Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 IT/Cybersecurity - ICRDCE Conference Day 2 - 2016 Aligning Program, Course, and Class Objectives / Outcomes.

Similar presentations


Presentation on theme: "1 IT/Cybersecurity - ICRDCE Conference Day 2 - 2016 Aligning Program, Course, and Class Objectives / Outcomes."— Presentation transcript:

1 1 IT/Cybersecurity - ICRDCE Conference Day 2 - 2016 Aligning Program, Course, and Class Objectives / Outcomes

2 Learning Outcomes of This Presentation At the conclusion of this presentation, participants will be able to: 1. Explain what a program, course, and class objectives/outcomes are. 2. Understand the various learning activities that can be effectively used in an Information Technology/Cybersecurity program in order to achieve the designed outcomes / objectives. 3. Develop a program, course and class outcomes at a selected learning level. 2

3 3 Program, course, and class objectives should reflect different aspects of student learning:  Cognitive - knowledge  Affective - attitudes  Behavioral - skills Program Outcomes, Course, and Class Objectives / Outcomes

4 4 Cognitive:  What do you want your future graduates to know Knowledge of the various software programs available to troubleshoot technical issues Computer Applications Computer Hardware Program Outcomes, Course, and Class Objectives / Outcomes (cont.)

5 5 Affective:  What do you want your future graduates to think or care about Ethical and social responsibilities, including the impacts of culture, diversity, and interpersonal skills. Program Outcomes, Course, and Class Objectives / Outcomes (cont.)

6 6 Behavioral:  What do you want your future graduates to be able to do Install and know how to run a software program Program Outcomes, Course, and Class Objectives / Outcomes (cont.)

7 Program Outcomes 7 Example :  Assess a computer system’s security vulnerabilities using appropriate resources.  Assess their professional responsibility in the areas of privacy, intellectual property, ethics and codes of conduct. “The essential competencies the learner must possess at the completion of the program” Program Outcomes

8 Course Objectives / Outcomes 8 Example (based on the Program outcomes):  Demonstrate the ability to effectively interpret network vulnerabilities. Be familiar with the legal requirements, ethical issues, and professional issues in the IT and Cybersecurity professions. Course Objectives: Represent the overarching purpose of the course. They speak to the general course goals. Course Outcomes: Articulate course objectives and are behavioral in nature as they represent activities students will perform to demonstrate their ability to understand and apply concepts learned. Program Outcomes Course Objective / Outcomes

9 Class Objectives / Outcomes 9 Examples (based on Course Objectives/Outcomes):  At the conclusion of this lesson, the students will be able to: Differentiate between the various software patches available to operating systems and applications. Understand and describe the role of the code of ethics from various frameworks. Faculty articulate learning objectives for specific lessons that compose a unit, project, or course, or they may determine learning objectives for each day they instruct students. Program Outcomes Course Outcomes Class Outcomes

10 Objectives are Teacher or Program focused Outcomes are Student or Learner focused So What Is The Difference?

11 Holistic View of Program, Course, and Class Objectives / Outcomes Program Objectives / Outcomes Course Outcomes Class Outcomes

12 Program Objectives / Outcomes Course Outcomes Class Outcomes Holistic View of Program, Course, and Class Objectives / Outcomes (cont.) Assess a computer system’s security vulnerabilities using appropriate resources Demonstrate the ability to effectively interpret network vulnerabilities. Differentiate between the various software patches available to operating systems and applications.

13 Assess a computer system’s security vulnerabilities using appropriate resources Differentiate between the various software patches available to operating systems and applications Demonstrate the ability to effectively interpret network vulnerabilities Holistic View of Program, Course, and Class Objectives / Outcomes (cont.) Program Objectives / Outcomes Course Outcomes Class Outcomes

14 Activity Strategies & Learning Activities 14 Examples: Hands-On Labs Competitions Demos / Simulations Discussions Team Work Research Papers Tests Learning Strategies/Activities: There are many learning strategies and activities that can be effectively used in an Information Technology / Cybersecurity program in order to achieve the designed outcomes / objectives

15 Learning Pyramid

16 Blooms Cognitive Domains  Remember: Depending on the desired outcome, you would categorize your learning objectives into one of the six levels of learning and then use appropriate activities that correspond to the levels of learning in order to achieve the desired level of mastery. Synthesis Evaluation Knowledge Comprehension Application Analysis IV III II I

17 Blooms Cognitive Domains (cont.) Six levels: 1. Knowledge 2. Comprehension 3. Application 4. Analysis 5. Synthesis 6. Evaluation 17

18 Leveled Outcomes And How They Are Used Across The Curriculum Level I: Knowledge / Comprehension Level II: Comprehension / Application Level III: Application / Analysis Level IV: Analysis / Synthesis / Evaluation 18

19 Next Steps 19 Questions & Answers: How can we assist? Teamwork


Download ppt "1 IT/Cybersecurity - ICRDCE Conference Day 2 - 2016 Aligning Program, Course, and Class Objectives / Outcomes."

Similar presentations


Ads by Google