{"id":3584,"date":"2019-11-27T11:20:44","date_gmt":"2019-11-27T16:20:44","guid":{"rendered":"https:\/\/web.uri.edu\/online\/?page_id=3584"},"modified":"2020-11-18T21:38:02","modified_gmt":"2020-11-19T02:38:02","slug":"learning-outcomes","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/online\/programs\/graduate\/cybersecurity\/learning-outcomes\/","title":{"rendered":"Cyber Security Learning Outcomes"},"content":{"rendered":"<h1>Cybersecurity, Professional Science Masters<\/h1>\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"Cyber Security PSM\" data-show-title=\"0\"><ul id=\"menu-cyber-security-psm\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-3645\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3645\"><a href=\"https:\/\/web.uri.edu\/online\/programs\/graduate\/cybersecurity\/\">Overview<\/a><\/li>\n<li id=\"menu-item-3623\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3623\"><a href=\"https:\/\/web.uri.edu\/online\/programs\/graduate\/cybersecurity\/curriculum\/\">Curriculum<\/a><\/li>\n<li id=\"menu-item-5004\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-5004\"><a href=\"https:\/\/web.uri.edu\/online\/programs\/graduate\/cybersecurity\/admission-and-fees\/\">Admission and Fees<\/a><\/li>\n<li id=\"menu-item-29749\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-29749\"><a href=\"https:\/\/web.uri.edu\/online\/discover-uri-online\/\">Discover URI Online<\/a><\/li>\n<\/ul><\/nav><\/section>\n<h2>Learning Outcomes<\/h2>\n<ol>\n<li>Protect and defend computer systems and networks from cybersecurity attacks.<br \/>\n1.1 Characterize privacy, legal and ethical issues of information security.<br \/>\n1.2. Identify vulnerabilities critical to the information assets of an organization.<br \/>\n1.3. Define the security controls sufficient to provide a required level of confidentiality, integrity, and availability in an organization\u2019s computer systems and networks.<\/li>\n<li>Diagnose and investigate cybersecurity events or crimes related to computer systems and digital evidence.<br \/>\n2.1. Diagnose attacks on an organization\u2019s computer systems and networks.<br \/>\n2.2. Propose solutions including development, modification and execution of incident response plans.<br \/>\n2.3. Apply critical thinking and problem-solving skills to detect current and future attacks on an organization\u2019s computer systems and networks.<\/li>\n<li>Effectively communicate in a professional setting to address information security issues.<br \/>\n3.1. Communication orally and in writing, proposed information security solutions to technical and non-technical decision-makers.<br \/>\n3.2. Apply business principles to analyze and interpret data for planning, decision-making, and problem solving in an information security environment.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Professional Science Masters Learning Outcomes Protect and defend computer systems and networks from cybersecurity attacks. 1.1 Characterize privacy, legal and ethical issues of information security. 1.2. Identify vulnerabilities critical to the information assets of an organization. 1.3. Define the security controls sufficient to provide a required level of confidentiality, integrity, and availability in an [&hellip;]<\/p>\n","protected":false},"author":3255,"featured_media":0,"parent":123,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-3584","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/3584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/users\/3255"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/comments?post=3584"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/3584\/revisions"}],"predecessor-version":[{"id":13172,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/3584\/revisions\/13172"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/123"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/media?parent=3584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}