CO | At the end of course , the student will be able to understand: | Bloom’s Level |
---|---|---|
CO1 | Classify the symmetric encryption techniques and Illustrate various Public key cryptographic techniques. | K2, K3 |
CO2 | Understand security protocols for protecting data on networks and be able to digitally sign emails and files. | K1, K2 |
CO3 | Understand vulnerability assessments and the weakness of using passwords for authentication. | K4 |
CO4 | Be able to perform simple vulnerability assessments and password audits. | K3 |
CO5 | Summarize the intrusion detection and its solutions to overcome the attacks. | K2 |
© Copyright 2021 Accurate Group. All Rights Reserved. Designed and Developed by BrandShow