Computer Science

Reflect on the connection between knowledge or concepts from these courses and how those have been, or could be, applied in the work place (200-250 words per course reflection. If you were a full time student and took 2 courses, you should write a total of 400-500 words).

Students should;

  • Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.
  • Be able demonstrate the application of theory to workplace in written form.
  • Be able to identify the benefits of incorporating real-world experience into an academic program.

cryptography.

·       Identify the characteristics of quantum cryptography.

·       Match symmetric key algorithms to their corresponding descriptions.

·       Distinguish between types of asymmetric algorithms.

·       Recognize types of ciphers.

·       Match types of cryptanalytic attacks with their corresponding descriptions.

·       Determine the appropriate use for a given message format.

·       Recognize characteristics of message authentication codes.

        Identify the characteristics of digital signatures.

Info Security & Risk Mgmt 

·       Explain the basic concepts of and need for risk management.

·       Explain methods of mitigating risk by managing threats vulnerabilities, and exploits.

·       Identify compliancy laws, standards, best practices, and policies of risk management.

·       Describe the components of an effective organizational risk management program.

·       Describe techniques for identifying and analyzing relevant threats, vulnerabilities, and exploits.

·       Describe the process of performing risk assessments.

·       Identify assets and activities to protect within an organization.

·       Identify threats, vulnerabilities, and exploits.

·       Identify risk mitigation security controls.

·       Describe concepts for planning risk mitigation throughout an organization.

·       Describe concepts for implementing a risk mitigation plan.

·       Perform a business impact analysis.

·       Create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization.

·       Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization.

·       Create a computer incident response team (CIRT) plan for an organization.

Main Instructional Areas:

·       Risk management basics

·       Risk assessment plan

·       Risk mitigation plan

·       Cost-benefit analysis

·       Business continuity plan

Disaster recovery plan