PO1:In today’s cyber world, it is important for everyone to understand computer security as it has become an essential aspects of our day life
PO2:To understand the various types of cyber-attacks & countermeasures.
PO3:To perform the assessment of vulnerabilities in websites and web applications.
PO4:This course provides students with concepts of computer security, internet security, network security, secure protocols, detection and other vulnerabilities techniques and measure the performance of security systems within an enterprise-level information system.
PO5:To find threats, how they materialize, typical attacks and how those attacks exploit vulnerabilities.
PO6:To understand the personal, organizational and legal/regulatory context in which information systems could be used, the risks of such use and the constraints that may affect how cyber security is implemented.
PO7:Formulate, update and communicate short and long-term organizational cybersecurity strategies and policies.
PO8:To get knowledge of different real-world cyber-crimes and ways to investigate and defend against them.
PO9:To understand how to deploy encryption techniques to secure data in transit across data networks.
P10:Find the vulnerabilities in the IoTs and SCADA systems and design the security architecture.
P11:Find the loopholes in Web applications and Mobile Applications and Networks and give security solutions & manage security policies accordingly.