Adapting The IT2017 Curricula For Two-Year IT Transfer .

Transcription

Adapting the IT2017 Curriculafor Two-Year IT Transfer ProgramsDetermining the Optimal Level of Curricular GuidanceMarkus Geissler, Cosumnes River College, CASvetlana Peltsverger, Kennesaw State University, GATim Preuss, Minnesota State Community and Technical College – Moorhead, MNCara Tang, Portland Community College, OR10/9/2019IT-Transfer2019 @ SIGITE 20191

Introduction Curriculum Guidance (Cara) ACM CCECC IT2014, IT-Transfer2019, etc. IT-Transfer2019 IronDog DRAFT (Markus) IT-Transfer Task Group Accomplishments to date IT2yr2014 vs. IT-Transfer2019 (Tim) Example: IT Transfer program between Kennesaw StateUniversity and their feeder CCs (Svetlana)10/9/2019IT-Transfer2019 @ SIGITE 20192

Curriculum Guidance (Cara) ACM Committee for Computing Education inCommunity Colleges (ACM CCECC) IT2014, IT-Transfer2019, etc.10/9/2019IT-Transfer2019 @ SIGITE 20193

ACM Curriculum Guidance forBaccalaureate ProgramsCC2005 (Computing Curricula 2005): The Overview Report Computer Engineering – CE2016 Computer Science – CS2013 Information Systems – IS2010 Information Technology – IT2017 Software Engineering – SE2014 Cybersecurity – CSEC201710/9/2019IT-Transfer2019 @ SIGITE 2019Under Development CC2020 Data Sciencewww.acm.org/education4

Introduction to ACM CCECCCommittee for Computing Education in Community Colleges 40 years of service to computing education Standing committee of the ACM Education Board for 25 yearsGlobal MissionServe and support community and technical college educatorsin all aspects of computing education Engage in curriculum and assessment development,community building, and advocacy in service to this sectorof higher education ccecc.acm.org10/9/2019IT-Transfer2019 @ SIGITE 20195

ACM Curriculum Guidance forAssociate ProgramsProduced by the CCECC Information Technology – IT2yr2014 Guidelines for the core of A.A.S. / career programs Infused with cybersecurity Computer Science - CSTransfer2017 Guidelines for A.S. / transfer programs Infused with cybersecurity Current Projects Cybersecurity – Cyber2yr2020 IT Transfer – IT-Transfer201910/9/2019IT-Transfer2019 @ SIGITE 20196

IT2yr2014:IT Competency ModelInformation Technology CompetencyModel of Core Learning Outcomes andAssessment for Associate-DegreeCurriculum Includes 50 core IT learning outcomes Includes assessment metrics for eachlearning outcome 7 of the 50 learning outcomes focus ransfer2019 @ SIGITE 20197

ACM Curriculum Guidance forAssociate Programs Non-prescriptive guidance Community needs vary Competency-based Focus on student achievement What students can do rather than what students know Utilize Bloom’s Revised Taxonomy Creating, Evaluating, Analyzing, Applying, Understanding,Remembering Infused with cybersecurity10/9/2019IT-Transfer2019 @ SIGITE 20198

IT-Transfer2019 IronDog DRAFT (Markus) IT-Transfer Task Group IT-Transfer2019 IronDog DRAFT highlights Looking for feedback10/9/2019IT-Transfer2019 @ SIGITE 20199

IT-Transfer Task Group Markus Geissler (chair), Cosumnes River College Dana Brown, Bluegrass Community & Technical College Norma McKenzie, El Paso Community College Svetlana Peltsverger, Kennesaw State University Tim Preuss, Minnesota State Community and TechnicalCollege - Moorhead Mihaela Sabin, University of New Hampshire Cara Tang, Portland Community College10/9/2019IT-Transfer2019 @ SIGITE 201910

IT-Transfer2019 Highlights Full competency-based approach to learning IT 29 Essential (ITE) and 27 Supplemental (ITS) competencies 19 IT domains, plus a Mathematics domain IT2017 lists 80 competencies IT programs that articulate convincingly what studentsshould be able to achieve by the time they transfer to afour-year institution Readers should be familiar with IT2017 guidance10/9/2019IT-Transfer2019 @ SIGITE 201911

IT Transfer vs. Applied IT Programs IT transfer programs which prepare students for transfer toa four-year college or university where they will completetheir IT baccalaureate degree(IT-Transfer2019) Separate Information Technology Competency Model ofCore Learning Outcomes and Assessment for AssociateDegree Curriculum exists for applied two-year IT programs(IT2yr2014) Tim will contrast guidance documents later10/9/2019IT-Transfer2019 @ SIGITE 201912

General Education Requirements To accommodate GE, the IT Transfer2019 Task Group choseto keep this guidance as flexible as possible. Example: California’s Intersegmental General EducationTransfer Curriculum (IGETC) pattern California Community College students can use IGETC to fulfillall lower-division general education requirements at any CSUor University of California campus. Requires completion of a minimum of 37 semester/49 quarterunits of lower division work10/9/2019IT-Transfer2019 @ SIGITE 201913

Professional, Communication,and Teamwork Skills Work Experience Most IT professionals must be able to complementtheir IT skills with professional skills, communicationskills, and teamwork skills to be successful. Students should gain as much hands-on experience aspossible prior to graduation. Greatest benefit from work experience or work-basedlearning after transfer10/9/2019IT-Transfer2019 @ SIGITE 201914

10 Essential IT Domainsand IT Transfer 2019 CompetenciesTagIT DomainIT-Transfer2019 EssentialCompetenciesIT-Transfer2019 SupplementalCompetenciesITE-CSPCybersecurity Principles21ITE-GPPGlobal Professional Practice30ITE-IMAInformation Management12ITE-ISTIntegrated orm Technologies50ITE-SPASystem Paradigms21ITE-SWFSoftware Fundamentals23ITE-UXDUser Experience Design11ITE-WMSWeb and Mobile Systems14Total Competencies221510/9/2019IT-Transfer2019 @ SIGITE 201915

9 Supplemental IT Domainsand IT Transfer 2019 CompetenciesTagIT DomainIT-Transfer2019 EssentialCompetenciesIT-Transfer2019 SupplementalCompetenciesITS-ANEApplied Networks01ITS-CCOCloud Computing12ITS-CECCybersecurity EmergingChallenges21ITS-DSAData Scalability and Analytics01ITS-IOTInternet of Things01ITS-MAPMobile Applications02ITS-SDMSoftware Development andManagement01ITS-SRESocial Responsibility21ITS-VSSVirtual Systems and Services22Total Competencies71210/9/2019IT-Transfer2019 @ SIGITE 201916

19 Domain CardsITE-CSP Domain: Cybersecurity PrinciplesScope1.2.3.4.5.A computing-based discipline involving technology, people, information, and processes to enable assured operations.A focus on implementation, operation, analysis, and testing of the security of computing technologiesRecognition of the interdisciplinary nature of the application of cybersecurity including aspects of law, policy, human factors, ethics, andrisk management in the context of adversaries.The practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data andthe systems and processes used for those purposes.Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,confidentiality, and non-repudiation.Essential CompetenciesA.B.Evaluate the purpose and function of cybersecurity technology, identifying the tools and systems that reduce the risk of data breaches whileenabling vital organization practices. (Cybersecurity functions)Implement systems, apply tools, and use concepts to minimize the risk to an organization's cyberspace to address cybersecurity threats.(Tools and threats)Supplemental CompetenciesA.Use a risk management approach for responding to and recovering from a cyber-attack on system that contains high value information andassets such as an email system. (Response and risks)10/9/2019IT-Transfer2019 @ SIGITE 201917

Bloom's Level Distributionfor IT-Transfer2019 CompetenciesCreating, 6Understanding, 12Evaluating, 4Analyzing, 8Applying, 2610/9/2019IT-Transfer2019 @ SIGITE 201918

IT Essential MathematicsIT Essential Mathematics10/9/2019ITM-DSCDiscrete ITM-DSC-10ITM-DSC-11ITM-DSC-12Perspectives and impactSetsFunctions and relationsProof techniquesLogicBoolean algebra principlesMinimizationGraphs and treesCombinatoricsIteration and recursionComplexity AnalysisDiscrete information technology applicationsIT-Transfer2019 @ SIGITE 201919

IT-Transfer2019 Competencies vs.IT2yr2014 Learning OutcomesIT-Transfer2019 CompetenciesIT2yr2014 Learning OutcomesITE-CSP Domain: Cybersecurity PrinciplesEvaluate the purpose and function of cybersecurity technology, Differentiate among various techniques for making a computeridentifying the tools and systems that reduce the risk of datanetwork secure.breaches while enabling vital organization practices.Use a variety of practices for making end-user systems secure.(Cybersecurity functions) (Essential)Implement systems, apply tools, and use concepts to minimize Explain the process of authentication and authorizationbetween end-user devices and computing network resources.the risk to an organization's cyberspace to addresscybersecurity threats. (Tools and threats) (Essential)Use a risk management approach for responding to andrecovering from a cyber-attack on system that contains highvalue information and assets such as an email system.(Response and risks) (Supplemental)10/9/2019IT-Transfer2019 @ SIGITE 201920

IT-Transfer2019 Assessment RubricsEmergingDevelopedHighly DevelopedITE-CSP Domain: Cybersecurity PrinciplesAnalyze the purpose andfunction of cybersecuritytechnology, identifying the toolsand systems that reduce the riskof data breaches while enablingvital organization practices.(Cybersecurity functions)(Essential) (Bloom’s level:Analyzing)10/9/2019Evaluate the purpose andfunction of cybersecuritytechnology, identifying the toolsand systems that reduce the riskof data breaches while enablingvital organization practices.(Cybersecurity functions)(Essential) (Bloom’s level:Evaluating)IT-Transfer2019 @ SIGITE 2019Design a cybersecurity systemusing the tools and systems thatreduce the risk of data breacheswhile enabling vital organizationpractices. (Cybersecurityfunctions) (Essential) (Bloom’slevel: Creating)21

IT2yr2014 vs. IT-Transfer2019 (Tim) Definition not M State Reality M State Advisory Notes Need logic class Virtualization and containers are not optional Associate degree is ready for work10/9/2019IT-Transfer2019 @ SIGITE 201922

IT Transfer Example (Svetlana) Bachelor of Applied Science in Information TechnologyKennesaw State University it.php Articulation Agreement for BAS degrees on the UniversitySystem of Georgia level10/9/2019IT-Transfer2019 @ SIGITE 201923

KSU Requirements Associate of Applied Science in Computing from amember institution of the Technical College System ofGeorgia (TCSG) with a GPA of 2.3 or better Additional 67 credit hours Or approximately 2.5 years of full-time study Can use Prior Learning Assessment10/9/2019IT-Transfer2019 @ SIGITE 201924

10/9/2019IT-Transfer2019 @ SIGITE 201925Chattahoochee Tech. Coll.to Kennesaw State

KSU Example: Challenges TCSG courses 1- 2-thousand level - KSU IT coursesmostly 3- and 4-thousand level One-to-one course mappings almost impossible Minimum of 39 semester hours at the 3-, 4-level,including at least 21 semester hours at the 3-, 4- level inthe major field of study Different requirements for TCSG degrees (next slide)10/9/2019IT-Transfer2019 @ SIGITE 201926

Requirements for TCSG degrees Cisco Network Specialist E-Commerce Web Programming IT Professional Computer Information Systems Gaming Technology Linux Network Specialist Computer Programming Health Information Technology Micro Computer Specialist Computer Simulation/GameDeveloper Information Security Specialist Network Specialist Computer Specialist Internet Specialist - WebApplications and ServicesDevelopment Computer Support Specialist Cyber Forensics Technology Database Specialist Database AdministratorSpecialist Information Systems Technology PC Maintenance Specialist Internet Specialist - Web SiteDesign Windows Network Specialist Web Application Development Web Site Design Windows Network Specialist Internet Specialist - Web SiteDesign Version 266-74 credit hours, including 15 credit hours of general education10/9/2019IT-Transfer2019 @ SIGITE 201927

IT Degree Requirements General Education (42 hours) Including Pre-Calculus, Statistics (Calculus I starting Fall2020) and two lab sciences Area F Lower Division Major Requirements (18 hours) CS1, CS2, Discrete Math 7 credit hours from tech block Technical Block (21 credit hours) Courses from the AAS degree10/9/2019IT-Transfer2019 @ SIGITE 201928

Sample Courses CIST 2602CIST 1510CIST 2731CIS 1015EDP 2201CIST 2351CIS 2202CIST 2531CIST 2122ACC 2150CAPS 227810/9/2019Network SecurityWeb Development IIntermediate 3D AnimationCyber Crime TechnologyComp System AdministratorPHP Programming IXHTML FundamentalsWeb Graphics IIA PreparationCost AccountingCCNA SecurityIT-Transfer2019 @ SIGITE 2019Enrollment in Fall 2019 BASIT 150 BSIT 70029

Looking for Feedback The intent of IT-Transfer2019 is to make it easy for you to Implement an IT Transfer Program at your two-year college Facilitate communication between IT Transfer partners Help students to meet their academic and professional goalsSubmit your feedback athttps://ccecc.acm.org .10/9/2019IT-Transfer2019 @ SIGITE 201930

Submit your feedback by November 11th, 2019!Downloadthe IT-Transfer2019 IronDog DRAFT10/9/2019Complete a short survey to comment onthe IT-Transfer2019 IronDog DRAFTIT-Transfer2019 @ SIGITE 201931

Chattahoochee Tech. Coll. to Kennesaw State 10/9/2019 IT-Transfer2019 @ SIGITE 2019 25. KSU Example: Challenges . Different requirements for TCSG degrees (next slide) 10/9/2019 IT-Transfer2019 @ SIGITE 2019 26. Requirements for TCSG degrees Cisco Network Specialist