Computer Networking & Cybersecurity Learning Outcomes

Upon completion of their academic requirements, graduates of Champlain College's undergraduate Computer Networking & Cybersecurity Program will be able to:

  • explain the concepts of confidentiality, availability and integrity (CIA) in context of Information Assurance; articulate the threats to CIA and be able to analyze a given architecture, discern vulnerabilities and recommend physical, logical or administrative controls to mitigate the threat; (Cybersecurity Fundamentals - Theory)
  • demonstrate expertise in configuring host and network level technical security controls to include host firewalls, user access controls, host logging, network filtering, intrusion detection and prevention and encryption at all levels; (Managing Security - Applied)
  • describe the hardware, software and services that comprise an enterprise network and be able to articulate how these components integrate to form a network solution; (Network Integration - Theory)
  • explain key networking protocols and their hierarchical relationship in the context of a conceptual model such as the OSI and TCP/IP framework; be able to articulate the low level data communications and subsequent abstractions that allow networked hosts and applications to communicate across the internet; (Networking Protocols - Theory)
  • build a multiple host and network architectures given business requirements and constraints; student will configure operating systems, network specific services, routing, switching, and remote access solutions; (Networking - Applied)
  • describe the components of a computer, their role and function and discuss how cpu, memory, storage and network resources are leveraged by systems software; articulate the various forms of virtualization; (Systems - Theory)
  • manage multiple operating systems, systems software, network services and security and demonstrate analytical skills in identifying and troubleshooting networking, security and performance issues; (Managing Systems - Applied)
  • identify core networking and infrastructure components and the roles they serve; and given requirements and constraints, design an IT infrastructure including devices, topologies, protocols, systems software, management and security; (IT Infrastructure - Theory)
  • analyze business requirements, research, develop and integrate solutions for enterprise IT requirements; balance business, technical and security requirements and constraints.; integrate operating systems, services, network devices, and security controls to meet the requirements; (Developing Infrastructure Solutions - Applied)
  • effectively communicate technical information to audiences with different levels technical sophistication; communicate this information verbally in formal, technical documentation and in presentations; and (Communication)
  • serve as a contributing member or leader of a small and project focused team; be able to clearly identify and document issues adversely affecting the team's performance and communication and apply these lessons to future teams. (Teamwork)