{"id":62,"date":"2018-04-17T16:23:27","date_gmt":"2018-04-17T16:23:27","guid":{"rendered":"https:\/\/public-info.dsu.edu\/curriculum\/?page_id=62"},"modified":"2019-03-19T18:37:37","modified_gmt":"2019-03-19T18:37:37","slug":"academic-year-2017-2018","status":"publish","type":"page","link":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/academic-year-2017-2018\/","title":{"rendered":"Academic Year 2017-2018"},"content":{"rendered":"<p><strong>Intent to Plan<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU-Intent-to-Plan-IS-DSc-to-PhD-2018-Final.docx\">D.Sc. Information Systems<\/a> (Ph.D.) (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU.I2P.DSc-to-PhD.Cyber-Security-Final.docx\">D.Sc. Cyber Security<\/a> (Ph.D. Cyber Operations) (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU.I2P.PhD-in-Cyber-Defense-Final.docx\">Ph.D. Cyber Defense (BOR APPROVED)<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU.I2P.MS-Security-Policy-Management-Final-1.docx\">M.S. Security Policy &amp; Management (BOR APPROVED)<br \/>\n<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU.I2P.Cyber-Leadership-and-Intelligence-Final7.docx\">B.S. Cyber Leadership and Intelligence <\/a>(BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU.I2P.PhD_.Computer-Science-Final.docx\">Ph.D. Computer Science (BOR APPROVED)<\/a><\/p>\n<p><strong>New Programs<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/DSU-Ph.D.-Cyber-Operations-Program-Proposal-Final.docx\">Ph.D. Cyber Operations<\/a> (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/DSU-Ph.D.-Information-Systems-Program-Proposal-Final.docx\">Ph.D. Information Systems<\/a> (BOR APPROVED)<strong><br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU.BS_.CyberLeadership.BOR-final.docx\">B.S. Cyber Leadership and Intelligence<\/a> (BOR APPROVED)<strong><br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Cybersecurity-Certificate-18.docx\">Cybersecurity Certificate\u00a0<\/a>(BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Network-Services-Certificate-18.docx\">Network Services Certificate<\/a> (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Software-Development-Certificate-18-DSU.docx\">Software Development Certificate<\/a> (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/06\/DSU.Certificate.Math-and-Cryptography-Final.pdf\">Mathematical Foundations of Cryptography<\/a> (undergraduate)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU.Certificate.-Intro-Graduate-Math-Final.docx\">Introductory Graduate Mathematics Certificate<\/a> (graduate)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU.Certificate.Advanced-Graduate-Math-Final.docx\">Advanced Graduate Mathematics Certificate<\/a> (graduate)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU.Minor_.English-for-New-Language-Final.docx\">English for New Language Minor<\/a><br \/>\nK-12 Special Education Minor<br \/>\nHealthcare Data Analytics Certificate (graduate)<\/p>\n<p><strong>New Site Request<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU-ELED-New-Site-Request-18.docx\">B.S. Elementary Education <\/a> (distance)<\/p>\n<p><strong>Request to Seek Accreditation<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/MSHIIM-Accreditation-Request.docx\">M.S. <\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/MSHIIM-Accreditation-Request.docx\">HIIM Accreditation Request (BOR APPROVED)<\/a><\/p>\n<p><strong>Revised Course Requests-Common<\/strong><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ART-111-Revised-Course-Request-Common-18.docx\">ART 111 Drawing I<\/a> (university prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-484-Minor-Course-Modification-18-Copy.docx\">CIS 484 Database Management Systems<\/a> (university prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ECON-201_MinorCourseModification-18-Copy.docx\">ECON 201 Principles of Microeconomics\u00a0<\/a>(university prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ECON-202_MinorCourseModification-18-Copy.docx\">ECON 202 Principles of Macroeconomics<\/a> (university prerequisite)<\/p>\n<p><strong>New Course Requests<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ACCT-452-New-Course-Request-18.docx\">ACCT 452 Fraud and Forensics Accounting<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/BADM-730-New-Course-Request-18.docx\">BADM 730 Supply Chain Management (pending)<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/BADM-732-Supply-Chain-Analytics.docx\">BADM 732 Supply Chain Analytics (pending)<br \/>\n<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/BADM-776-New-Course-Request-18.docx\">BADM 776 Fundraising-Strategies and Innovation<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-101-New-Course-Request.docx\">CLI 101 Introduction to Cyber Security Leadership<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-310-New-Course.docx\">CLI 310 Hacking, Hackers, and Hacktivism<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-370-New-Course-Request-18.docx\">CLI 370 Cyber-Ethics<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-420-New-Course-Request.docx\">CLI 420 Cyber Leadership<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-491-New-Course-Request.docx\">CLI 291 &amp; 491 Independent Study<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-292-492-New-Course-Request-18.docx\">CLI 292 &amp; 492 Topics<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-494-New-Course-Request-18.docx\">CLI 494 Internship<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CLI-498-New-Course-Request.docx\">CLI 498 Undergraduate Research-Project<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CIS-211-New-Course-request-18.docx\">CIS 211 Quickbooks II<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CSC-134-New-Course-Request-18.docx\">CSC 134 Introduction to Cyber Operations<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CSC-310-New-Course-Request-18.docx\">CSC 310 Advanced Data Structures<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CSC-404-New-Course-Request-18.docx\">CSC 404 Foundations of Computation<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CSC-723-New-Course-Request-18.docx\">CSC 723 Machine Learning for Cyber Security<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CSC-773-New-Course-Request-18.docx\">CSC 773 Mobile Communication and Advanced Network Security<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CSC-783-New-Course-Request-18.docx\">CSC 786 Cyber Problems<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-482-New-Course-Request-18.docx\">DAD 482 Career Preparation<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/HIM-270-New-Course-Request-18.docx\">HIM 270 Practical Coding Application<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Math_436-536-New-Course-Request-18.docx\">MATH 436_536 Number Theory and Cryptography<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Math_437-537-New-Course-Request-18.docx\">MATH 437_537 Cryptography and Codes<br \/>\n<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Math_561-New-Course-Request.docx\">MATH 561 Geometry<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Math_622-New-Course-Request.docx\">MATH 622 Difference Equations<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/INFA-754-New-Course-Request-18.docx\">INFA 754 Intrusion Detection<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/INFS-776-New-Course-Request-18.docx\">INFS 776 Business Intelligence &amp; Visualization<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/SOC-370-New-Course-Request-18.docx\">SOC 370 People and their Cultures<\/a><\/p>\n<p><strong>New Index Code<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CLI-New-Prefix-Request.docx\">CLI &#8211; Cyber Leadership &amp; Intelligence<\/a><\/p>\n<p><strong>Authority to Offer Existing Common Course<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ACCT-480-Authority-to-offer-Exisitng-Course.docx\">ACCT 480 Advanced Accounting<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/PE-100-Authority-to-Offer.docx\">PE 100 Activity<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/EDFN-460-560-Authority-to-Offer-18.docx\">EDFN 460-560 Applied Linguistics Teaching English as a Second Language<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/GEOG-353-Authority-to-Offer-SDSU-18.docx\">GEOG 353 Geography of Religion<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Math_513-Authority-to-offer-18.docx\">MATH 513 Abstract Algebra I <\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Math_571-Authority-to-offer-18.docx\">MATH 571 Numerical Analysis<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Math_575-Authority-to-Offer-18.docx\">MATH 575 Operations Research<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/POLS-350-Authority-to-Offer.docx\">POLS 350 International Relations<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/POLS-440-Authority-to-Offer-18.docx\">POLS 440 Comparative Government<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/SOC-402-Authority-to-Offer.docx\">SOC 402 Social Deviance<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/PHIL-292-Authority-to-offer-Exisitng-Course.docx\">PHIL 292 Topics<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/06\/PHYS-185-Authority-to-Offer-18.docx\">PHYS 185-185L Astronomy I &amp; Lab<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/06\/PHYS-187-Authority-to-Offer-18.docx\">PHYS 187-187L Astronomy II &amp; Lab<\/a><\/p>\n<p><strong>Substantive Program Modification<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MSIA-Program-Modification-Fall-2017.docx\">M.S. Information Assurance &amp; Computer Security<\/a> (name change to Cyber Defense) (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-Substantive-Program-Modification-18.docx\">B.S. Computer Information System<\/a> (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MSACS-Substantive-Program-Modification-18.docx\">M.S. Applied Computer Science<\/a> (name change) APPROVED<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ComputerScience-Substantive-Program-Mod-18-revised.docx\">B.S. Computer Science (BOR Approved)<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-SubstantiveProgramModification-18-1.docx\">B.S. Digital Arts and Design<\/a> (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/BIOL-Minor-Substantive-Program-Modification-Program-2018_.docx\">Biology Minor<\/a> (BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Professional-Accountancy-Substantive-Program-Modification-Program-18.docx\">B.S. Professional Accountancy (BOR Approved)<br \/>\n<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/CIS_MSAnalytics-Fast-Track-41.docx\">B.S. Computer Info Systems Fast Track to MS Analytics (BOR Approved)<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/MATH-Substantive-Program-Modification.Final_.docx\">B.S. Mathematics for Information Systems and B.S.Ed. Mathematics<\/a><\/p>\n<p><strong>New Specialization<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Computer-Science-New-Specialization-AI-Machine-Learning-Fall-18-1.docx\">B<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Computer-Science-New-Specialization-AI-Machine-Learning-Fall-18-1.docx\">.S. Computer Science-Artificial Intelligence-Machine Learning (BOR APPROVED)<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DSU.Specialization.Info-Assurance-in-MS-in-Info-Systems-Final-2018.docx\">M.S. Information Systems, Information Assurance (BOR APPROVED)<br \/>\n<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU.Specialization.Information-Systems-in-Math.Final_.docx\">B.S. Mathematics, Information Systems<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU.Specialization.Cryptography-in-Math.Final_.docx\">B.S. Mathematics, Cryptography<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU.Specialization.Secondary-Ed-in-Math.Final_.docx\">B.S. Mathematics, Secondary Education<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/DSU.Specialization.Intermediate-Ed-in-Math.Final_.docx\">B.S. Mathematics, Intermediate Education<\/a><\/p>\n<p><strong>Program Termination<\/strong><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Website-Administration-Certificate-Program-Termination-18.docx\">W<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Website-Administration-Certificate-Program-Termination-18.docx\">ebsite Administration Certificate\u00a0<\/a>(BOR APPROVED)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Info-Tech-Entrepreneurship-Certificate-Termination-Spg-18.docx\">Information Technology Entrepreneurship Certificate<\/a> (BOR APPROVED)<\/p>\n<p><strong>Minor Course Modifications<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ARTD-336-Minor-Course-Modification-18.docx\">ARTD 336 Digital Photography I<\/a> (course number)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ARTD-436-Minor-Course-Modification-18.docx\">ARTD 436 Digital Photography II<\/a> (course number)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-210-Minor-Course-Modification-18.docx\">CIS 210 QuickBooks<\/a> (title)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-275-Minor-Course-Modification-18.docx\">CIS 275 Web Application Programming I<\/a> (prerequisite, description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-321-Minor-Course-Modification-18.docx\">CIS 321 Information Security Management<\/a> (prefix)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-372-Minor-Course-Modification-18.docx\">CIS 372 Programming for Analytics<\/a> (prerequisite, description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-375-Minor-Course-Modification-18.docx\">CIS 375 Web Application Programming II<\/a> (description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-418-Minor-Course-Modification-18.docx\">CIS 418 Advanced Computer Forensics<\/a> (prefix)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-419-Minor-Course-Modification-18.docx\">CIS 419 Advanced Windows Forensics<\/a> (prefix)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CIS-434-Minor-Course-Modification-Deletion18.docx\">CIS 434 Computer Forensics and Investigations<\/a> (deletion)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CSC-234-Minor-Course-Modification-18.docx\">CSC 234 Software Security<\/a> (prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CSC-245-Minor-Course-Modification-18.docx\">CSC 245 Information Security Fundamentals<\/a> (course number)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CSC-420-Minor-Course-Modification-18.docx\">CSC 420 Cellular and Mobile Communications<\/a> (prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CSC-432-Minor-Course-Modification-18.docx\">CSC 432 Malware Analysis<\/a> (prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CSC-444-Minor-Course-Modification-18.docx\">CSC 444 Reverse Engineering<\/a> (course number)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-110-Minor-Course-Request-18.docx\">DAD 110 Introduction to the Digital Arts and Design<\/a> (credit hours, description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-222-Minor-Course-Modification-18.docx\">DAD 222 Audio Production I: Foundations<\/a> (description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-310-Minor-Course-Modification.docx\">DAD 310 Digital Soundtrack Production<\/a> (prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-322-Minor-Course-Modification-18.docx\">DAD 322 Audio Production II: Multi-Track Environments<\/a> (prerequisite, description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-423-Minor-Course-Modification-18.docx\">DAD 423 MIDI Techniques<\/a> (prerequisite, description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-424-Minor-Course-Request-18.docx\">DAD 424 Video for Video Post-Production<\/a> (prerequisite, description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/DAD-350-Minor-Course-Modification-18.docx\">DAD 350 Recording Session<\/a> (course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/ENGL-480-Minor-Course-Request-18.docx\">ENGL 480 Contemporary Rhetoric<\/a> (course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/HIM-252-Minor-Course-Modification-18.docx\">HIM 252 Basic Foundations of Health Data Systems<\/a> (credit hours)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/HIM-283-Minor-Course-Modification-18.docx\">HIM 283 Healthcare Coding Experience<\/a> (course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/HIM-285-Minor-Course-Modification-18.docx\">HIM 285 Supervised Professional Practice<\/a> (course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/HIM-286-Minor-Course-Modification.docx\">HIM 286 Supervised Professional Practice<\/a> (prerequisite, course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/HIM-287-Minor-Course-Modification-18.docx\">HIM 287 Supervised Professional Practice<\/a> (course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/HIM-360-Minor-Course-Modification-18.docx\">HIM 360 Management Health Information Center<\/a> (prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/HIM-380-Minor-Course-Modification-18.docx\">HIM 380 Healthcare Data Analytics<\/a> (prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MUS-108-Minor-Course-Request-18.docx\">MUS 108 Basic Musicianship for Audio Industry<\/a> (course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MUS-204-Minor-Course-Request-18.docx\">MUS 204 Introduction to American Pop Music<\/a> (prerequisite, course description)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/08\/MUS-204-Minor-Course-Request-18-2.docx\">MUS 204 Introduction to American Pop Music<\/a> (title)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/RESP-210-Minor-Course-Request-18.docx\">RESP 210 Respiratory Critical Care<\/a> (prerequisite)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/RESP-250-Minor-Course-Request-18.docx\">RESP 250 Clinical Experience II\u00a0<\/a> (prerequisite)<\/p>\n<p><strong>Prefix Changes<\/strong><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MLED-300-to-EDFN-300-Minor-Course-Modification-18.docx\">MLED 300 Survey of Middle Level Education<\/a> (prefix to EDFN)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/07\/SCTC-303-to-BIOL-303-Minor-Course-Modification-18.docx\">SCTC 303 Intro to Biological Instrumentation\u00a0<\/a>(prefix to BIOL)<br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/07\/SCTC-345-to-BIOL-335-Minor-Course-Modification-18.docx\">SCTC 345 Intro to Bioinformatics<\/a> (prefix BIOL &amp; number 335)<br \/>\nWEL prefix eliminated &#8211; moved to HLTH<\/p>\n<p><strong>Obsolete Course List &#8211; Course deletion<br \/>\n<\/strong><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/07\/DSU-Obsolete-Course-Deletion-List-FINAL.xlsx\">DSU &#8211; Obsolete Course Deletion List &#8211; FINAL<\/a><\/p>\n<p><strong>Minor Program Modifications<\/strong><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MSACS-Minor-Program-Modification-18.docx\">M.S. Applied Computer Science, Cyber Operations Specialization<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Physical-Education-Minor-Program-Modification-18.docx\">B.S.Ed. Physical Education<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/EXS-Minor-Program-Modification-18.docx\">B.S. Exercise Science<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Info-Technology-Mgmt-Certificate-Minor-Program-Mod-18.docx\">Information Technology Management Certificate<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Technology-Database-Mgmt-Systems-Certificate-Minor-Program-Modification-18.docx\">Technology Database Management Certificate<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Web-Application-Dev-Certificate-Minor-Program-Mod-18.docx\">Web Application Development Certificate<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/BIOL-Minor-program-modification-18.pdf\">B.S. Biology <\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MBA-Minor-Program-Modification-18.docx\">MBA General Management<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MSA-Minor-Program-Modification.docx\">M.S. Analytics<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/General-Beadles-Honors-Minor-Program-Modification-18.docx\">General Beadle Honors Program<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Healthcare-Coding-Certificate-Minor-Program-Modification-18.docx\">Healthcare Coding Certificate<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/MSIS-Minor-Program-Modification-18.docx\">M.S. Information Systems<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Comp-Sci-Minor-Minor-Program-Mod-18.docx\">Computer Science Minor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Computer-Game-Design-Minor-Program-Modification-18.docx\">B.S. Computer Game Design<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/NetworkSecurityAdmin-A.S.-Minor-Program-Mod-18.docx\">A.S. Network &amp; Security Administration<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/NetworkSecurityAdmin-Minor-Program-Mod-18.docx\">B.S. Network &amp; Security Administration<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Cyber-Operations-Minor-Program-Mod-18.docx\">B.S. Cyber Operations<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Health-Info-Technology-Minor-Program-Modification-18.docx\">A. S. Health Info Technology<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Health-Info-Administration-Minor-Program-Modfication-18.docx\">B.S. Health Info Administration<br \/>\n<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Digital-Photography-Minor-Minor-Program-Modification-18.docx\">Digital Photography Minor<\/a><\/p>\n<p><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/07\/Health-Info-Management-Minor-Minor-Program-Modification-18.docx\">Health Info Management Minor<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/09\/Eled-Sped-Minor-Minor-Program-Mod-18.docx\">B.S. Elementary Education-Special Education<\/a><\/p>\n<p><strong>General Education<\/strong><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/General-Education-addition-PHIL-220.docx\">General Education addition &#8211; PHIL 220<\/a><\/p>\n<p>General Education addition &#8211; PHYS 185\/185L &amp; PHYS 187\/187L<\/p>\n<div class=\"clear\"><strong>Minutes<\/strong><br \/>\n<strong>Curriculum Committee<\/strong><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-10-22-17.pdf\">CC Minutes &#8211; 10-22-17<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-11-17-17.pdf\"><br \/>\nCC Minutes &#8211; 11-17-17<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-2-2-18.pdf\"><br \/>\nCC Minutes &#8211; 2-2-18<\/a> <a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-2-16-18.pdf\"><br \/>\nCC Minutes &#8211; 2-16-18<\/a> <a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-3-2-18.pdf\"><br \/>\nCC Minutes &#8211; 3-2-18<\/a> <a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-3-23-18.pdf\"><br \/>\nCC Minutes &#8211; 3-23-18<\/a> <a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-4-6-18.pdf\"><br \/>\nCC Minutes &#8211; 4-6-18<\/a> <a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-4-20-18.pdf\"><br \/>\nCC Minutes &#8211; 4-20-18<\/a> <a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/CC-Minutes-10-22-17.pdf\"><br \/>\n<\/a><br \/>\n<strong>Graduate Council<\/strong><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Graduate-Council-Minutes-10-10-17.pdf\">GC Minutes 10-10-17<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Graduate-Council-Minutes-11-27-17.pdf\">GC Minutes 11-27-17<\/a> <a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Graduate-Council-Minutes-2-8-18.pdf\"><br \/>\nGC Minutes 2-8-18<\/a><br \/>\n<a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/04\/Graduate-Council-Minutes-4-16-18.pdf\">GC Minutes 4-16-18<br \/>\n<\/a><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/05\/Graduate-Council-Minutes-5-2-18.pdf\">GC Minutes 5-2-18<\/a><\/div>\n<div><a href=\"https:\/\/blogs.dsu.edu\/wp-content\/uploads\/sites\/18\/2018\/09\/Curriculum-Committee-2017-2018-Report.docx\">Curriculum Committee 2017-2018 Report<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Intent to Plan D.Sc. Information Systems (Ph.D.) (BOR APPROVED) D.Sc. Cyber Security (Ph.D. Cyber Operations) (BOR APPROVED) Ph.D. Cyber Defense (BOR APPROVED) M.S. Security Policy &amp; Management (BOR APPROVED) B.S. Cyber Leadership and Intelligence (BOR APPROVED) Ph.D. Computer Science (BOR APPROVED) New Programs Ph.D. Cyber Operations (BOR APPROVED) Ph.D. Information Systems (BOR APPROVED) B.S. Cyber &hellip;<br \/><a href=\"https:\/\/blogs.dsu.edu\/public-info-curriculum\/academic-year-2017-2018\/\">Read more <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":34,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-62","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/pages\/62"}],"collection":[{"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":83,"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/pages\/62\/revisions"}],"predecessor-version":[{"id":557,"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/pages\/62\/revisions\/557"}],"wp:attachment":[{"href":"https:\/\/blogs.dsu.edu\/public-info-curriculum\/wp-json\/wp\/v2\/media?parent=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}