| CO | At the end of course , the student will be able to understand: | Bloom’s Level |
|---|---|---|
| CO1 | Classify the symmetric encryption techniques and Illustrate various Public key cryptographic techniques. | K2, K3 |
| CO2 | Understand security protocols for protecting data on networks and be able to digitally sign emails and files. | K1, K2 |
| CO3 | Understand vulnerability assessments and the weakness of using passwords for authentication. | K4 |
| CO4 | Be able to perform simple vulnerability assessments and password audits. | K3 |
| CO5 | Summarize the intrusion detection and its solutions to overcome the attacks. | K2 |

© Copyright 2021 Accurate Group. All Rights Reserved. Designed and Developed by BrandShow