<p><span><span><span><strong>Program Learning Outcomes (PLOs):</strong></span></span></span></p>
<p><span><span><span>Graduates who successfully complete the program are expected to be able to:</span></span></span></p>
<p><span><span><span>K1: Describe complex computing problems related to cybersecurity. </span></span></span></p>
<p><span><span><span>K2: Recognize the principles of computing applications and optimum security solutions. </span></span></span></p>
<p><span><span><span>S1: Implement a computing-based solution to meet a given set of computing requirements in the context of cybersecurity. </span></span></span></p>
<p><span><span><span>S2: Apply security principles and practices to maintain operations in the presence of risks and threats. </span></span></span></p>
<p><span><span><span>V1: Communicate effectively in a variety of professional contexts. </span></span></span></p>
<p><span><span><span>V2: Respect professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.</span></span></span></p>
<p><span><span><span> V3: Function effectively as a member or leader of a team engaged in activities appropriate to cybersecurity.</span></span></span></p>
<p><span><span><span><span><span> </span></span></span></span></span></p>
<p><span><span><span><strong>Graduate Attributes: </strong></span></span></span></p>
<p><span><span><span>Graduates who successfully completed the program are expected to have the following attributes: </span></span></span></p>
<p><span><span><span>CSE1- Have in-depth knowledge, understanding and skills associated with Cybersecurity. </span></span></span></p>
<p><span><span><span>CSE2- Have the ability for lifelong personal development and learning to be successful in society. </span></span></span></p>
<p><span><span><span>CSE3- Have the ability to evaluate and draw conclusions from information, to find sustainable solutions to complex security problems and make decisions. </span></span></span></p>
<p><span><span><span>CSE4- Have the ability to lead and support others by inspiring them with a clear vision and motivating them to achieve security goals. </span></span></span></p>
<p><span><span><span>CSE5- Have the ability to work under pressure, where the organization’s security can be at stake if they do not work carefully and thoroughly.</span></span></span></p>
<p> </p>
<p> </p>