Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Introduction to Computer Security
Introduction to Computer Security
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
Hi-index | 0.00 |
We present an overview of the design and conduct of learning outcomes assessment for an undergraduate information assurance curriculum. The described program of assessment provides for an evidence-based, decision-making process that can be used to inform faculty on changes needed to curriculum. While the conduct of the assessment cycle is not an insignificant one (developing outcomes and objectives, assessing student learning, collecting and analyzing assessment data, and using assessment data to guide conversation about curriculum), the benefits are great in terms of assisting faculty to make good choices when reviewing/revising curriculum (and at the course level: course content, teaching methodology, and assignments).