Graduates of this program will have demonstrated the ability to:
- Manage the security lifecycle of computer systems, databases and networks, which includes analysis, design and maintenance.
- Develop, secure and maintain computer systems and networks to meet user requirements.
- Use computer architecture and operating systems design principles, and theory of algorithms and data structures in security related projects.
- Create secure software applications using object-oriented, structured, scripting and low-level programming techniques and software engineering methodologies, which pertain to development, testing and documentation activities.
- Perform code analysis and testing for security weaknesses.
- Apply security and threat analysis and auditing procedures and perform security vulnerability assessments.
- Solve information systems security problems through the development and implementation of security policies and techniques.
- Implement formal information systems security protocols and methodologies.
- Evaluate the strength and quality of cryptographic components using cryptographic algorithms and techniques.
- Perform digital forensics analysis and collect electronic evidence respecting all best practices in the field including proper maintenance of the chain of evidence for investigation purposes.
- Perform network intrusion detection and penetration testing using software tools that integrate to create an Intrusion Detection System (IDS).
- Demonstrate professionalism and the highest ethical standards and criteria in their professional practice.
- Reframe information, ideas, and concepts using narrative, visual, numerical and symbolic representations.
- Communicate effectively in a format appropriate to the needs of diverse audiences and subject matter.