Cyber Threat Intelligence, B.A.

UNDERGRADUATE_NEW Program 2024-2025

completed

What can I do next?

View the Proposal

  • View changes to the proposal by clicking the Discussion tab and selecting "Show current with markup" on the User Tracking dropdown.
  • View current comments concerning this proposal by clicking the Discussion tab.
  • View the history of the proposal by clicking the Workflow Status tab.
  • View the signatures the proposal has collected by clicking the Signatures tab.
  • View the files associated with the proposal by clicking the Files tab.
  • Compare the proposal with related proposal by clicking the Proposal Lookup tab.
General Catalog Information
  • For detailed instruction on completing a new program form, click here and view the video on creating new programs.

    Note: Proposals are done by academic year.  If the program is inteded for the 2024/25 catalog, the proposal must be at the Graduate Council queue by March 1, 2024. Final determination of when an approved proposal will be in the catalog is determined by approvals at all levels as needed (Faculty Senate, CHE, SACS).

    This proposal should only be submitted after several initials steps have been completed, as described in the policy on New Program Development and Modification (ACAD-109). Specifically, this request should not be submitted until the Program Planning Summary has been approved by the CCU Board of Trustees and the subsequent Program Proposal has been approved by the dean and provost for submission via this process.

    • If the New Undergraduate Program Proposal includes new courses, all new courses must have already been approved (or be in the process of being approved) through the Academic Affairs Committee.
    • New Undergraduate Certificate Programs must include the full SCCHE Notification of Change form.
    • New Undergraduate Programs that consist of 19 or more credit hours must include the full SCCHE New Program Proposal form.
    • The chair of the department supporting the new program should not approve until the appropriate SCCHE form is completed. Note that the initial Program Planning Summary is not the Final Proposal.  Please contact the Provost’s Office with questions.
  • Are courses in the program existing or new?*
  • If there are new courses, have you submitted the new course proposal?*
    If the new courses have not yet been approved, please stop this proposal and go through New Course Form first.
  • Hierarchy Owner (Department Name)*
  • Program Type (Shared Core field)*
    99% of the time Program will be selected here. Shared Core is only for the programs that have concentrations and share the same foundation. Call x2090 if you have questions regarding this field.
  • Shared Core Code
    Leave this field BLANK unless you selected Shared Core in the previous questions.
  • Title*
    Cyber Threat Intelligence, B.A.
    Cyber Threat Intelligence, B.A.
  • Click here for CIP codes

  • CIP (IPED)*
    43.0404
    43.0404
  • Program Type*
    Degree Type*
  • Please enter program description as it should show in the catalog (present tense) then provide the curriculum breakdown in the required field. Review current programs in Catalog for correct formating or contact the Provost Office for questions.

    DO NOT add curriculum breakdown in the description below.

  • Description

    Cyber Threat Intelligence, B.A.

     

    The Cyber Threat Intelligence major prepares students for careers and further study in the cyber domain that involve the analysis and evaluation of system vulnerabilities and the malicious actors that seek to exploit these vulnerabilities.  Using an interdisciplinary approach, this major the synthesizes the technical and non-technical concepts in the field of cybersecurity and applies knowledge and skills from the field of intelligence analysis and security studies.

     

    Student Learning Outcomes

    Students who complete the requirements for a degree in Cyber Threat Intelligence will be able to:

               1. Apply various advanced analytical techniques to real-world intelligence                           challenges.

    2.  Demonstrate the ability to employ critical thinking and problem-solving skills in order to evaluate cybersecurity related challenges.

    3. Evaluate contemporary computer systems and network architecture in order to assess critical vulnerabilities.

    4. Conduct comprehensive threat assessments of contemporary cyber threat actors and their associated tactics, techniques, and procedures.

    5. Identify, discuss and critique core concepts and issues in cybersecurity policy and governance and existing measures to address them.

    6.  Create and deliver oral and written products on cyber threat intelligence issues.

     

    Students who wish to pursue a degree in intelligence and security studies must conform to the following regulations:

              1. To remain a member of the major, a student must earn a grade of ‘C’ or better in             each course used to satisfy requirements for the major, including foundation                       courses for the intelligence and security studies major. Students who fail to                         maintain this academic standard may be dropped from the program by the                         department chair upon unanimous recommendation of the program’s faculty.

     

    The curriculum for this program is interdisciplinary with most of the courses being housed in the Department of Intelligence and Security Studies. Students will complete the University core curriculum and a collection of foundation courses to establish a base-line level of knowledge in the relevant subject areas connected to the study of intelligence and security. These early courses also introduce students to core skills that are useful in the analysis, evaluation and communication of intelligence information. From here, students are positioned to expand their knowledge and skills in the realms of intelligence and security, as well as the regional and occupational contexts that inform these issues.

     

    ** Only three courses from the major requirements may be applied toward a student’s minor requirements or a different major.

    This information will display in the catalog.
  • INSTRUCTIONS FOR ENTERING COURSES FOR CURRICULUM

    1. If the course already exists, use the IMPORT COURSE icon. DO NOT use the Add Course if the course(s) is in the draft catalog already.
    2. If the course(s) being added are new, and are not yet in the draft catalog, use the ADD COURSE icon. The prefix and name must be exactly as entered in the proposal.
  • Prospective Curriculum*
  • Planned start date for new program*
    8/15/2024
    8/15/2024
  • Have you attached all required documentation?*
    SCCHE Final Program Proposal; or Planning summary for Minor, Emphasis, Tracks, Concentrations, or Specializations
Justification for Request
  • What research has led to this request?*

    In discussions with external partners (e.g., the National Security Agency), it was apparent that a growing need exists for graduates who have both the technical compentency in computer networks, as well as a competency in intelligence practices.  

     

    Currently, there are no cyber-related undergraduate degree programs at CCU.

  • What impact will this request have on existing academic programs?*

    The program primarily shares existing courses within the Intelligence and Security Studies major and the 3 majors in the Computing Sciences Department (B.S. programs in Computer Science, Information Systems, and Information Technology).  Both departments have been involved in the development of this new program and have approved its creation.

  • What financial costs are associated with this request?*

    None in year one.  A faculty line in the Intelligence and Security Studies department is needed in year 2 to accomodate the forecasted enrollment projections.  This is projected to cost $68,340.

  • If NO change in cost is anticipated, how is this possible?*

    Based on year one projected enrollments, the new major will be able to be serviced with existing faculty.  The growth in projected enrollments in year 2 require the need for additional faculty support in the Intelligence and Security Studies Department.

  • Any additional information?
  • User Tracking

    Help: Show Original: This option displays the proposal as it appeared at launch. No markup will be visible on the form. There will be no differentiation between fields that contain imported content and content that was created or selected by the originator by hand.

    Help: Show Current: This option displays the proposal as it appears currently. No markup will be visible on the form. There will be no differentiation between fields that contain imported content and content that was created or selected by the originator by hand.

    Help: Show Current with Markup: This option displays the proposal with all of its current content marked to show different editors. Text fields that include imported content are indicated by a blue highlight, and may also include additional changes within, indicated by each editor’s unique color. Fields containing selects, checkboxes, radio buttons, or widgets (such as the curriculum) provide an activity log above the field, indicating each editor’s selection and unique color.

    Comments

    You have not saved your changes to all the assessment fields you edited. You have the following options:

    • Click "Save All Changes" now to save every change you made
    • Click "Abandon Changes" to destroy all unsaved changes
    • Click "Cancel" to continue working on assessments and save each field individually

    What would you like to do?

      You must be logged in, in order to approve.

      Please upload the form that you just printed and signed.

      This will be used as your signature to sign this proposal upon approval.


      Listed below are the symbols and colors utilized in Curriculum:

      • = has not made a decision
      • = approved
      • = rejected
      • = held
      • = suspended
      • = cancelled
      • = multiple decisions
      • = task
      • = mine
      • = stuck
      • = urgent, out of date import source
      x

      #{title}

      #{text}

      x
      warning

      #{title}

      #{text}

      x
      warning

      #{title}

      #{text}