On the successful completion of the course, students will be able to:
1 . Analyze the cybersecurity threat environment and evaluate risks to information systems.
2. Develop security planning and policy frameworks that align with organizational needs.
3. Apply cryptographic methods and access control mechanisms to protect data and systems.
4. Design and secure network architectures using firewalls, host hardening, and application security practices.
Implement incident response and disaster recovery strategies to ensure business continuity and resilience.

- Teacher: Joshua SOPURU