- Apply appropriate measure to secure network systems by identifying the different types of vulnerabilities, intrusion detection, prevention systems, incident response, best security practices, threats actors and attacks
- Configure network protocols for routers, switches, end devices for local and remote networks
- Identify different cybersecurity resources to specific design principles, common security failure, and different cybersecurity attacks
- Identify the cloud and its services using virtualization security controls
- Write pseudocode for decision-making, loop constructs, and modules and demonstrate the proficiency to write scripts and automate system administrative tasks using the appropriate scripting language.
- Identify the process of digital forensics investigation using acquisition tools, and procedures for private-sector digital investigations
- Analyze the functions of operating systems and basic security issues.