Understand the importance of team dynamics to provide an adequate response to sophisticated breaches.Demonstrate proficiency in communicating technical information in formal reports, documentation, and oral presentations to various stakeholders regardless of their technical backgrounds.Identify, analyze, and synthesize scholarly and professional literature on cyber operations and related areas.Apply advanced techniques such as malware analysis and reverse engineering to obtain threat intelligence correlate relevant data to confirm breaches and identify attack vectors, targets, and the scope of the attacks.Recommend security plans, strategies, and appropriate countermeasures to upper management based on observed attack patterns.Analyze adversaries’ tactics, techniques, and procedures (TTPs), and understand their attack strategies to identify potential attack vectors to strategically improve defenses against advanced persistent threats. ![]() Demonstrate sensitivity to and sound judgment on ethical issues as they arise in information security and cyber defense and will adhere to accepted norms of professional responsibility.Īfter earning the MS from the Cyber Operations program, students will:.Participate as an active and productive member of a project team engaged in achieving solutions to specific cybersecurity-related problems.Identify, analyze, and synthesize scholarly and professional literature relating to the field of cybersecurity to help solve specific problems and to stay abreast of the rapidly changing security context.Demonstrate proficiency in communicating technical information in formal reports, documentation, and oral presentations to users and security professionals.Demonstrate the ability to design secure systems to meet organizational needs within realistic constraints such as economic, environmental, social, and ethical expectations.Articulate cybersecurity risks, threats, and countermeasures and apply this understanding to develop cyber defense strategies.Demonstrate the ability to apply knowledge of cybersecurity concepts, tools, and technologies to prevent, detect, react, and recover from cyber-attacks.Click here for more details about the MS in Cyber Operations program.Īfter earning the BS in Cybersecurity, students will: The program provides an interdisciplinary course of study, including aspects of information technology, law, policy, human factors, and risk management, often in the context of adversaries. ![]() The MS in Cyber Operations has a concentrated hardcore focus on both cyber offense and defense strategies. Learn more details about the Cybersecurity major. The program emphasizes lab-based courses designed to provide students with the conceptual and technical background necessary to secure jobs in cybersecurity and related areas. ![]() Students completing the BS in Cybersecurity major will learn to assess the security needs of computer and network systems, recommend safeguard solutions to prevent unwanted security breaches, and manage the implementation of security devices, systems, and procedures. This allows students to graduate and enter the workforce with a cyber systems operations job quicker than the traditional route. ![]() Metro State’s Cybersecurity Operations program is unique in that the 142 credits combined (BS + MS) will provide students an option to graduate with both BS and MS degrees in Cybersecurity in an accelerated fashion (saving money and time).
0 Comments
Leave a Reply. |