Department of Computer Science - Master of Science in Cybersecurity

z-2021-2022 - PROGRAM - New Major (Step 2) - Full Proposal

completed

What can I do next?

View the Proposal

  • View changes to the proposal by clicking the Discussion tab and selecting "Show current with markup" on the User Tracking dropdown.
  • View current comments concerning this proposal by clicking the Discussion tab.
  • View the history of the proposal by clicking the Workflow Status tab.
  • View the signatures the proposal has collected by clicking the Signatures tab.
  • View the files associated with the proposal by clicking the Files tab.
  • Compare the proposal with related proposal by clicking the Proposal Lookup tab.
Help Text
  • Please turn on the help text before starting this proposal. Items with help text indicating format should be typed in the exact format as the help text (excluding the quote marks).

ACALOG REQUIRED FIELDS
  • Select Program below.  

    Shared Cores are available in Acalog for shared information in program curriculum.

  • Type of Program*
  • Status*
Determine Substantive Change Status
  • 1.) Will any courses for this program be new courses?*
  • If you will be using or repackaging existing courses only, enter "0" in questions 1.a and 1.b.

  • 1.a.) What is the total # of new courses that are being created?*
    13
    13
    1.b.) What is the % of the overall total courses, that will be new courses?Text Field*
    100%
    100%
  • 2.) Will this program require new faculty / equipment / Labs?*
  • 3.) Will the program require hiring new faculty before the program can begin?*
  • 4.) Will the program be taught at a new offsite locatioin? (does not include online)*
  • 5.) Will this be a completer program?*
  • What similar or closely related certificates or programs do we currently offer? (If we do not offer any similar programs, enter "NONE")*

    We have a BS in Cybersecurity which is the closest related program to this.  We have no similar programs at the graduate level (the MSCIT program has some overlap but that program is being suspended and likely deleted).

  • If you answered "Yes" to any of the questions 1 - 5 please mark the next questions Yes.

  • Will this constitute a SACSCOC Substantive Change?*
  • If you have question about substantive change, please contact the SACSCOC Liaison, Abdou Ndoye at ndoyea2@nku.edu or 859-572-5379

    For additional information about types of substantive changes, please see the document at Substantive Change Form.

BASIC INFORMATION
  • All actions in the approval of new programs for public institutions are subject to a stipulation regarding the program’s ability to attain specified goals that have been established by the institution and approved by the Council on Postsecondary Education (the Council). At the conclusion of an appropriate period of time, the program’s performance shall be reviewed by Council staff following criteria established in the Council’s Academic Programs Policy.

  • Identify Purpose of Proposal*
  • College*
  • Department*
    (e.g. Department, Division, School)
  • Title of Proposed Program*
    Master of Science in Cybersecurity
    Master of Science in Cybersecurity
  • Degree Level*
  • Degree Designation*
  • Description for Catalog:*

    The online Master of Science in Cybersecurity program prepares students for rewarding careers in one of the fastest growing areas of information technology. Students will learn both the theory and practice of cybersecurity, including how to protect and defend systems, identify and handle security incidents, and manage risks. Practical hands-on activities on local systems and in the cloud will be included in most courses. Northern Kentucky University is a DHS/NSA Center of Academic Excellence in Cyber Defense Education.

    This Description will appear in the catalog.
  • Undergraduate or Graduate Program?*
  • Does this proposal require TEC approval?*
  • Proposed Implementation / Start Date*
    Fall, 2021
    Fall, 2021
  • CONTACT INFORMATION
  • Name of Program Director*
    James Walden
    James Walden
  • Title
    Professor, Computer Science
    Professor, Computer Science
  • Email Address
    waldenj1@nku.edu
    waldenj1@nku.edu
  • Phone Number:
    859-572-5571
    859-572-5571
  • ADDITIONAL INFORMATION
  • a. Is an approval letter from Education Professional Standards Board (EPSB) required?
  • b. Is there a specialized accrediting agency related to this program?
  • -- If Yes, identify the accreditor.
  • -- If Yes, will accreditation be sought?
  • c. Total Hours required for degree
    30
    30
  • d. Total required Program Core Hours
    24
    24
  • e. Total required Guided Electives hours:
    6
    6
  • f. Does this program have a clinical component?
  • -- If Yes, discuss the nature, appropriateness, and availability of clinical sites.
  • ABSTRACT (limit one page or less)
  • This information would be the same as abstract (section 1) from SACSCOC's Substantive Change Form.

  • a. Describe the new program with its estimated date of implementation.

    The online Master of Science in Cybersecurity program prepares students for rewarding careers in one of the fastest growing areas of information technology. Students will learn both the theory and practice of cybersecurity, including how to protect and defend systems, identify and handle security incidents, and manage risks. Practical hands-on activities on local systems and in the cloud will be included in most courses. Northern Kentucky University is a DHS/NSA Center of Academic Excellence in Cyber Defense Education.

    Fall, 2021

  • b. Specify any distinctive qualities of the program.

    While MS/cybersecurity program will focus on technical skills, demonstration of oral or written presentation skills will also be required in each course. Classes will be taught in an accelerated, online format in collaboration with Academic Partnerships.

  • J. Identify where the new program will be offered.
  • Identify where the new program will be offered.

    It will be used within the Department of Computer Science at NKU but will be offered solely as an online program through AP.

  • a. Provide projected number of students.

    75

  • b. Indicate the projected life of the program, (if applicable)
  • c. Describe the primary target audience.

    Career changers who already have a degree in another field and who want to move into a career in cybersecurity.

  • d. Instructional Delivery Methods to be used*
  • Will this program utilize alternative learning formats (e.g. distance learning, technology-enhanced instruction, evening/weekend classes, accelerated courses)? *
  • e. Describe strengths of the institution to undertake this new program.

    NKU is a DHS/NSA Center of Academic Excellence in Cyber Defense Education, with extensive experience providing cybersecurity education starting in the late 1990s. NKU already offers a Bachelor of Science in Cybersecurity degree, along with a Cybersecurity track in the Bachelor of Science in Computer Information Technology. The university also offers minors in computer forensics and information security, along with an undergraduate certificate in cybersecurity. Five full time faculty members specialize in cybersecurity education and research.

DETERMINATION OF NEED
  • Determination of need for the relationship to mission/planning and approvals for the new program.

  • a. Describe how the New Program is consistent with the mission and goals of the institution.*

    NKU has a strong institutional focus on informational fields. In 2005, the university created the College of Informatics (CoI) as a home for a broad range of computational and informational programs. Current CoI degree programs include communication, computer science, cybersecurity, data science, health and library informatics, information systems, and information technology. NKU has offered individual cybersecurity courses since the 1990s and currently offers a wide variety of cybersecurity programs, including a B.S. in cybersecurity, minors in computer forensics and information security, certificates, and undergraduate degree tracks in the information systems and information technology B.S. degrees. NKU became a DHS/NSA Center of Academic Excellence in Cyber Defense Education in 2014.

  • b. Describe the rationale and need for the program to include how the institution determined need.*

    A. Industry Need

    In 2020, the Bureau of Labor Statistics released its forecast of 20 fastest growing occupations with the highest percent change of employment between 2019-29 [1]. Information security analysts is one of these fastest growing occupations, with a 31% growth in number of available jobs. According to BLS website “Demand for information security analysts is expected to be very high, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks.” The quick facts card from the Bureau of Labor Statistics is shown below:

     

    Table 1. Quick Facts: Information Security Analysts

    2019 Median Pay

    $99,730 per year
    $47.95 per hour

    Work Experience in a Related Occupation

    Less than 5 years

    Number of Jobs, 2019

    131,000

    Job Outlook, 2019-29

    31% (Much faster than average)

    Employment Change, 2019-29

    40,900

     

    We also researched the demand for cybersecurity graduates using the federal government’s CyberSeek web site (cyberseek.org). On December 17, 2020, there were the following numbers of open cybersecurity job positions, indicating a high demand for cybersecurity talent:

    National open positions: 521,617

    Kentucky open positions: 2,333

    Greater Cincinnati metropolitan area open positions: 2,514

    The Master of Science in Cybersecurity Committee conducted an Employer/Professional survey (see Addendum - Employer Survey) of a broad spectrum of organizations that would be likely to employ graduates from the MS in Cybersecurity program. E-mail requests for participation in an online survey were forwarded to many individuals from the tri-state region including employers in the areas of healthcare, government, technology-related business, retail, and education. Since we encouraged people to share this survey, it is difficult to estimate how many cybersecurity professionals were contacted. The survey was conducted between October 20, 2020 and November 6, 2020. We received 42 answers from 28 organizations. It should be noted that many of these organizations had no prior ties to the department or to faculty or programs at the University.

    The results of the survey are summarized in Addendum - Employer Survey Results. It is worth mentioning that 23 out of 34 respondents answered that their employer has difficulties in finding qualified cybersecurity professionals, and 23 out of 36 considers that their employer will be interested in hiring graduates of this new proposed MS in Cybersecurity program (12 answers were “I do not know” – respondents not being part of the hiring decisions).

    All respondents were asked to provide comments and suggestions as well as to answer questions regarding most important cybersecurity topics and certifications. All open answers are also included in Addendum - Employer Survey Results.

    B. Student Demand

    We are very fortunate to work with a top marketing company in the education area, Academic Partnerships. While our partner is well more knowledgeable in assessing the student demand, the Master of Science in Cybersecurity Committee anticipates that two categories of individual to be interested in the proposed program. These categories are:

    • Individuals with bachelor degrees in a more or less related area that understand the increased demand for cybersecurity occupations and want to shift their career path. They are already at a point where they want to pursue a Master degree and they will not consider going back to pursue a new Bachelor degree. We anticipate that the majority of our potential students fit into this category.
    • Individuals with technical degrees (such as BS in Computer Science, Computer Engineering, Cybersecurity, Information Technology, etc.) with some cybersecurity experience who want to refine their knowledge.

    To assess the market demand from outside NKU we used the Employer/Professional survey already described in the previous section. As you can see from the results presented in Addendum - Employer Survey Results, there is great potential of recruiting professionals not affiliated currently with NKU. The industry need and the salary range for MS in Cybersecurity graduates will likely provide a significant draw for students.

    To ascertain demand from current NKU students, the Master of Science in Cybersecurity Committee conducted an online Student survey (see Addendum - Student Survey). The survey was e-mailed to all students that are part of a Canvas group created for students with enrolled in a program hosted in the Computer Science Department, approximately 800 students.

    We received a total of 35 answers. The results of the survey are summarized in Addendum - Student Survey Results. The student’s comments are also included in Addendum - Student Survey Results.

    A few direct measures of potential student demand and interest are presented below:

    • 30 students out of 35 are at least somewhat likely to apply for MS in Cybersecurity admission. Out of those, 5 are very likely to apply and 8 are likely to apply.
    • All suggested cybersecurity topics are ranked high in terms of student’s interest.

    Based upon the results of the student and employer/professional surveys, there appears to be significant student demand for an MS in Cybersecurity.

     

  • c. Provide evidence of legal authority for the change/addition of new program, if approval is required by the governing board or the state.*

    N/A

  • d. Provide documentation that faculty and appropriate other groups were involoved in planning for the approval(s)

    New degree proposals at NKU must undergo a multistep process, starting with faculty discussions and including approval by the department and the college curriculum committee before going on to the University Curriculum Council (UCC) and Faculty Senate. Graduate programs must obtain approval from Graduate Council before requesting UCC approval. Once faculty senate approves a degree program, the proposal must be approved by the Academic Affairs Council, which includes deans and other administrators.  Documentation for the process can be found at https://inside.nku.edu/viceprovost/curriculum/program_approval.html.

CURRICULUM
  • CPE requires we upload the curriculum in their Excel template.  Click here to download the course template.  All Course Descriptions must be included in the template.  Once you have completed this template attach the document using the <Files> option in the right hand tool bar.

  • Attached*
  • Follow the directions below to add/create proposed curriculum from the CPE template you have uploaded.

    Prospective Curriculum Field

    Step 1

    There are two options to add courses for proposed changes: "Add Course" and "Import Course." For courses that already are in the catalog, click on "Import Course" and find the courses needed. For new classes that are currently going through the Curriculog Approval Process click on "Add Course"-- a box will open asking you for the Prefix, Course Number and Course Title.

    Step 2

    Click on "View Curriculum Schema." Click on "Add Core" which will be the header for your course groups of the program. After creating the different sections you can proceed to assign courses in each header by clicking on "Add Courses" this will bring up the list of courses available from Step 1. Select the courses you wish to add and reorder as needed by dragging courses. For removing courses click on the trash can.

    Commonly used headers: Degree Requirements, Core Courses, Electives.

  • Prospective Curriculum*
REQUIRED INFORMATION FOR NEW PROGRAMS
  • Provide specific programmatic goals for the program. *

    Upon graduation, students should be able to

    1. demonstrate problem solving skills needed to obtain employment in the field of cybersecurity,
    2. effectively communicate using both oral and written media,
    3. incorporate ethical and social issues in their decision making,
    4. continuously learn and grow their cybersecurity skills.
  • Provide specific student learning outcomes for the program.
    <p>Explain the processes and technologies needed to secure the information infrastructure of a modern organization. (Cybersecurity Fundamentals, Cloud Security, Network Security)</p>
    <p>Apply security principles and practices to maintain operations in the presence of risks and threats. (Cybersecurity Fundamentals, Cloud Security, Ethical Hacking)</p>
    <p>Investigate digital evidence with appropriate tools to detect and analyze security incidents. (Incident Response)</p>
    <p>Design secure cyberinfrastructure applying security principles. (Security Architecture, Cloud Security).</p>
    List all student learning outcomes for the program.
  • Describe assessment procedures for the proposed program. These procedures may include evaluation of courses and faculty by students, administrators, and departmental personnel as appropriate. Program review procedures shall include standards and guidelines for the assessment of student outcomes implied by the program objectives and consistent with the institutional mission.

    For each assessment method, please provide direct indicators of achievement of program-level student learning outcomes and frequency of data collection:

  • Describe how the student learning outcomes for the program will be assessed?*

    The MS in Cybersecurity assessment plan aims to continuously improve the quality of this graduate degree program. To accomplish this purpose, we plan to implement all four stages needed for a program assessment:

        1. Review program SLOs and update them if necessary.

        2. Design the assessment instruments and rubrics.

        3. Create a clear process for data collection and analysis

        4. Make decisions to improve the program based on assessment data.

    We plan to follow our home department's policy of assessing one SLO per semester, allowing us to assess all 4 program SLOs in a two year cycle. The department assessment coordinator will schedule faculty each semester to collect artifacts for the SLO being assessed. Faculty teaching the course will include the testing instrument among their normal course assessment. The assessment coordinator will collect assessment artifacts at the end of the semester. After the end of the semester, the program director and faculty who teach the courses being assessed will evaluate the artifacts and compare the results to the target. Based on results of that semester's assessment, this group will suggest possible courses of actions, such as altering course content, changing assessment instruments, making substantive changes to curriculum, or updating the goal and SLOs.

  • Describe admissions and graduation requirements for the program.*

    Applications for the MS cybersecurity program are accepted for all terms. Students must meet the requirements of the NKU Office of Graduate Education: a bachelor’s degree from a regionally accredited institution, an undergraduate GPA of at least 2.5, a GPA of at least 3.0 in any graduate work in the same field, demonstration of English proficiency for non-native English speakers, a graduate application submitted with the application fee, and official transcript.

  • Describe administrative oversight to ensure the quality of the program.

    Administrative oversight of the program includes three components: an annual report to the dean of the College of Informatics, annual program assessment with reports submitted to the Associate VIce Provost of Assessment, and major changes will be reviewed by the advisory board of NKU’s Center of Information Security, which has responsibility for cybersecurity educational programs across the university.

  • For a program offered in compressed time frames (less than full semester), describe the methodology for determing that levels of knowledge and competencies comparable to those required in traditional formats have been achieved.*

    Student learning outcomes and assessment of student learning in the proposed program, are based on industry competencies which are used to gauge professional readiness for a career in cybersecurity. Professional readiness and success indicators do not vary with time frames.

PROGRAM DEMAND/UNNECESSARY DUPLICATION
  • Program Demand / Unnecessary Duplication / Collaboration within and among other Institutions.  (Please provide Gray Associates Program Evaluation System Scorecard data snapshot for new program.)

  • Program Demand/Unnecessary Duplication

    Proposed programs must respond to the needs of the academy and to larger economic and social environments. Thus, the institution must demonstrate demand for the proposed program. All proposed programs must address student demand. Programs must also address either employer demand or academic disciplinary needs.

  • STUDENT DEMAND
  • a. Provide evidence of student demand. Evidence of student demand is typically in the form of surveys of potential students or enrollments in related programs at the institution, but other methods of gauging student demand are acceptable. *

    See attached student survey results documents.

    Typically in the form of surveys of potential students and/or enrollments in related programs at the institution.
  • Expected Enrolment over first five years of the program - (First 5 Years)
  • Expected Enrollment - Fall Semester Year 1*
    40
    40
  • Expected Enrollment - Fall Semester Year 2*
    52
    52
  • Expected Enrollment - Fall Semester Year 3*
    68
    68
  • Expected Enrollment - Fall Semester Year 4*
    75
    75
  • Expected Enrollment - Fall Semester Year 5*
    75
    75
  • Justification:  This is an open-ended response that will be used in CPE agenda items. Within your response you should also establish the demand for this program and note if it replaces another program on campus.   Remember that the audience will be CPE, not higher education administrators, faculty or staff. 

  • Justification:*

    There is a high demand for cybersecurity professionals both locally and nationally, and according to our student survey, many of our current students are interested in working in the field of cybersecurity. See Justification section under Employer Demand for details.  Also see attached employer survey result documents.

EMPLOYER DEMAND
  • Clearly describe evidence of employer demand. Such evidence may include employer surveys, current labor market analyses, and future human resources projections. Where appropriate, evidence should demonstrate employers’ preferences for graduates of the proposed program over persons having alternative existing credentials and employers’ willingness to pay higher salaries to graduates of the proposed program.

    Data provided in tables must be uploaded.

    Attach additional documentation using the <File> option on the right hand menu.

  • If the program is designed for students to enter the workforce immediately, please complete the following table.


    Most of the current Bureau of Labor Statistics projections are for 2016-2026.  If additional sources are used, please note the time frame for the projections in the title field. 

    Other sources include:

    Georgetown University Center on Education and the Workforce
    Bureau of Labor Statistics’ Occupational Outlook Handbook
    Kentucky Center for Statistics

    KY Chamber, “Kentucky’s Workforce, Progress and Challenges,” January 2018

    Kentucky, Bridging the Talent Gap

    Document - https://www.bridgingthetalentgap.org/wp-content/uploads/2017/05/KY-Statewide.pdf 
    Interactive website: https://bridgingthetalentgap.org/dashboards/

  • Sources Used
    • Bureau of Labor Statistics
    • cyberseek.org
    • employer survey (attached)
  • Type / Title of Job #1
    Information Security Analyst
    Information Security Analyst
  • Regional Average Wage
    $82,810 - $90,300
    $82,810 - $90,300
    Regional # of Job Openings
    2514 (Cincinnati metropolitan region)
    2514 (Cincinnati metropolitan region)
  • State Average Wage
    $49,420 - $86,190
    $49,420 - $86,190
    State # of Job Openings
    2333 (KY)
    2333 (KY)
  • National Average Wage
    99730
    99730
    National # of Job Openings
    521617
    521617
  • Regional Growth Projections:
    N/A
    N/A
  • State Growth PRojections:
    N/A
    N/A
  • National Growth Projections:
    31%
    31%

  • Type / Title of Job #2
  • Regional Average Wage
    Regional # of Job Openings
  • State Average Wage
    State # of Job Openings
  • National Average Wage
    National # of Job Openings
  • Regional Growth Projections
  • State Growth Projection
  • National Growth Projection

  • Type / Title Job #3
  • Regional Average Wage
    Regional # of Job Openings
  • State Average Wage
    State # of Job Openings
  • National Average Wage
    National # of Job Openings
  • Regional Growth Projections
  • State Growth Projections
  • National Growth Projections

  • Justification:  This is an open-ended response that will be used in CPE agenda items. Institutions should establish the demand for the program.  Note if it replaces another program on campus.  Remember that the audience is the CPE, not higher education administrators, faculty, or staff. (SUGGESTED DATA SOURCES ARE PROVIDED)

  • Justification

    In 2020, the Bureau of Labor Statistics released its forecast of 20 fastest growing occupations with the highest percent change of employment between 2019-29 [1]. Information security analysts is one of these fastest growing occupations, with a 31% growth in number of available jobs. According to BLS website “Demand for information security analysts is expected to be very high, as these analysts will be needed to create innovative solutions to prevent hackers from stealing critical information or causing problems for computer networks.” The quick facts card from the Bureau of Labor Statistics is shown below:

     

    Table 1. Quick Facts: Information Security Analysts

    2019 Median Pay

    $99,730 per year
    $47.95 per hour

    Work Experience in a Related Occupation

    Less than 5 years

    Number of Jobs, 2019

    131,000

    Job Outlook, 2019-29

    31% (Much faster than average)

    Employment Change, 2019-29

    40,900

     

    We also researched the demand for cybersecurity graduates using the federal government’s CyberSeek web site (cyberseek.org). On December 17, 2020, there were the following numbers of open cybersecurity job positions, indicating a high demand for cybersecurity talent:

    National open positions: 521,617

    Kentucky open positions: 2,333

    Greater Cincinnati metropolitan area open positions: 2,514

    The Master of Science in Cybersecurity Committee conducted an Employer/Professional survey (see Addendum - Employer Survey) of a broad spectrum of organizations that would be likely to employ graduates from the MS in Cybersecurity program. E-mail requests for participation in an online survey were forwarded to many individuals from the tri-state region including employers in the areas of healthcare, government, technology-related business, retail, and education. Since we encouraged people to share this survey, it is difficult to estimate how many cybersecurity professionals were contacted. The survey was conducted between October 20, 2020 and November 6, 2020. We received 42 answers from 28 organizations. It should be noted that many of these organizations had no prior ties to the department or to faculty or programs at the University.

    The results of the survey are summarized in Addendum - Employer Survey Results. It is worth mentioning that 23 out of 34 respondents answered that their employer has difficulties in finding qualified cybersecurity professionals, and 23 out of 36 considers that their employer will be interested in hiring graduates of this new proposed MS in Cybersecurity program (12 answers were “I do not know” – respondents not being part of the hiring decisions).

    All respondents were asked to provide comments and suggestions as well as to answer questions regarding most important cybersecurity topics and certifications. All open answers are also included in Addendum - Employer Survey Results.

ACADEMIC DISCIPLINARY NEED
  • Academic Disciplinary Need:

    If the program proposal is in response to changes in academic disciplinary need, as opposed to employer demand, please outline those changes. Explain why these changes to the disciple necessitate development of a new program.

  • Clearly describe all evidence justifying a new program based on changes in the academic discipline or other academic reasons*

    N/A. 

  • State Records indicate the following similar programs:

    A new program may serve the same potential student population. The proposed program must be sufficiently different from existing programs in the state or access to existing programs must be sufficiently limited to warrant initiation of a new program.

    Identify similar programs in other Southern Regional Education Board (SREB) states and in the nation.

    If similar programs exist in Kentucky,

  • How will the program support or be supported by other programs within the institution?

    While this program does not share any courses with other programs at NKU, it does share faculty who also teach in the Bachelor of Science programs offered by the computer science department, including programs in cybersecurity, computer information technology, and computer science.

  • New Field
  • Institution
    Murray State
    Murray State
  • Program Name
    Master of Science in Cybersecurity Management
    Master of Science in Cybersecurity Management
  • Comparison of Objectives / Focus / Curriculum to Similar programs.

    Offered in 100% online or on-campus format. Prepares graduates for different Cybersecurity managerial roles with focus on information security management, digital forensics, auditing, and compliance. Does not educate professionals for security architect and security engineering roles, and does not focus on the development of technical skills in cloud computing and IoT, identity and access management, web technologies, and Big Data processing and analytics.

  • Comparison of Student Population

    Murray State University's student population largely comes from the south-west KY region while NKU's comes mostly from northern KY and Cincinnati. 

    Murray State University offers their program both online and on-campus, with only 18% graduate students being enrolled into online courses.

  • If you have not yet done so, you should contact the Other Institutions and provide Feedback from those Other Institutions.

    Murray State faculty agree that there was a substantial difference in content between our programs and expressed interest in working together to allow students to take electives from the other university.

  • New Field
  • Institution
    Sullivan University
    Sullivan University
  • Program Name
    Master of Science in Cybersecurity
    Master of Science in Cybersecurity
  • Comparison of Objectives / Focus / Curriculum to Similar Programs

    Offered in 6 Sullivan University locations across KY. Prepares graduates for security monitoring and auditing roles, with focus on leadership and management, disaster response, business continuity, digital forensics and Cyber warfare. Does not educate career changers to work on security architect and security engineer roles, and does not focus on the development of technical skills in cloud computing and IoT, identity and access management, penetrating testing, web programming, and Big Data processing and analytics

  • Comparison of Student Populations

    Sullivan University’s student population mostly full time (98%), and comes largely from the regions local to the university campus locations.

     

  • Access to Existing Programs.

    The proposed program at NKU is 100% online, compared to the on-campus program at Sullivan University.

  • Feedback from other Institutions

    This has not been explored yet. However, the two programs are separate and have different goals and curricula. There is less than 10% similarity in the focused areas for NKU’s proposed and Sullivan University’s existing program.

  • How will the program support or be supported by other programs winhin the institution?
FINANCIAL SUPPORT
  • The resource requirements and planned sources of funding of the proposed program must be detailed in order to assess the adequacy of the resources to support a quality program. This assessment is to ensure that the program will be efficient in its resource utilization and to assess the impact of this proposed program on the institution’s overall need for funds.

    Provide a business plan that includes all of the following:  (Note:  This applies to All submissions).

  • A description of financial resources available to support the proposed change, includeing a budget for the first year of the proposed change (a three-year budget is required for a new branch campus). Do not send a copy of the entire institutional budget.

    See attached financial analysis spreadsheet (ms-cybersecurity-financial-analysis-cpe-template.xlsx)

  • Projected revenues and expenditures and cash flow for the proposed program.

    See attached financial analysis spreadsheet (ms-cybersecurity-financial-analysis-cpe-template.xlsx)

  • Complete the Funding Sources, by year of program template and Breakdown of Budget Expenses/Requirements template tables for the first five years of the proposed program and provide an explanation of how the institution will sustain funding needs, attach document by clicking on the Files menu option on the right hand menu. *The total funding and expenses in the table should be the same, or explain sources(s) of additional funding for the proposed program.

    Links to the Funding Source and Budget Expenses/Requirement Templates are:

    A.  Funding Source Template

    B.  Budget Expenses/Requiement Breakdown Template

  • Attached*
  • Attached*
  • The amount of resources going to institutions or organizations for contractual or support services for the proposed program or change.

    N/A

  • The operationsal, management, and physcial resources available for the program or change.

    N/A

  • CPE ID
  • Provide contingency plans in the event that required resources do not materialize.

    We requested 1 faculty line in year 3, contingent on hitting enrollment targets where revenue would finance the new line.  The addition of this faculty member would provide us with an opportunity to expand program offerings and increase enrollment.   The proposed program will not be impeded, but will be limited in additional growth, without the additional faculty member. 

    Additional IT resources will be incurred by the students through tuition and/or course fees. 

INSTITUTIONAL EVALUATION AND ASSESSMENT PROCESS
  • Provide a brief description of institutional assessment processes.

    The Associate Vice Provost for Assessment established a standard assessment process and created a University Assessment Committee, which is populated by faculty members from a broad range of colleges, departments, and academic offices. The assessment process begins at the start of fall semester with an email describing the current assessment requirements and deadlines. Each department must submit its annual assessment plan for the current academic year by October 15th, while assessment reports for the previous academic year are due on September 15th. Assessment reports are reviewed and feedback is provided to the departments in October before the deadline for the current year's assessment plan.  Departments choose how to schedule their SLO assessments. We plan to follow our home department's policy of assessing one SLO per semester, allowing us to assess all 4 program SLOs in a two year cycle.

  • Describe how the institution will incorporate the program, site, distance education or other changes into the institution-wide review and assessment process.

    The program will be assessed using the same requirements and schedule as existing degree programs, starting in the first year that the program is offered.

  • What are the plans to evaluate students' post-graduate success?

    The program director will maintain a list of graduating students contact information and conduct regular surveys of their careers.

ADVANCED PRACTICE DOCTORATE
  • Will this program be an Advanced Practice Doctorate?*
  • If the proposed program is an advanced practice doctorate, please address the following 5 questions.  If not, skip this section and Finalize and Approve the proposal.

    For submission to CPE you will need to attach the following, additional documentation, click on the Files tab in the right hand menu bar. 

    1. Letter of commitment from each clinical site that specifies the number of students to be accommodated and identifies other academic programs that also use the facilities.

    2. Letter from each institution with a similar program stating that the proposed program will not negatively impact the existing program.

  • Describe how the doctorate builds upon the reputation and resources of the existing master’s degree program in the field.
  • Provide a description of the master's program or programs and note any distinctive qualities of these programs as well as any national recognition bestowed upon the program.
  • Explain the new practice or licensure requirements in the profession and/or requirements by specialized accrediting agencies that necessitate a new doctoral program.
  • Provide any evidence, such as a professional organization or an accrediting agency requireing a doctorate in order for graduates to practice or advance in the field of study.
  • Explain the impact of the proposed program on undergraduate education at the institution. Within the explanation, note specifically if new undergraduate courses in the field will be needed, or if any courses will be cut
  • If there is no impact on undergraduate education, please provide a synopsis of how a new doctorate can be developed and implemented without financial or staffing implications for undergraduate education.
  • Provide evidence that funding for the program will not impair funding of any existing program at any other public university.
    • Upload a letter from each institution with a similar program stating that the proposed program will not negatively impact the existing program.

    • Include a summary of financial information from institutions with similar programs.
LAUNCH PROPOSAL
    1. Click on Launch Proposal on the top banner text bar, to launch proposal.
    2. Once you have launched the proposal form you can then complete any remaining fields, editing fields and finalize the proposal.  All changes after launching the proposal will be tracked. You may also attach any additional supporting documents by clicking on the Files tab in the right hand menu bar.
FINALIZE AND APPROVE
  • Once you are happy with the information in the proposal:

    • Upload any additional documentation or files by clicking the Files tab on the right hand menu.

    The last step will be for you to make your approval by clicking the Decision tab on the right hand menu. Only after you approve your proposal will it move on to the next approval step.

CIP CODES AND APPROVAL DATES
  • CIP Code
    11.1003
    11.1003
  • BOR Approval Date
    May 12, 2021
    May 12, 2021
  • CPE Final Approval Date
  • User Tracking

    Help: Show Original: This option displays the proposal as it appeared at launch. No markup will be visible on the form. There will be no differentiation between fields that contain imported content and content that was created or selected by the originator by hand.

    Help: Show Current: This option displays the proposal as it appears currently. No markup will be visible on the form. There will be no differentiation between fields that contain imported content and content that was created or selected by the originator by hand.

    Help: Show Current with Markup: This option displays the proposal with all of its current content marked to show different editors. Text fields that include imported content are indicated by a blue highlight, and may also include additional changes within, indicated by each editor’s unique color. Fields containing selects, checkboxes, radio buttons, or widgets (such as the curriculum) provide an activity log above the field, indicating each editor’s selection and unique color.

    Comments

    You have not saved your changes to all the assessment fields you edited. You have the following options:

    • Click "Save All Changes" now to save every change you made
    • Click "Abandon Changes" to destroy all unsaved changes
    • Click "Cancel" to continue working on assessments and save each field individually

    What would you like to do?

      You must be logged in, in order to approve.

      Please upload the form that you just printed and signed.

      This will be used as your signature to sign this proposal upon approval.


      Listed below are the symbols and colors utilized in Curriculum:

      • = has not made a decision
      • = approved
      • = rejected
      • = held
      • = suspended
      • = cancelled
      • = multiple decisions
      • = task
      • = mine
      • = stuck
      • = urgent, out of date import source
      x

      #{title}

      #{text}

      x
      warning

      #{title}

      #{text}

      x
      warning

      #{title}

      #{text}