(503) 667-4978 admissions@calcharter.org

Computer Information Systems

LIMITED SPACE AVAILABLE – APPLY NOW

Your future.  Your choice.

I was amazed how much detail goes into coding, and cybersecurity just fascinated me!

George Cameron, Chancellor of the Exchequer of the United Kingdom spoke about the importance of cybersecurity in 2016, he said:

“If we do not act decisively, the skills gap will grow, and limit everything we want to achieve in cyberspace. So we will …build the cyber skills our country needs, identifying young people with cyber talent, training them, and giving them a diversity of routes into cyber careers.”

Braught’s

Blog

Read the fascinating insights to Mr. Braught’s thoughts and opinions on Computer Information Systems, how they relate to CAL and changing the world forever!

Protect Yourself From Malware!

As we were running diagnostics on her computer, she pulled out a list of items that her girlfriend said she needed to change. The first thing on her list was to get rid of the login screen that required her to enter her password. My friend realized this was not a good idea when she saw the look on my face. She decided to keep her login screen on her computer and her phone after I explained the importance of it. Then she asked me, “How do I protect myself from the problems Europe is experiencing now?” She was referring to the new ransomware that was spreading.

That was a great question!”

To the full blog post, click here

Rethinking Assessments

Earlier in the year, I read a blog about assessing students according to their preferences and strengths instead of using the standard feedback of paper & pencil. I reflected on the post and decided that I needed to change how I assess students’ learning. I needed to allow the students to use their talents to explain what they had learned. Click here to read the full blog post.

Reading Strategy for Cyber Security

Cyber Security is continually evolving so I have the students read current articles in class and we use the information from articles and videos for class discussions. I had problems in the past with the students reading assigned articles and have meaningful discussions. I must give credit to my colleague for coming up with the strategy we employed this year. What we originally saw as ‘apathy’ or unwillingness in responses quickly revealed a misunderstanding and the need for clarity of the readings. We feel embedding and following through with this reading strategies have been a positive and meaningful addition to student comprehension and performance. The discussions became more interactive. Click here for the full post

CIS Overview

This technological infrastructure depends on well-trained professionals to support the systems and networks necessary for essential computer operations.  At CAL, students learn programming, networking, and are exposed to multiple cybersecurity technologies, processes, and procedures.  Our students learn how to analyze cybersecurity threats, vulnerabilities and risks and develop appropriate strategies to mitigate potential cybersecurity problems.