcare, business, and science.
Computer hardware engineers, computer and information systems managers, and computer and information research scientists are all options for graduates. The Department of Work Measurements (BLS) projects a 22% work development rate, a lot quicker than normal, for PC and data research researchers from 2020-2030.
The best master's programs in computer science are listed on this page. We also talk about what a typical master's degree in computer science entails, possible careers for graduates, and how to select the right school.
Courses in technology are becoming increasingly popular as a result of the remarkable and consistent growth in the digital realm. Software engineering is one such region in which the instruction area takes an extraordinary interest.
• M.Sc in software engineering is a vocation-making course for PC devotees. This course attracts students with bachelor's degrees in computer science, computer applications, and other fields.
• M.Sc. A postgraduate program in computer science or computing may take two years to complete.
• The Ph.D. The goal of a course in computing is to give you the knowledge and skills to come up with creative solutions that the modern computing industry needs.
• Since computer science is one of the most popular Master of Science specializations, several institutions offer the M.Sc. in computing program in both traditional and distance learning formats.
• The range of computing applications and their importance to our way of life has expanded rapidly and gained more importance in recent years. There are many developments in artificial life in various fields like computer vision, robotics, mobile devices, and game applications that have all become a normal part of our interactions with computing devices.
• You might work under these same kinds of roles or titles after you complete your post-graduation with M.Sc. Computer Sciences. There might be many various variations of titles, but here are a few to start with:-
• IT Consultant
• IT analyst
• Technical Analyst
• Software Programmer
• Software Designer
• Product Development-Analyst or Architect
• Web Application Developer
• Database Administrator
• Professor
• Network Administrator
Similar to Saint Leo University by Study Metro (20)
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How libraries can support authors with open access requirements for UKRI fund...
Saint Leo University by Study Metro
1. No entrance exams required for the graduate portion
Preferential admission to the graduate program
Gaining a competitive edge over their peers, graduating
with two high-value degrees in less time
Ability to enter the workforce earlier, armed with an ad-
vanced degree that will likely increase career opportuni-
ties and earning potential
Savings by reducing the amount of tuition, fees and
housing costs necessary to earn both degrees
■ How to Apply
Visit www.saintleo.edu/accelprograms for more information
on how to apply. Students should apply for admission to
their graduate program of choice at the completion of their
second year.
■ Internships
A variety of internships are available through the Career
Planning Department. For further information, students
of Career Planning.
■ Honor Society
Upsilon Pi Epsilon (UPE) extends invitations for membership
only to the best and brightest business students. It encour-
ages and recognizes scholarship and accomplishment
among students of business, management, and administra-
tion to encourage and promote aspirations toward personal
and professional improvement and a life distinguished by
honorable service to humankind.
■ Career Outlook
Typical career paths for graduates include :
Software Engineer
Computer Scientist
Web Developer
System Software Developer
IT Security Analyst
Systems Analyst
Systems Integrator
Computer Programmer
Database Administrator
Network Administrator
■ What is the 3+1 Accelerated Degree Program?
The 3+1 accelerated degree program in computer science
is an intense yet rewarding and high-value opportunity for
in
just four years – a bachelor’s degree, followed by a Master
of Science in Cybersecurity.
■ Program Overview
The undergraduate computer science major with the infor-
mation assurance specialization is offered only at University
College, and is designed for students interested in working
in the computer technology industry, developing commer-
cial and industrial applications or computer models used in
scientific or engineering research.
Students learn to solve real-life problems involving the de-
sign, development, support and management of hardware,
software, multimedia and systems integration services. They
will practice computer techniques in a stimulating class-
room environment that uses the latest state-of-the-art tools
and technology. Students will also gain marketable skills in
programming, computer forensics, information security,
internet applications, and artificial intelligence
Students then complete the 3+1 program with the Master
of Science in Cybersecurity.
Students progress through the program at an accelerated
pace by taking additional courses throughout the year in-
cluding on-ground, online and summer course options.
■ Admission Requirements
Students who are eligible for the Saint Leo Honors Program
or are already in the program qualify for admission into the
3+1 accelerated degree program. Honors Program eligi-
bility requires a minimum 3.5 GPA and SAT score of
1150+ or ACT score of 25+ for first-year students. Stu-
dents who transfer from another National Collegiate Hon-
ors Council (NCHC)-recognized Honors program with a
minimum cumulative GPA of 3.5 are also eligible. Transfer
students with an A.A. or A.S. and a minimum GPA of 3.75
also qualify.
Students whose credentials fall just below the minimum eligibil-
ity requirements and are interested in being considered for
admission into a 3+1 accelerated degree program should
alert their Saint Leo admission counselor.
COMPUTER SCIENCE 3+1 ACCELERATED DEGREE PROGRAM
2. ■ Computer Science Curriculum
To complete a major in computer science, students will
need to take the following courses:
University Explorations 42 credits
Choosing Wellness 3 credits
First Year Experience 1 credit
Computer Science Major Requirements 48-51 credits
COM 203 Computer Systems
COM 204 Programming Logic and Design
COM 209 Programming in Java
COM 301 Algorithms and Data Structures
COM 309 Network Theory and Design
COM 312 Computer Architecture
COM 330 Database Concepts and Programming
COM 340 Introduction to Internet Applications
COM 405 Operating Systems
COM 416 Introduction to Information Security
COM 430 Software Engineering
COM 465 Artificial Intelligence
COM 497 Computer Science Capstone
MAT 151* College Algebra
MAT 152 Trigonometry
MAT 231 Calculus with Analytic Geometry I
MAT 251 Introduction to Discrete Mathematics
*Should be taken as the University Explorations basic math course.
Information Assurance Specialization 12 credits
COM 450 Network Defense and Security
COM 452 Computer Forensics
COM 470 Management of Information Security
COM 475 Penetration Testing
Additional Electives 6-9 credits
Total Credit Hours 123
Students in the 3+1 accelerated degree program follow
the same undergraduate and graduate curricula of our
traditional programs, but at a faster pace. Earning a bach-
elor’s degree of 123 credits in three years requires that
students take a minimum of 41 credit hours per year,
which may require a combination of on-campus, summer,
and online courses. Transferred credits will also impact
program completion time. AP, IB and dual enrollment
credits earned by high school students before graduation
are accepted.
■ Master of Science in Cybersecurity
COM 504 Cybersecurity Compliance and Legal Issues
COM 506 Database Security
COM 508 Software Security
COM 510 Management of Information Security
COM 512 Cybersecurity Risk Management
COM 514 Cloud Computing Security
COM 520 Systems Security Management
COM 530 Network Security Management
COM 545 Web Security Management
COM 546 Ethical Hacking
COM 548 Advanced Networking & Protocols
COM 590 Strategic Planning for Information Security
Total Credit Hours 36
■ Academic Advising
■ Program Advisor
Dr. Vyas Krishnan
Assistant Professor of Computer Science
Office: (352) 588-8512 Fax: (352) 588-8923
Email: vyas.krishnan@saintleo.edu
■ Department Chair
Dr. Derek Mohammed
Associate Professor and Chair
Dept. of Computer Science & Information Systems
Office: (352) 588-8413 Fax: (352) 588-8923
Email: derek.mohammed@saintleo.edu
Revised 10-2015
3. ■ Program Overview
The Bachelor of Science degree in Cybersecurity prepares
graduates with knowledge and skills necessary to assume
leadership roles in the fields of information assurance and
computer security. The degree program will prepare students
for entry-level positions in career-track job in cybersecurity.
Students will be educated in the technical aspects of cyberse-
curity systems, as well as legal and management issues of
information security.
Learn to solve real-life problems involving the design, devel-
opment, support and management of hardware, software,
network, and systems for securing information resources.
Practice computer techniques in a stimulating classroom and
laboratory environments that use the latest state-of-the-art
tools and technology. Gain marketable skills in network de-
fense, internet security, ethical hacking, computer forensics,
and managing information security.
■ Career Outlook
Typical career paths for graduates include :
Cyber Analyst
Security Engineer
Security Analyst
Information Security Engineer
Network Security Engineer
Information Security Manager
Information Technology Security Analyst
Security Administrator
IT Auditor
Database Security Manager
Required Coursework
University Explorations 42 credits
Choosing Wellness 3 credits
First Year Experience 1 credit
Includes courses such as computer skills, English composition,
math, the sciences, historical perspectives, religion, social
science, etc.
■ Core Major Requirements
All of the following courses 75 credits
COM 203 Computer Systems
COM 207 Programming in C/C++
COM 209 Programming in JAVA
COM 212 System Administration
COM 309 Network Theory and Design
COM 312 Computer Architecture
COM 315 Decision Support Systems
COM 320 Systems Analysis & Design
COM 330 Database Concepts and Programming
COM 340 Intro to Internet Applications
COM 355 Systems Security
COM 405 Operating Systems
COM 416 Introduction to Information Security
COM 420 Disaster Recovery
COM 430 Software Engineering
COM 450 Network Defense and Security
COM 452 Computer Forensics
COM 460 Internet/Intranet Security
COM 470 Management of Information Security
COM 475 Penetration Testing
CRM 123 Introduction to Law and the Legal System
CRM 222 Introduction to Homeland Defense
GBA 231 Business Law I
MAT 141* Finite mathematics
MAT 201 Introduction to Statistics
* Should be taken as part of University Explorations basic
math course.
Total Credits 121
*Program pending SACSCOC approval
CYBERSECURITY
4. ■ Information Systems Minor
Students may minor in IS with any university major.
COM 203 Computer Systems
COM 207 Programming in C/C++
COM 315 Decision Support Systems
COM 320 System Analysis and Design
COM 330 Database Concepts and Programming
Total Credits 15
■ Information Security Minor
Students may minor in Information Security with any
university major.
COM 203 Computer Systems
COM 309 Network Theory and Design
COM 416 Introduction to Information Security
COM 420 Disaster Recovery
COM 470 Management of Information Security
Plus one of the following courses :
COM 425 CIS Internship or
COM 450 Network Defense and Security or
COM 452 Computer Forensics or
COM 460 Internet/Intranet Security
Total Credits 18
■ Computer Programming Minor
The computer programming minor allows non-CIS stu-
dent majors to develop computer programming skills.
The minor may be combined with a number of majors
to enhance students’ IT skills.
COM 203 Computer Systems
COM 207 Programming in C/C++
COM 209 Programming in Java
COM 333 Web Design and Program Resources
COM 340 Introduction to Internet Applications
Total Credits 15
■ Accreditation
Saint Leo University is accredited by the Commission
on Colleges of the Southern Association of Colleges
and Schools (SACS). The business curriculum is also
accredited by the International Assembly for Collegiate
Business Education (IACBE) and the Accreditation
Council for Business Schools and Programs (ACBSP).
■ Faculty Contact Information
Dr. Derek Mohammed
Chair, Department of Computer Science &
Director of CCE
Office: (352) 588-8513 Fax: (352) 588-8923
Email: derek.mohammed@saintleo.edu
Mrs. Eva Groudas
Instructor of Computer Information Systems
Office: (352) 588-7439 Fax: (352) 588-8923
Email: eva.groudas@saintleo.edu
Mr. Joshua Adams
Instructor of Computer Information Systems
Office: (352) 588-7410 Fax: (352) 588-8923
Email: Joshua.adams03@saintleo.edu
Dr. Vyas Krishnan
Assistant Professor of Computer Science
Office: (352) 588-8512 Fax: (352) 588-8923
Email: vyas.krishnan@saintleo.edu
Dr. Michael Moorman
Professor of Computer Science
Office: (352) 588-8317 Fax: (352) 588-8923
Email: michael.moorman@saintleo.edu
Dr. Van Nguyen
Assistant Professor of Computer Science
Office: (352) 588-8615 Fax: (352) 588-8923
Email: van.nguyen@saintleo.edu
Dr. Marwan Omar
Assistant Professor of Computer Information Systems
Office: (352) 588-7410 Fax: (352) 588-8923
Email: marwan.omar@saintleo.edu
Dr. Bryan Reagan
Associate Professor of Computer Information Systems
Office: (352) 588-7803 Fax: (352) 588-8923
Email: bryan.reagan@saintleo.edu
Dr. Michael Rogich
Professor of Computer Information Systems
Office: (352) 588-8426 Fax: (352) 588-8923
Email: michael.rogich@saintleo.edu
Revised 12-2015
5. F-1 Curricular Practical Training (CPT)
The purpose of practical training is to allow F-1 students the opportunity to apply theoretical
knowledge obtained in academic programs to a practical work experience. There are two
different types of practical training: curricular practical training and optional practical training.
This page discusses the rules and procedures that govern curricular practical training.
Definition of Curricular Practical Training
United States Citizenship and Immigration Services (USCIS) regulations state that curricular
practical training must be an "integral part of an established curriculum." They define curricular
practical training as "alternate work/study, internship, cooperative education, or any other type
of required internship or practicum which is offered by sponsoring employers through
cooperative agreements with the school." 8 C.F.R. 214.2 (f) (10) (i)
Eligibility
The student must have been lawfully enrolled on a full-time basis for one full academic year
before being eligible for CPT. An exception exists for graduate students whose programs require
immediate curricular practical training. It is available only while the student is in valid F-1 status
and before the completion of his/her program. Students in English Language Programs are not
eligible for CPT.
Criteria
The International Services Office can authorize curricular practical training for you if it
can be clearly documented that the proposed employment meets one of the three conditions
below.
1. The training employment is required of all degree candidates in the program and is
necessary for the awarding of the degree. Included in this category is employment in a
required internship or practicum.
2. The training employment will result in the awarding of academic credit primarily, if
not solely, on the basis of the training experience. Included in this category is
employment for a course specifically designed to award academic credit for an
employment experience. Also included in this category is employment that will result in
the award of at least one course credit for an independent study. In both of these cases
you must register and complete the course during the period that you are working under
CPT authorization.
3. Students in dissertation status where the training opportunity is an absolutely
necessary component of the student's research without which the dissertation
cannot be completed may be authorized to undertake CPT. A letter from the student's
6. dissertation advisor explaining in detail the relationship between the proposed
employment and the student's dissertation research must be provided.
Part-Time vs. Full-Time Curricular Practical Training
Part-time Training. During the school year while classes are in session, students can engage in
CPT on a part-time basis, limited to no more than 20 hours per week. There is no limitation on
the length of time you may participate in part-time curricular practical training, but you must be
maintaining lawful F-1 status.
Full-time Training. A student can engage in full-time CPT during official University breaks and
vacation. Full-time CPT allows the student to work more than 20 hours per week. There is no
limitation upon the length of time you may participate in full-time CPT, however, if you
participate in 12 months or more of curricular practical training you will not be eligible for
post-completion practical training.
Application and Documentation Requirements
If you are unsure about your eligibility for CPT, you should first meet with the International
Services Office (if possible, please bring any of the below documents to the initial consultation).
Otherwise, to apply for CPT, you must meet with the International Services Office and bring the
following documents with you:
The official offer letter on company letterhead that is signed by the prospective employer.
A photocopy is acceptable. The letter should include the employer's name, address and
dates of employment.
A letter from your academic advisor recommending the practical training experience and
explaining the academic requirements that the proposed employment will fulfill. See
guidelines for the academic advisor letter below.
Proof of registration for CPT credits if you are earning academic credit for the training.
Note: you must be registered for CPT credits in the same semester during which the work
will be done. (i.e. You must be registered for CPT credits in the summer if you will be
working in the summer.)
Authorization Procedures
If you are eligible and have the documentation required for CPT, we will authorize CPT by
requesting a new SEVIS I-20. You may engage in CPT employment only after you have received
the I-20 with your CPT authorization from the International Services Office. This work
authorization is only for the specific employer, location, time period and on a part-time or full-
time basis as approved and recorded by the International Services Office in SEVIS. You must
not continue employment beyond the date authorized unless you apply and are granted an
extension of your permission to work. To do so would be a violation of your nonimmigrant
student status and would render you illegally present in the US, beyond the ability of the
International Services Office or USCIS to regularize your status.
7. Social Security Number
In order to work in the US, you will need a valid Social Security number (your Saint Leo
University ID number is not a valid Social Security number). The Social Security Administration
will process your application and a number will be sent to you. To apply, please visit the
International Services office for instructions.
Taxes
In general, F-1 students who have been in the US for no more than five calendar years are
exempt from social security taxes (also known as F.I.C.A. tax). You should be sure to bring this
to the attention of your employer because many employers are not familiar with this provision of
the tax laws. Students in F-1 status are subject to all other taxes that may apply, including
federal, state and local.
Employment Eligibility Verification
Within the first three days of beginning work, you and your employer must complete a form
entitled Employment Eligibility Verification (USCIS Form I-9). This form will be kept on file by
your employer and must be updated each time you receive a renewal of your work permission.
Your SEVIS CPT I-20 should meet the documentation requirement of the I-9.
Failure to Comply with Regulations
It is your responsibility to comply with all immigration regulations which apply to F-1 students,
including employment regulations. Working without the proper authorization is a serious
violation of your student status. If you fail to comply with your responsibilities, you may not be
eligible for benefits normally granted to F-1 students, and, in some situations, may be subject to
deportation. Prior to accepting any employment in the US, we urge you to consult with the
International Services Office.
Guidelines for Academic Advisors Recommending
Curricular Practical Training (CPT)
Instructions
All letters of recommendation should include the following:
Student information:
Name
Degree level
Major and/or field of specialization
8. Proposed employment information:
Employer's name and address
Title of position
Duties of position
Beginning and ending dates of employment (if applicable, employment must be in the
same semester as the registration for academic credit required for the CPT work
authorization)
In addition, please provide information on the academic component of the proposed
employment. Include the requested information as listed below when you explain why your
student should be granted CPT:
1. If the training employment is required of all degree candidates in the program and is necessary
in the awarding of the degree:
Verification that the internship or other employment is required of all students in the
program
Or...
2. If the curricular practical training will result in the awarding of academic credit:
Description of how the proposed employment is related to the student's field of study
Course number, semester of registration, and number of course credits
Ratio of hours worked to credits earned
Evaluation method (e.g. written reports, journal, site visits, etc.)
Grading scale
Or...
3. If the curricular practical training is an absolutely necessary component of the student's
dissertation, without which the dissertation cannot be completed:
Detailed explanation of the relationship between the proposed employment and the
student's dissertation research.
Adapted from the University of Pennsylvania documentation
9. APPLICATION FOR GRADUATE ADMISSION
Applications are complete and ready for review when all of the following materials have been
received:
Completed and signed application form (with applicable application fee)
Official Transcript(s) from ALL postsecondary institutions attended
Professional Recommendations: MBA (2), MACC (2), MCS (2), DBA (2), Education (2), Social
Work (3), and Theology (1)
Statement of Professional Goals: 250 words- MBA,MACC, MCS, Education, and Theology
Statement of Professional Goals: 3-5 pages - Social Work and DBA
Current Resume: MBA/MACC (Work experience of two years), Education, and Social Work
Copy of Professional Teaching Certificate (graduate education program only, if required)
Official GMAT for MACC
Official testing scores (if required for MBA, Education, or Social Work)
International application materials (if required)
Name Social Security Number
__________________________________________________________________________________________ _______________________
Last First Middle Maiden name/Other Name
Current Address Date of Birth / Gender
__________________________________________________________________________________________ ____/___/_____ M / F
Number and Street City State Zip Country
Permanent Address (if different than above) Home Telephone
___________________________________________________________________________________________ _______________________
Number and Street City State Zip Country
Email Address Work Telephone Cell/Other Telephone
______________________________________________________________________________________________________________________________________________ _________________________________________________________ ____________________________________________________
Indicate the session and year for which you are seeking admission.
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Year- 20_________
□ Fall (Session 1)
□ Fall (Session 2)
□ Spring (Session 1)
□ Spring (Session 2)
□ Summer (Session 1)
□ Summer (Session 2)
Indicate the program to which you are applying.
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Graduate Business Programs
□ Doctorate in Business Administration (DBA)
□ Master of Accounting (MACC) campus program
□ Master of Accounting (MACC) online program
□ Master of Business Administration (MBA) weekend program
□ Master of Business Administration (MBA) online program
□
MBA online w/Concentration in Accounting□
MBA online w/Concentration in Health Care Management
□ MBA online w/Concentration in Human Resource Management
□ MBA online w/Concentration in Information Security Management
□ MBA online w/Concentration in Marketing
□ MBA online w/ Concentration in Marketing Research & Social Media
□ MBA online w/Concentration in Project Management
□ MBA online w/Concentration in Sport Business
□ MS in Cybersecurity (M C S)
□ Graduate Certificate in _________________
(ACC, HCM, HRM, ISM, MKT, MKT.RSMA, PM, SP)
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Graduate Criminal Justice Programs
□ MS in Criminal Justice Administration
□ MS in Criminal Justice/Corrections spec. track
□ MS in Criminal Justice/Critical Incident Management spec. track
□ MS in Criminal Justice/Behavioral Science spec. track
□ MS in Criminal Justice/Forensic Science spec. track
□ MS in Criminal Justice/Legal Studies spec. track
□ MS in Critical Incident Management program
□ Graduate Certificate in Criminal Justice Administration
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Graduate Education Programs
□ MED w/Concentration in Educational Leadership
□ MED w/Concentration in Exceptional Student Education
□ MED w/Concentration in Instructional Leadership
□ MED w/Concentration in Reading
□ MS in Instructional Design
□ Graduate Certificate in Instructional Design
□ Graduate Certificate in Reading
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Graduate Social Work Programs
□ MSW online w/Concentration in Advanced Standing □ MSW online w/Concentration in Advanced Clinical Practice
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Graduate Theology Programs
□ Master of Arts in Theology □ Graduate Certificate in Theology
□ Online □ University Campus
□ Savannah Campus □ Virginia Campus
□ Diocese- Location:________________________________
v. 2.14 (Continued on next page)
Master of Business Administration a a p a
□
10. Have you ever been convicted of a felony? If “yes” please explain below or use separate sheet if more space is needed.
□ No □ Yes _________________________________________________________________________________________________
Citizenship Information
□ Yes, I am a citizen of the United States
□ No, I am a permanent Resident of the United States or hold a United States Visa
________________________________________________________________________________________________________________________
Country of Citizenship Type of Residency/Visa Number Expiration Date
Employment Information
________________________________________________________________________________________________________________________
Name of Company Your Position Title How long?
Education Information – List ALL postsecondary institutions attended, with most recent listed first. Official transcripts are
required from all.
NAME OF INSTITUTION
MAJOR COURSE OF
STUDY
DATES
ATTENDED
DEGREE
CONFERRAL
CONFERRAL
DATE
Y / N
Y / N
Y / N
Y / N
Y / N
Testing Information
□ GMAT (Graduate Management Admissions Test) Date Taken _____/ ____/ _______ Score Given _______________
□ GRE (Graduate Records Exam) Date Taken _____/ ____/ _______ Score Given _______________
□ MAT (Miller Analogies Test) Date Taken _____/ ____/ _______ Score Given _______________
Military Information
Are you active duty? □ Yes □ No Are you retired from the military? □ Yes □ No Are/were you an □ Officer □ Enlisted
Branch of Service _______________________ Are you a spouse/depend. who is active duty or retired from the military? □ Yes □ No
Financial Information
Are you applying for Veterans Administration Benefits? □ Yes □ No
If yes, please indicate which benefit you plan to use.
□ GI Bill-CH. 30/34 (MGIB)
□ Post 9/11 GI Bill-CH. 33
□ Selected Reserve-CH. 1606 (MGIB-SR)
□ Selected Reserve-CH. 1607 (REAP)
□ VEAP-CH. 32
□ Veteran Survivor/Dependant-CH. 35
(DEA)
Are you applying for loans? □ Yes □ No
Are you eligible for State Vocational Rehabilitation? □ Yes □ No
________________________________________________________________________________________________________________________
How did you hear about Saint Leo University?
□ Email
□ Internet
□ Newspaper ________________________
□ Radio ____________________________
□ Television ________________________
□ Other (please indicate)_______________
CERTIFICATION: I certify that the information given on this application is complete and correct to the best of my
knowledge, and that I have attended no postsecondary institutions other than those listed.
Signature: ______________________________________________________________________ Date: ________________________________
Please mail, fax or e-mail to: Saint Leo University / Office of Graduate Admission – MC2248 / P.O. Box 6665 / Saint Leo, FL 33574
Fax (352) 588-7873 / E-mail: grad.admissions@saintleo.edu
v. 02.14