Curricular Excellence

Curricular Excellence

Michigan Tech's Cybersecurity bachelor of science degree program is designed to align with the ACM Cybersecurity Curricular Guidelines (CSEC 2017), the National Initiative for Cybersecurity Education (NICE) Workforce Framework, the ABET Cybersecurity accreditation criteria, and the National Center of Academic Excellence in Cyber Defense (CAE-CD) designation requirements.

Data on annual student enrollment and degrees awarded can be viewed by clicking on the following two links: annual enrollment and annual degrees awarded

Michigan Tech has allowed me to achieve potential that I would not have thought possible at other universities, both professionally and technically.

Ethan Brinks
Ethan Brinks
3rd-year Cybersecurity Major

Program Educational Objectives

Program Educational Objectives (PEOs) describe the attributes that we aspire for our graduates to possess three to five years after graduation. The BS degree program in Cybersecurity will prepare graduates with the technical and managerial skills necessary to enter careers in securing, developing, and managing computer infrastructure and applications.

  • PEO1: Graduates of the program will be prepared for their first position within the field.
  • PEO2: Assuming positions of technical and management leadership within their respective organizations.
  • PEO3: Working in cross-functional teams providing expert knowledge in the area of cybersecurity and information technology.
  • PEO4: Employers will be satisfied with the performance of the program graduates’ skills including written and verbal communication in a professional environment, and professional ethics.
  • PEO5: Exercising continuous improvement, with a focus on quality and a commitment to continuous learning.

Student Outcomes /
Program-Level Learning Outcomes

The Cybersecurity Student Outcomes (for ABET) or Program-Level Learning Outcomes (for CAE-CD) capture the desired attributes that the Cybersecurity program at Michigan Tech aspires to impart to its students through the curriculum and academic experience.

Graduates of the program will:

  • Outcome1: Analyze a complex computing problems and apply principles of computing and other relevant disciplines to identify solutions.
  • Outcome2: Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • Outcome3: Communicate effectively in a variety of professional contexts.
  • Outcome4: Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Outcome5: Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • Outcome6: Apply security principles and practices to maintain operations in the presence of risks and threats.

More Info