Course Outcomes
After completion of this course, students will be able to –
CS6-60.2.1 |
Understand the various tools and methods used in cybercrime. |
CS6-60.2.2 |
Identify risk management processes, risk treatment methods, organization of information security. |
CS6-60.2.3 |
Classify cyber security solutions and information assurance. |
CS6-60.2.4 |
Examine software vulnerabilities and security solutions to reduce the risk of exploitation. |
CS6-60.2.5 |
Analyze the cyber security needs of an organization. |
CO-PO/PSO Mapping Matrix
COs |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
7CS6-60.2.1 |
2 |
2 |
1 |
1 |
3 |
3 |
1 |
3 |
- |
1 |
- |
3 |
- |
2 |
7CS6-60.2.2 |
2 |
2 |
1 |
1 |
- |
3 |
2 |
3 |
- |
1 |
- |
3 |
- |
3 |
7CS6-60.2.3 |
2 |
2 |
1 |
1 |
- |
3 |
1 |
3 |
- |
1 |
- |
3 |
- |
3 |
7CS6-60.2.4 |
2 |
2 |
1 |
1 |
3 |
3 |
1 |
3 |
- |
1 |
- |
3 |
- |
2 |
7CS6-60.2.5 |
2 |
2 |
1 |
1 |
- |
3 |
1 |
3 |
- |
1 |
- |
3 |
- |
3 |
7CS6-60.2 |
2 |
2 |
1 |
1 |
1 |
3 |
1 |
3 |
- |
1 |
- |
3 |
- |
3 |