Program Accreditation and Information

ABET imageThe Bachelor of Science (B.S.) in computer science at Kansas State University is accredited by the Computing Accreditation Commission of ABET. The Bachelor of Science in Cybersecurity is seeking initial accreditation by the Computing Accreditation Commission of ABET.

ABET is a not-for-profit, non-governmental accrediting agency for programs in applied science, computing, engineering and engineering technology, and is recognized as an accreditor by the Council for Higher Education Accreditation.

ABET accreditation provides assurance a college or university program meets the quality standards of the profession for which that program prepares graduates. In addition, the accreditation process —

  • Assures graduates of an accredited program are adequately prepared to enter and continue the practice of applied science, computing, engineering and engineering technology;
  • Stimulates the improvement of technical education; and
  • Encourages new and innovative approaches to technical education and its assessment.

Program educational objectives

Program educational objectives are broad statements describing what graduates are expected to attain within a few years after graduation. Program educational objectives are based on needs of the program’s constituencies.

The program educational objectives for the B.S. in Computer Science are that:

  1. Graduates will have progressed in the computing field by either obtaining an advanced technical or management position, exhibiting entrepreneurial activities or obtaining a graduate degree.
  2. Graduates will have contributed to societal needs by working with others to develop software systems.
  3. Graduates will be committed to lifelong learning and contributing back to the profession.
  4. Graduates will be committed to professional and ethical standards established by related professional societies.

The program educational objectives for the B.S. in Cybersecurity are that:

  1. Graduates will have progressed in the cybersecurity field by either obtaining an advanced technical or management position, exhibiting entrepreneurial activities, or obtaining a graduate degree.
  2. Graduates will have contributed to societal needs by working with others to develop resilient and secure software systems and infrastructure.
  3. Graduates will be committed to lifelong learning and contributing back to the profession.
  4. Graduates will be committed to the professional and ethical standards established by related professional societies.

Student outcomes

Student outcomes describe what students are expected to know and be able to do by the time of graduation. These relate to knowledge, skills and behaviors students acquire as they progress through the program.

The student outcomes for the B.S. in Computer Science are that graduates will have an ability to:

  1. Analyze a complex computing problem, and apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Apply computer science theory and software development fundamentals to produce computing-based solutions.

The student outcomes for the B.S. in Cybersecurity are that graduates will have an ability to:

  1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  3. Communicate effectively in a variety of professional contexts.
  4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  5. Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  6. Apply security principles and practices to maintain operations in the presence of risks and threats.

Information on undergraduate enrollment and degrees awarded can be found on the following pages:

Other degree and major outcome and assessment information

Computer science, B.S.
Cybersecurity, B.S.
Computer science, M.S.
Computer science, Ph.D.