Cyber Security and Assurance
Page Navigation
Program Learning Outcomes
- 
	- 
Follow a structured model in Security Systems Development Life Cycle (SDLC). 
- 
Detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources. 
- 
Protect data and respond to threats that occur over the Internet. 
- 
Design and implement risk analysis, security policies, and damage assessment. 
- 
Plan, implement and audit operating systems’ security in a networked, multi-platform and cross platform environment. 
- 
Provide contingency operations that include administrative planning process for incident response, disaster recovery, and business continuity planning within information security. 
 
- 
