Jan 30, 2025  
Learning Outcomes Catalog 
    
Learning Outcomes Catalog

Computer Information Systems (Certificate of Completion), Cyber Security


Return to {$returnto_text} Return to: Programs of Study

Upon successful completion of this program, students will be able to:

  1. Create a threat model for a given scenario, identifying assets, threats, and mitigations.
  2. Apply principles of secure system design to host and network security scenarios.
  3. Use derived requirements such as authentication and access control to secure systems and networks
  4. Perform forensic analysis of systems and create a report of results.

Return to {$returnto_text} Return to: Programs of Study