Course # |
SLO |
Rating (of students achieving the SLO as reported by faculty) |
Action Type |
Action |
CISC 351 |
describe the functions of a LAN and the devices that may reside on a LAN. |
1 - All or most students |
Individual |
Although our students are already based on well-defined SLO on the syllabus, I continue to adopt/adapt real-world emerging technology articles/events/demonstrations in all my technology courses including this one, CISC351. |
CISA 346 |
combine and set up links for all media to connect and promote for business |
1 - All or most students |
Individual |
I usually leave it up to the students on what accounts they want to link up as some are working with private accounts vs business accounts. I may make an assignment that will force them to link up all accounts so they know how to do it once they are out of class. They can delete the links when the assignment has been graded. |
CISS 310 |
describe the fundamental concepts and principles of the cyber security discipline and use to provide system security. |
2 - More than half of students |
|
|
CISN 300 |
create, configure and implement a workgroup and a domain-based network using a Windows network operating system. |
1 - All or most students |
|
|
CISA 315 |
plan, design, create, and revise embedded as well as stand-alone charts based on commonly used standards |
1 - All or most students |
|
|
CISS 330 |
recommend best security practices to achieve stated business objectives based on risk assumptions. |
1 - All or most students |
|
|
CISP 300 |
define operators, including arithmetic, comparison, and logical operators. |
1 - All or most students |
|
|
CISA 127 |
collaborate with other Outlook users by using sharing and delegates. |
1 - All or most students |
|
|
CISW 370 |
formulate coding strategies for generating accessible websites. |
1 - All or most students |
|
|
CISP 360 |
use the top-down development approach to implement modular, maintainable programs. |
1 - All or most students |
Individual |
I would like to incorporate more activities that enable students to learn the top down modular design concepts. |
CISA 315 |
create complex formulas and functions, and round a value with a function |
1 - All or most students |
Individual |
Need printers in the classroom and more official time dedicated to the class |
CISA 160 |
explain the principles of project management with regard to case studies. |
1 - All or most students |
Individual |
The assignment was well-received. I am evaluating adding a second case study to the course which would replace a different discussion. |
CISC 498 |
behave professionally, ethically, and legally during work, consistent with applicable laws, regulations, and organizational norms. |
1 - All or most students |
|
|
CISS 316 |
apply and manage cyber defense methods to prepare a system to repel attacks. |
1 - All or most students |
|
|
CISP 370 |
design and implement programming logic using conditional execution structures and looping structures. |
2 - More than half of students |
Individual |
Yes, I plan to create additional videos to cover multiple ways to use loops to solve programming problems. |
CISP 360 |
implement suitable data structures to support a given algorithm. |
1 - All or most students |
Individual |
Add optional computer programming assignments for extra credit. |