Be on schedule.Score better.

support@savemydegree.com

EN

Our Services

Get 15% Discount on your First Order

Review rubric and document 6/13/24, 5:56 PMRubric Assessment – CSIA 300 6982 Cybersecurity for Leaders and Managers (2245) – UMGC Learning

Review rubric and document 

6/13/24, 5:56 PMRubric Assessment – CSIA 300 6982 Cybersecurity for Leaders and Managers (2245) – UMGC Learning Management System

Page 1 of 1

Discussion Rubric CSIA
Course: CSIA 300 6982 Cybersecurity for Leaders and Managers (2245)

Total

Overall Score

Criteria Exceeds Meets Needs Improvement Does Not Meet Criterion Score

Quality of the Initial

Post: Expresses

coherent, well-

reasoned thinking as

supported by evidence

included in the

discussion post.

Accuracy: Specifically

addresses topics and/or

questions in the

discussion instructions.

/ 15

Quality and frequency

of interactions:

Responses in the 2

replies are substantive

and add value and

advance the

conversation.

/ 15

Timeliness: Posts initial

response by before

Sunday at 11:59 PM ET

and additional critiques

and follow-up

responses by Tuesday

at 11:59 ET.

/ 10

15 points

Posts a complete, and

coherent initial response

to the discussion prompt

that fully addresses all

the elements of the

discussion topic or

question.

Posts ideas that address

assigned topics and/or

questions and

demonstrates a creative

approach.

10 points

Posts a somewhat

coherent response to the

initial discussion topic,

but the response is

missing major points.

5 points

Covers some aspects of

the question(s) posed,

thoughts are mostly

clearly expressed or well

thought-out, but not all.

May contain some helpful

follow-through. Missing

attribution to the text or

sources where

appropriate.

0 points

Did not post or

mischaracterized

concepts or facts related

to course content. Did

not present a discernible

or reasonable logic.

15 points

Respectfully responds to

peers and/or instructor in

a timely fashion and adds

value to the conversation

by providing constructive

feedback, asking follow-

up questions, and

presenting thoughtful,

reflective comments.

Posts are timely and meet

expectations for the

frequency of posts.

10 points

Responds to a fellow

student, adding some

value to the discussion.

5 points

Peer responses have

some or minimal relevant

content, and/or are off-

topic, and/or contain(s)

no relevant information.

0 points

Does not post a response

to the topic assignment.

10 points

Posts complete and

timely responses to the

discussion topic or

question.

7 points

May miss set deadlines or

lack a sufficient number

of posts.

3 points

Did not post or respond

during the time period

allowed.

0 points

Did not post and did not

respond during the time

period allowed.

Exceeds
40 points minimum

Meets
30 points minimum

Needs Improvement
20 points minimum

Does not meet
0 points minimum

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

100 word response 1 reference due 6/22/2024Emmons Discussion 3-3:

100 word response 1 reference due 6/22/2024 Emmons Discussion 3-3: Compliance within the Remote Access Domain What are some common risks, threats, and vulnerabilities found in the Remote Access Domain that must be mitigated through a layered security strategy?  What risks, threats, and vulnerabilities are introduced by implementing a remote

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 a

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 and was enacted to assist reform the financial industry and address consumer financial privacy concerns (Federal Trade Commission, 2023). GLBA possesses requirements for the Federal Trade Commission and

200 word response 1 reference Due 6/8/2024JacksonDiscussion 2-2: Conducting an IT

200 word response 1 reference Due 6/8/2024 Jackson Discussion 2-2: Conducting an IT Infrastructure Audit for Compliance IT security policies have a high level of importance for a compliance audit. As defined by Fortinet, and IT Security Policy “identifies the rules and procedures for all individuals and using an organization’s