By the end of this program, students should be able to:?
- Identify types of risks, cyber threats and cyber attacks through wired?and wireless network communications
- Design, develop, and implement to prove the concepts of cyber?defense, cyber offense, cyber investigation and cyber management
- Identify research problems, compare with previous approaches,?develop solutions and discuss the research results
- Understand the privacy of information, information hiding,?information assurance, information encryption/decryption
- Function effectively in a team to complete prototyping of detection,?prevention and protection for internal and external cyber attacks and?cyber intrusions
- Acquire and validate evidence related to cyber crimes from personal?computers, smartphones, infrastructure hosts, wired and wireless?networks