Nov 24, 2024  
2024-2025 Graduate Catalog 
    
2024-2025 Graduate Catalog

Cyber Security Learning Outcomes


Upon completion of the the Master of Science in Cyber Security, students should be able to:

  1. compete for employment in the public and private sector in the field of cyber security.
  2. be ready to prepare for Security+, CWTS, and CISSP security certifications.
  3. demonstrate research and problem solving skills as it relates to cyber security.
  4. apply managerial level (CIO, CSO) skills in the workforce.
  5. demonstrate knowledge of high ethical standards and the application of those standards in real life situations consistent with the Christian humanistic philosophy of St. Francis de Sales.

Program Learning Outcomes are mapped in the following way:

 

A

B

C

D

E

IT 515

X

 

X

 

X

IT 525

X

X

X

 

X

IT 545

X

X

X

X

X

IT 573

X

 

X

 

X

Below are the learning outcomes for each course:

IT 515 Vulnerability Assessment

IT 525 IT Security

IT 528 Wireless Technology Mgmt

IT 545 Cyber Security Mgmt

IT 573 Cryptography

Identify acceptable vulnerability assessment templates

Describe the principles of computer systems and network security

Describe a wireless local area network (WLAN) and the IEEE standards.

Conduct a risk assessment

Discuss the number theory

Demonstrate the ability to conduct a risk assessment

Identify passive and active threats

Understand the components of infrastructure and client devices.

 

Develop a business continuity plan

Describe how a pseudo-random bit generator works

Identify system vulnerabilities, conduct a vulnerability assessment, and produce a final report

Develop authentication methods

Explain radio frequency (RF) fundamentals

Understand the components required for a disaster recovery plan

Understand the difference between a block and stream cipher

Understand the difference between vulnerability assessment and penetration testing

Create firewalls and implement virus prevention methods

Describe wireless access methods

Identify legal and regulatory compliance conformance criteria

Distinguish between private key and public key encryption

Identify penetration testing tools

Discuss encryption, digital signatures, and biometrics

Troubleshoot a WLAN.

 

 

Discuss the various types of hashing functions

Performa a system penetration test

Apply security to operating systems and applications

Design a WLAN site survey

 

Describe how message authentication and digital signatures work

 

Identify the goals of preserving the integrity of data and preventing unauthorized access to information