{"id":39,"date":"2016-02-10T17:39:00","date_gmt":"2016-02-10T17:39:00","guid":{"rendered":"https:\/\/huangshizhaopin.com\/cyber-security\/?page_id=39"},"modified":"2019-01-04T16:58:04","modified_gmt":"2019-01-04T21:58:04","slug":"program-goals-and-learning-objectives","status":"publish","type":"page","link":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/program-goals-and-learning-objectives\/","title":{"rendered":"Program Goals and Learning Objectives"},"content":{"rendered":"

Master of Science in Cyber Security<\/h3>\n

Educational Objectives<\/h5>\n

The educational objectives of the program are:<\/p>\n

    \n
  1. To prepare students with the technical knowledge and skills needed to protect and\u00a0defend computer systems and networks.<\/li>\n
  2. To develop graduates that can plan, implement, and monitor cyber security\u00a0mechanisms to help ensure the protection of information technology assets.<\/li>\n
  3. To develop graduates that can identify, analyze, and remediate computer security\u00a0breaches.<\/li>\n<\/ol>\n
    \nProgram Learning Outcomes<\/h5>\n

    Upon completion of the degree program, students will be able to:<\/p>\n

      \n
    1. Analyze and evalsuate the cyber security needs of an organization.<\/li>\n
    2. Conduct a cyber security risk assessment.<\/li>\n
    3. Measure the performance and troubleshoot cyber security systems.<\/li>\n
    4. Implement cyber security solutions.<\/li>\n
    5. Be able to use cyber security, information assurance, and cyber\/computer\u00a0forensics software\/tools.<\/li>\n
    6. Identify the key cyber security vendors in the marketplace.<\/li>\n
    7. Design and develop a security architecture for an organization.<\/li>\n
    8. Design operational and strategic cyber security strategies and policies.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

      Master of Science in Cyber Security Educational Objectives The educational objectives of the program are: To prepare students with the technical knowledge and skills needed to protect and\u00a0defend computer systems and networks. To develop graduates that can plan, implement, and monitor cyber security\u00a0mechanisms to help ensure the protection of information technology assets. To develop graduates […]<\/p>\n","protected":false},"author":32,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"open","ping_status":"open","template":"template-department-standard-child.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-39","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages\/39","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":3,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages\/39\/revisions"}],"predecessor-version":[{"id":79,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/pages\/39\/revisions\/79"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}