Dec 03, 2024  
Learning Outcomes Catalog 
    
Learning Outcomes Catalog

Computer Information Systems (AAS), Cyber Security Concentration


Return to {$returnto_text} Return to: Programs of Study

Upon successful completion of this program, students will be able to:

  1. Create a threat model for a given scenario, identifying assets, threats, and mitigations.
  2. Apply principles of secure system design to host and network security scenarios.
  3. Use derived requirements such as authentication and access control to secure systems and networks.
  4. Perform forensic analysis of systems and create a report of results.

Return to {$returnto_text} Return to: Programs of Study