| Course Outcome (CO) | At the end of course , the student will be able to | Bloom’s Level |
|---|---|---|
| CO 1 | Identify and analyze nature inherent difficulties in the security of the Information System. | K 3 |
| CO 2 | Analyze various threats and attacks, corresponding counter measures and various vulnerability assessment and security techniques in an organization. | K 3 |
| CO 3 | Applications of cyber based policies and use of IPR and patent law for software-based design. Define E-commerce types and threats to E-commerce. | K 1,K 2 |
| CO 4 | Explain concepts and theories of networking and apply them to various situations, classifying networks, analyzing performance. | K 2 |

© Copyright 2021 Accurate Group. All Rights Reserved. Designed and Developed by BrandShow