Viewing outcome relationships between CYBR 231 - ETHICAL HACKING AND COUNTERMEASURES and 91 - Cyber and Information Security

Last approved: Mon, 19 Aug 2024 17:00:57 GMT

Last edit: Fri, 16 Aug 2024 22:02:16 GMT

Changes proposed by: Lawrence Atkinson (latkinso)
91 - Cyber and Information Security
CYBR 231 - ETHICAL HACKING AND COUNTERMEASURES
  • PLO 1: Describe methods for investigating both domestic and international cybersecurity incidents
    • CLO 2: Describe hacking attack phases.
    • CLO 6: Create a risk assessment
    • CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
  • PLO 2: Develop short and long-term organizational cybersecurity strategies and policies.
    • CLO 4: Develop Counter hacking countermeasures to mitigate risk.
    • CLO 6: Create a risk assessment
    • CLO 7: Demonstrate an increase in confidence in his/her critical-thinking and risk assessment mitigation related to ethical hacking.
    • CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
  • PLO 3: Implement cyber security goals, metrics, and safeguards consistent with industry best practices.
    • CLO 1: Use software and hardware tools to interface with devices.
    • CLO 3: Select appropriate ethical hacking tools based on discovered vulnerabilities.
    • CLO 4: Develop Counter hacking countermeasures to mitigate risk.
    • CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
  • PLO 4: Conduct security assessments to identify vulnerabilities in critical infrastructure systems.
    • CLO 1: Use software and hardware tools to interface with devices.
    • CLO 3: Select appropriate ethical hacking tools based on discovered vulnerabilities.
    • CLO 5: Describe system vulnerabilities.
    • CLO 6: Create a risk assessment
    • CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
  • PLO 5: Evaluate a variety of cybersecurity tools.
    • CLO 1: Use software and hardware tools to interface with devices.
    • CLO 3: Select appropriate ethical hacking tools based on discovered vulnerabilities.
    • CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
Key: 23