IUPUI Bulletins » Schools » purdue-enginer-tech » Graduate » Student Learning Outcomes » Cybersecurity and Trusted Systems

Graduate

Student Learning Outcomes
Cybersecurity and Trusted Systems

Cybersecurity and Trusted Systems
Upon program completion, students will be able to:

  1. Implement cybersecurity principles and policies.
  2. Implement security and privacy-protection methods, including algorithm development and program them in a variety of languages and platforms (Python, Java, C/C++).
  3. Integrate the information assurance analysis process to domain-specific settings.  This process requires reviewing the domain-specific constraints and cybersecurity characteristics to develop an efficient information assurance implementation with the necessary security specirfications.Apply advanced analysis techniques/topics to information assurance, such topics include applied data analytics, as well as cloud computing, visualization, and computer systems.
  4. Design, develop, and test solutions to specific cybersecurity problems.