As a graduate, you will be prepared to reliably demonstrate the ability to:
- Apply networked computing concepts to install, configure and maintain IT infrastructure as required in common business environments.
- Apply information security theory and concepts to meet organizational needs with respect to confidentiality, integrity, availability, and privacy in IT infrastructures.
- Build scalable tools to automate tasks performed in IT infrastructure.
- Implement data management practices throughout the data lifecycle to secure information assets.
- Recommend security controls to comply with industry standards and mitigate risks.
- Implement identity and access management controls to protect systems from unauthenticated and unauthorized access.
- Create attack scenarios to test defensive capabilities of an organization.
- Analyze monitored systems to conduct security incident investigations.
- Create reports by aggregating, analyzing and visualizing data from diverse large-scale sources to support organizational decision-making.
- Model legal, ethical, professional and organizational codes of conduct as a security professional.
- Evaluate different approaches for solving problems using established ideas and methodologies to present oral and written recommendations.
- Apply interpersonal, teambuilding, and leadership skills when participating in diverse organizational environments.