Upon completion of the M.S. in Information Security Operations, a graduate will be able to:
- Develop system and data classification criteria based on both stated and innate levels of value and sensitivity.
- Evaluate systems and data resources using established criteria in order to prioritize their value and respond strategically.
- Assess attack strategies through the use of analysis techniques and recommend defenses to those attacks.
- Identify vulnerabilities within an enterprise system then propose and implement effective remediations and responses.
- Recommend a strategy to improve existing network and system protection schemes based on observed attack patterns.
- Analyze common intrusion patterns to identify potential attack vectors in order to strategically enhance defenses.
- Protect systems through informed selection and applications of exploits based on known or observed vulnerabilities.
- Propose appropriate data sources and create methods of analysis in order to aid in tracking and detection of attacks.
- Determine appropriate controls to detect suspicious behavior within systems and networks in order to provide recommendations to leadership.