Cyber Security and Assurance
Page Navigation
Program Learning Outcomes
-
-
Follow a structured model in Security Systems Development Life Cycle (SDLC).
-
Detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources.
-
Protect data and respond to threats that occur over the Internet.
-
Design and implement risk analysis, security policies, and damage assessment.
-
Plan, implement and audit operating systems’ security in a networked, multi-platform and cross platform environment.
-
Provide contingency operations that include administrative planning process for incident response, disaster recovery, and business continuity planning within information security.
-