1.8: Create clear oral messages.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
5.6: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology.
5.7: Apply proven methods to secure telecommunications media, transmission, and protocol.
6.3: Specify security solutions based on knowledge of principles, procedures, and tools of data management, such as modeling techniques, data backup, data recovery, data directories, data warehousing, data mining, data disposal, and data standardization processes.
7.3: Knowledge of methods and tools used for risk management and mitigation of risk.
7.4: Knowledge of policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, and equipment, and to manage mitigation strategies that achieve the security needed at an affordable cost.
8.6: Provides professional preparation for computer digital forensics, investigation of crime, and preservation of digital evidence in criminal and civil investigations and information security incident response.
9.4: Manages and supports the acquisition life cycle, including planning, determining specifications, selecting, and procuring information and communications technology (ICT) and cybersecurity products used in the organization’s design, development, and maintenance of its infrastructure to minimize potential risks and vulnerabilities.
Last Completed Projects
topic title | academic level | Writer | delivered |
---|