<p style="margin-left:3px; text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">Program Learning Outcomes (PLOs):</span></span></span></b></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">Graduates who successfully complete the program are expected to be able to:</span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">K1: Describe complex computing problems related to cybersecurity. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">K2: Recognize the principles of computing applications and optimum security solutions. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">S1: Implement and evaluate a computing-based solution to meet a given set of computing requirements in the context of cybersecurity. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">S2: Apply security principles and practices to maintain operations in the presence of risks and threats. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">V1: Communicate effectively in a variety of professional contexts. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">V2: Respect professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.</span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">&nbsp;V3: Function effectively as a member or leader of a team engaged in activities appropriate to cybersecurity.</span></span></span></span></span></span></p>

<p dir="RTL" style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="direction:rtl"><span style="unicode-bidi:embed"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><b><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">Graduate Attributes: </span></span></span></b></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">Graduates who successfully completed the program are expected to have the following attributes: </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">CSE1- Have in-depth knowledge, understanding and skills associated with Cybersecurity. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">CSE2- Have the ability for lifelong personal development and learning to be successful in society. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">CSE3- Have the ability to evaluate and draw conclusions from information, to find sustainable solutions to complex security problems and make decisions. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">CSE4- Have the ability to lead and support others by inspiring them with a clear vision and motivating them to achieve security goals. </span></span></span></span></span></span></p>

<p style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:107%"><span style="font-family:Calibri,sans-serif"><span style="font-size:12.0pt"><span style="line-height:107%"><span style="font-family:Tajawal">CSE5- Have the ability to work under pressure, where the organization’s security can be at stake if they do not work carefully and thoroughly.</span></span></span></span></span></span></p>

Last Update Date For Page Content : 15/12/2024 - 11:12 Saudi Arabia Time

Do you like the content ?
Reason
Reason
btn