Skip To Main Content

Logo Image

BCCC Logo - White Version

Logo Title

Program Learning Outcomes

  • Follow a structured model in Security Systems Development Life Cycle (SDLC).

  • Detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources.

  • Protect data and respond to threats that occur over the Internet.

  • Design and implement risk analysis, security policies, and damage assessment.

  • Plan, implement and audit operating systems’ security in a networked, multi-platform and cross platform environment.

  • Provide contingency operations that include administrative planning process for incident response, disaster recovery, and business continuity planning within information security.