M.S. in Cybersecurity Program Information
Available online at Franklin University .
A learning outcome map functions as a roadmap to help guide students’ progress through their program of study. It shows where each outcome is Introduced (I), Reinforced (R), and Assessed (A) within the program’s curriculum.
Evaluate organizational security posture in light of the breadth of the information security body of knowledge.
Model threats in software development in order to recommend changes in software development processes and implementations.
Analyze risk in information systems.
Recommend cryptographic implementations for preserving confidentiality and integrity in information systems.
Deploy infrastructure-based countermeasures against common threats and attacks.
Assess an organization’s compliance with regulatory requirements and ethical standards.
Assess network security and recommend appropriate remediation at the protocol, device, operating system, and application level.
Develop organizational policies and procedures to govern overall IT security strategy.