Learning Outcomes

Upon completion of the M.S. in Information Security Operations, a graduate will be able to:

  • Develop system and data classification criteria based on both stated and innate levels of value and sensitivity.
  • Evaluate systems and data resources using established criteria in order to prioritize their value and respond strategically.
  • Assess attack strategies through the use of analysis techniques and recommend defenses to those attacks.
  • Identify vulnerabilities within an enterprise system then propose and implement effective remediations and responses.
  • Recommend a strategy to improve existing network and system protection schemes based on observed attack patterns.
  • Analyze common intrusion patterns to identify potential attack vectors in order to strategically enhance defenses.
  • Protect systems through informed selection and applications of exploits based on known or observed vulnerabilities.
  • Propose appropriate data sources and create methods of analysis in order to aid in tracking and detection of attacks. 
  • Determine appropriate controls to detect suspicious behavior within systems and networks in order to provide recommendations to leadership.