-Introduction to Programming -Computers -Operating Systems -Software Stack -Computer Architectures -User Interface -Storage, Database Systems -Networking
Fundamentals of Computing (SEC 500)
Programs\Type | Required | Core Elective | Area Elective |
Cyber Security - Non Thesis | * |
CONTENT
PROGRAMME OUTCOMES
1. Develop the ability to use critical, analytical, and reflective thinking and reasoning 4
2. Reflect on social and ethical responsibilities in his/her professional life. 1
3. Gain experience and confidence in the dissemination of project/research outputs 1
4. Work responsibly and creatively as an individual or as a member or leader of a team and in multidisciplinary environments. 1
5. Communicate effectively by oral, written, graphical and technological means and have competency in English. 2
6. Independently reach and acquire information, and develop appreciation of the need for continuously learning and updating. 2
1. Design and model engineering systems and processes and solve engineering problems with an innovative approach. 4
2. Establish experimental setups, conduct experiments and/or simulations. 2
3. Analytically acquire and interpret data. 3
1. To have acquired basic theoretical knowledge and technical infrastructure in the field of cyber security 2
2. To have developed a deep experience and understanding on the basic methods and human-induced and techinal weaknesses followed by the existing and future cyber attacks, threats and counterfeiting 2
3. To be able to analyze an IT infrastructure comprehensively and to determine risk by monitoring the existing weaknesses and to determine a cyber security strategy 1
4. To take the necessary measures to prevent possible costs and destruction during the occurrence of cyber attacks, 1
5. To be able to use current cyber security software tools and related software for professional purposes, 2
6. To follow the cyber security intelligence news and to combine and analyze data from different sources to take measures for preventing or reducing the prospective cyber attacks, 1
7. To be able to take preventive measures to hinder possible drawbacks by creating a deep understanding and awareness in legal, ethical and social aspects of protecting the security and privacy of personal and corporate data. 1