Student Experience

By the end of the program, successful candidates have the knowledge and skills required to: incorporate threat intelligence and threat detection techniques to defend the organization infrastructure, analyze traffic and interpret data, identify and address vulnerabilities, and proactively mitigate them, analyze existing security processes, controls and solutions through internal security audits to communicate and recommend organizational security posture for maintenance and improvement to any level of the organization, implement and conduct penetration testing to identify and exploit an organizations’ network system vulnerability, analyze security risks to organizations and business processes to mitigate risk in compliance with industry standards, plan and conduct disaster recovery, forensic investigations and incident responses to support business continuity of an organization.

Program Flowchart