fbpx

Program Benchmarks

General Learning Outcomes of Information Security and Cyberspace Program

Program Learning Outcomes

 

A- knowledge and understanding

A1) Lists knowledge of concepts, terminology, principles, and methods of information security and cyberspace.

A2) Discusses the wide range of technologies, available tools, and practical approaches in information security and cyberspace.

A3) Expresses professional responsibilities and make judgments based on legal and ethical principles in the context of computing practice.

A4) Identifies the needs of users in the field of developing information systems and building secure computer networks.

A5) Identify ethical responsibilities and professional certifications in the labor market for Information and Cyber security  like) ECCSA - EC-Council Certified Security Analyst, CISM - Certified Information Security Management,  CISSP - Certified Information Security Systems Professionals,  CEH - Certified Ethical Hacker).

 

 


B- Intellectual skills

B1) Distinguishes a set of solutions for modern and advanced methods of penetrating and attacking data and computer networks.

B2) Assesses gaps and weaknesses in information systems and computer networks.

B3) Estimates the time and cost of handling damage resulting from any attack on an information system or enterprise.

B4) Evaluates appropriate tools and techniques to treat damage caused by security breaches.

B5) Support the policies, procedures and plans necessary to manage and ensure the security of enterprises.

B6) Propose e-courses for self-learning to be ready for professional certifications.

 


C- Practical skills

C1) Applies different protocols for information and network secrecy.

C2) Applies the principles of design, development, and management in creating computer networks.

C3) Uses various networking protocols.

C4) Constructs secure computer information systems and networks.

C5) Demonstrates technical reports in a coherent, structured, verbal and written manner.

C6) Uses best practices and standards in the field of protecting information and networks for various organizations.

C7) Operates solutions for various types of violations and accidents on computer networks and information systems.

C8) Demonstrates vulnerabilities and sources of attack and intrusion by monitoring the performance of computer networks and information systems.

C9) Uses and develops encryption and information security software.

 

D- Transferable skills

D1) Combines an information security teams actively.

D2) Organizes and communicates ideas in oral and documented manner.

D3) Sets up information technology skills to protect information and networks.

D4) Prepares to work independently and with others.

D5) Manages learning and self-development, including time management and organizational skill development.

D6) Combines practical training that takes place in relevant institutions and companies.

D7) Participates in continuing professional development and recognizes the need for lifelong learning.

Contact Information

Jarash Road, 20 KM out of Amman, Amman Jordan

Newsletter

Enter your email and we'll send you more information

Search