Professional Documents
Culture Documents
School of Engineering and Technology: Course Outcomes
School of Engineering and Technology: Course Outcomes
● Illustrate why securing the Nation’s computer systems, which has been a goal of multiple
successive administrations and has broad bipartisan and public support, has proven to be so
CO 1
difficult to achieve.
● Analyze attack methodology and combat hackers from intrusion or other suspicious attempts
CO 2 at connection to gain unauthorized access to a computer and its resources
A Adapt Protection of data and respond to threats that occur over the Internet
CO 3
● Construct and implement risk analysis, security policies, and damage assessment
CO 4
● Plan, implement and audit operating systems' security in a networked, multi-platform and
CO 5 cross platform environment
6 Explain the symmetric key and asymmetric key cryptography with suitable 5
examples.