- KNOWLEDGE/APPLICATION: Explain and apply the interdisciplinary knowledge of information sciences in a security context to recognize, analyze, defend against, and manage cyber risks.
- 1a. Describe the components and interoperability of computer hardware, operating systems, networks and databases. (Cyber100) (IST 220, IST 210)
- 1b. Demonstrate proficiency in programming and scripting to perform Cybersecurity automation and analysis. (IST 140, IST 242, IST 261, Cyber 362, Cyber 366)
- 1c. Identify Cyber threats and appropriate defensive designs and tools to mitigate the risk of attack. (Cyber 262, SRA 111, SRA 221, IST 451, IST 454, Cyber 440)
- 1d. Explain the procedures for Cybersecurity Incident Handling and Response (Cyber 342W, Cyber 440)
- 1e. Illustrate the static and dynamic analysis of malware. (Cyber 366)
- PROBLEM-SOLVING: Understand, apply and adapt various problem solving strategies, using appropriate technology and methods
- 2a. Identify Cybersecurity threats and implement complementary defensive measures to mitigate risk. (Cyber 262, Cyber 100, SRA 111, SRA 221, IST 454, IST 451, Cyber 440)
- 2b. Apply data analytics in a security context to analyze, predict and prevent cyberattacks. (Cyber 362, IST 451, IST 454, IST 456, Cyber 440)
- 2c. Perform malware analysis and forensics to understand the nature and origin of attacks. (Cyber 366, SRA 221)
- 2d. Evaluate several Cybersecurity frameworks and provide analysis that culminates in a high level executive briefing exercise. (Cyber 440, Cyber 342W, IST 456, Cyber 440)
- COMMUNICATION (INDIVIDUAL AND TEAM): Communicate and work effectively (both individually and in teams) with a range of perspectives and audiences through a variety of media
- 3a. Synthesize data from multiple sources to help make informed decisions. (Cyber 362, Cyber 342W, Cyber 440)
- 3b. Communicate and work effectively (both individually and in teams) with a range. (Cyber 342W) (Cyber 440)
- 3c. Participate effectively on teams to accomplish a common cybersecurity task. (Cyber 342W) (Cyber 440)
- PROFESSIONAL RESPONSIBILITIES: Describe professional responsibilities in terms of the ethical, legal and security policy aspects of information assurance and security.
- 4a. Identify the rules, regulations and issues related to compliance with applicable laws and regulations related to Information Security and Privacy. (Cyber100, IST 432, SRA 472)
- 4b. Recognize the legal and ethical ramifications of violating the trust that organizations will place in you as a Cybersecurity professional. (Cyber 100, Cyber 262, Cyber 362, Cyber 366, Cyber 342W, Cyber 440, IST 432, SRA 472)
- LIFELONG LEARNING: Commit to the continuous acquisition of relevant knowledge for professional development by self-teaching and/or on-going education and certification. (Cyber 100, Cyber 262, Cyber 362, Cyber 366, Cyber 342W, Cyber 440)
- 5a. Employ information-seeking strategies and self-directed learning in pursuit of current knowledge (Cyber 100, Cyber 262, Cyber 362, Cyber 366, Cyber 342W, Cyber 440)
- 5b. Explore and become aware of professional development and industry certifications to enhance future career opportunities and the profession. (Cyber 100, Cyber 342W, Cyber 440)