Computer Science
Reflect on the connection between knowledge or concepts from these courses and how those have been, or could be, applied in the work place (200-250 words per course reflection. If you were a full time student and took 2 courses, you should write a total of 400-500 words).
Students should;
- Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.
- Be able demonstrate the application of theory to workplace in written form.
- Be able to identify the benefits of incorporating real-world experience into an academic program.
cryptography.
· Identify the characteristics of quantum cryptography.
· Match symmetric key algorithms to their corresponding descriptions.
· Distinguish between types of asymmetric algorithms.
· Recognize types of ciphers.
· Match types of cryptanalytic attacks with their corresponding descriptions.
· Determine the appropriate use for a given message format.
· Recognize characteristics of message authentication codes.
Identify the characteristics of digital signatures.
Info Security & Risk Mgmt
· Explain the basic concepts of and need for risk management.
· Explain methods of mitigating risk by managing threats vulnerabilities, and exploits.
· Identify compliancy laws, standards, best practices, and policies of risk management.
· Describe the components of an effective organizational risk management program.
· Describe techniques for identifying and analyzing relevant threats, vulnerabilities, and exploits.
· Describe the process of performing risk assessments.
· Identify assets and activities to protect within an organization.
· Identify threats, vulnerabilities, and exploits.
· Identify risk mitigation security controls.
· Describe concepts for planning risk mitigation throughout an organization.
· Describe concepts for implementing a risk mitigation plan.
· Perform a business impact analysis.
· Create a business continuity plan (BCP) based on the findings of a given risk assessment for an organization.
· Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization.
· Create a computer incident response team (CIRT) plan for an organization.
Main Instructional Areas:
· Risk management basics
· Risk assessment plan
· Risk mitigation plan
· Cost-benefit analysis
· Business continuity plan
Disaster recovery plan