|
Nov 23, 2024
|
|
|
|
2022-2023 General Catalog [ARCHIVED CATALOG–FOR INFORMATION ONLY]
Program Learning Outcomes: Cybersecurity/Cyber Security and Information Assurance
|
|
Cybersecurity (BS)
- Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Cybersecurity (Minor)
- Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Cybersecurity Essentials (Certificate)
- Apply security principles and practices to maintain operations in the presence of risks and threats.
Cyber Security and Information Assurance (MS)
- Explore security risks, threats, and vulnerabilities while designing and building working solutions to protect the computing assets of an organization.
- Develop, apply, and institutionalize risk management practices and assessment from cyber security perspective.
- Examine, analyze and interpret legal & ethical aspects from cyber security perspectives.
- Explore the role information assurance plays in cyber security, particularly in the development and deployment of frameworks and how one must account for this in security planning.
- Design and implement technical solutions to secure systems.
|
|
|