By the end of this program, students should be able to:?

  • Identify types of risks, cyber threats and cyber attacks through wired?and wireless network communications
  • Design, develop, and implement to prove the concepts of cyber?defense, cyber offense, cyber investigation and cyber management
  • Identify research problems, compare with previous approaches,?develop solutions and discuss the research results
  • Understand the privacy of information, information hiding,?information assurance, information encryption/decryption
  • Function effectively in a team to complete prototyping of detection,?prevention and protection for internal and external cyber attacks and?cyber intrusions
  • Acquire and validate evidence related to cyber crimes from personal?computers, smartphones, infrastructure hosts, wired and wireless?networks