Course Subjects

  • The learner will gain knowledge about securing both clean and corrupted systems, protect personal data, and secure computer networks
  • The learner will understand key terms and concepts in cyber law, intellectual property and cyber crimes, trademarks and domain theft
  • The learner will be able to examine secure software development practices.
  • The learner will understand principles of web security
  • The learner will be able to incorporate approaches for incident analysis and response
  • The learner will be able to incorporate approaches for risk management and best practices
  • The learner will gain an understanding of cryptography, how it has evolved, and some key encryption techniques used today
  • The learner will develop an understanding of security policies (such as confidentiality, integrity, and availability), as well as protocols to implement such policies
  • The learner will gain familiarity with prevalent network and distributed system attacks, defenses against them, and forensics to investigate the aftermath
  • To Create Solutions in Incident Handling
  • Implement Cybersecurity Best Practices and Risk Management
  • Communicate in a Written and Professional Manner to Strategize
  • Identify and Implement Legal Ramifications
  • Integrate Network Monitoring and Present Real-Time Solutions
  • Understand Software Design and Secure Practices
  • Impact Cybersecurity Risk in an Ethical, Social, and Professional Manner