Program Learning Outcomes

    • Follow a structured model in Security Systems Development Life Cycle (SDLC).

    • Detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources.

    • Protect data and respond to threats that occur over the Internet.

    • Design and implement risk analysis, security policies, and damage assessment.

    • Plan, implement and audit operating systems’ security in a networked, multi-platform and cross platform environment.

    • Provide contingency operations that include administrative planning process for incident response, disaster recovery, and business continuity planning within information security.