Bachelor of Arts (B.A.) in Computer Science - Computer Security Concentration Program By Drexel University |Top Universities

Bachelor of Arts (B.A.) in Computer Science - Computer Security Concentration

Bachelor of Arts (B.A.) in Computer Science - Computer Security Concentration

  • QS World University Rankings
    651-700
  • Degree Other
  • Study Level Bachelors
  • Duration 48 months
The College of Computing and Informatics' Bachelor of Arts in Computer Science offers extensive exposure and hands-on practice in the core areas of the field, including programming paradigms and languages, algorithms, systems, networking, and software engineering. Students also select upper level tracks in areas such as artificial intelligence, security, graphics and vision, and human-computer interaction. The program's flexibility allows students to easily sample from areas in which they would like to apply their computing knowledge. This hands-on curriculum combined with co-op provides real-world experience that culminates in a full-year software project. The programs of study in computer science are designed with the flexibility to prepare students for careers in a rapidly changing profession and to allow strong preparation for graduate education in the field. The Bachelor of Arts degree emphasizes foundation courses in the humanities and the social sciences, leading to careers involving applications in those areas. Core courses in all programs include programming and data structures, programming language concepts, computer systems architecture, and software methodology and engineering. Students also choose two other tracks from a list of possible specializations. Student Outcomes The Drexel Computer Science concentration in Computer Security enables students to attain, by the time of graduation: an ability to apply knowledge of computing and mathematics appropriate to security and privacy; an ability to analyze a problem, and identify and define the computing requirements appropriate to its solution; an ability to design, implement, and evaluate a computer-based system, process, component, or program to meet desired needs in computing security; an ability to function effectively on teams to accomplish a common goal an understanding of professional, ethical, legal, security and social issues and responsibilities; an ability to communicate effectively with a range of audiences; an ability to analyze the local and global impact of computing on individuals, organizations, and society; recognition of the need for and an ability to engage in continuing professional development. In the past, computer systems have been thought of as a combination of computers and networks, where the primary role of technology was to handle information efficiently to realize one or more objectives (for example, a customer relations management system helping an organization support and manage customers to achieve increased sales). However, the world has moved from a clear separation between people and technology to a network of systems that provide critical resources to modern living. In fact, today's world is comprised of systems and systems of systems where we see interactions at local, regional and global levels. Unfortunately, this cyberspace also allows for the connections among international organized crime, terrorists, hackers, foreign intelligence agencies, military and civilians including families and children. Furthermore, such connections enable threats to and invasions of privacy. Specialists are needed who can work within cyberspace to help secure, defend against, respond to, and in some instance, even initiate preemptive attacks. These individuals must have detailed knowledge of the systems they protect, an understanding of the cyber-environment and physical environment in which they operate, and an understanding of the ethical expectations and legal surroundings of their field. The Computer Science concentration in Computer Security is designed to supply graduates with the skills needed to prepare them for a wide range of opportunities. It gives students the ability to design and implement computing security and privacy processes, software and systems.