Completed Workflow
Registrar's Office
Approval Path
Mon, 19 Aug 2024 17:00:56 GMT
Cory Williams (cwilliam): Approved for Registrar's Office
History
Aug 19, 2024 by Lawrence Atkinson (latkinso)
Viewing outcome relationships between
CYBR 231 - ETHICAL HACKING AND COUNTERMEASURES
and
91 - Cyber and Information Security
Last approved:
Mon, 19 Aug 2024 17:00:57 GMT
Last edit:
Fri, 16 Aug 2024 22:02:16 GMT
Changes proposed by: Lawrence Atkinson (latkinso)
Program Code
91 - Cyber and Information Security
Course Code
CYBR 231 - ETHICAL HACKING AND COUNTERMEASURES
Learning Outcomes Relationships
PLO 1: Describe methods for investigating both domestic and international cybersecurity incidents
CLO 2: Describe hacking attack phases.
CLO 6: Create a risk assessment
CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
PLO 2: Develop short and long-term organizational cybersecurity strategies and policies.
CLO 4: Develop Counter hacking countermeasures to mitigate risk.
CLO 6: Create a risk assessment
CLO 7: Demonstrate an increase in confidence in his/her critical-thinking and risk assessment mitigation related to ethical hacking.
CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
PLO 3: Implement cyber security goals, metrics, and safeguards consistent with industry best practices.
CLO 1: Use software and hardware tools to interface with devices.
CLO 3: Select appropriate ethical hacking tools based on discovered vulnerabilities.
CLO 4: Develop Counter hacking countermeasures to mitigate risk.
CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
PLO 4: Conduct security assessments to identify vulnerabilities in critical infrastructure systems.
CLO 1: Use software and hardware tools to interface with devices.
CLO 3: Select appropriate ethical hacking tools based on discovered vulnerabilities.
CLO 5: Describe system vulnerabilities.
CLO 6: Create a risk assessment
CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
PLO 5: Evaluate a variety of cybersecurity tools.
CLO 1: Use software and hardware tools to interface with devices.
CLO 3: Select appropriate ethical hacking tools based on discovered vulnerabilities.
CLO 8: Adhere to Certified Ethical Hacking Code of Ethics.
Key: 23