In this key topic the apprentice will describe and explain the terminology and basic concepts of cyber security.
Cyber security course objectives and outcomes.
Graduates of the cybersecurity bachelor s online degree program will demonstrate the following industry specific skills knowledge and competencies.
This course focusses on the models tools and techniques for enforcement of security with some emphasis on the use of cryptography.
The overall focus on a cybersecurity degree is to implement successful solutions to the security needs of a business through risk compliance incident handling integrated network solutions and application development while maintaining an ethical profile.
This course provides students with concepts of computer security cryptography digital money secure protocols detection and other security techniques.
Balance business technical and security requirements and constraints.
Analyze business requirements research develop and integrate solutions for enterprise it requirements.
Goals and objectives of the course by palash verma 0 comment may 19 2018 cocepts of cybersecurity cybersecurity cybersecurity funda cybersecurity fundamentals fundamentals of cybersecurity goals and objective of cybersecurity course goals of hacking scope of cybersecurity scope of ethical hacking.
The fundamentals of cybersecurity.
In today s cyber world it is important for engineers to understand and appreciate computer information security as it has becomes an essential aspects of our day life.
To develop graduates that can identify analyze and remediate computer security breaches.
Integrate operating systems services network devices and security controls to meet the requirements.
The learner will understand key terms and.
2 1 describe confidentiality integrity availability identity authentication and nonrepudiation.
Conduct a cyber security risk assessment.
Objective of the course.
The objective of this course is to create architectural algorithmic and technological foundations for the maintenance of the privacy of individuals the confidentiality of organizations and the protection of sensitive information despite the requirement that information be released publicly or semi publicly.
2 2 explain how threats and vulnerabilities create risk.
Measure the performance and troubleshoot cyber security systems.
The learner will gain knowledge about securing both clean and corrupted systems protect personal data and secure computer networks.
Outcomes should include an ability to.
Evaluate the computer network and information security needs of an organization.
Students will learn security from multiple perspectives.