| 1 |
Can design and implement web-based projects. |
X |
|
|
|
| 2 |
Can use algorithmic thinking & planning approaches in programming. |
X |
|
|
|
| 3 |
Demonstrate awareness of the basic working principles of networking. |
X |
|
|
|
| 4 |
Can design & implement database applications for small & medium projects. |
X |
|
|
|
| 5 |
Evaluate cybersecurity risk management policies to adequately protect an organization's critical information and assets. |
X |
|
|
|
| 6 |
Has a basic knowledge of computer hardware and software. |
X |
|
|
|
| 7 |
Demonstrates problem-solving skills. |
X |
|
|
|
| 8 |
Uses web technologies |
X |
|
|
|
| 9 |
Uses productivity software effectively (spreadsheets, database software and project management software). |
X |
|
|
|
| 10 |
Works effectively individually and/or as a team member. |
X |
|
|
|
| 11 |
Apply the skills covered by this program to business scenarios. |
X |
|
|
|
| 12 |
Demonstrates a basic proficiency in programming and reasoning skills. |
X |
|
|
|
| 13 |
Demonstrates ability to use debugging techniques. |
X |
|
|
|
| 14 |
Implements secure network management principles such as preventing intrusions. |
X |
|
|
|
| 15 |
Explains the main purposes of cyber security and the importance of information security and current threats to networks. |
X |
|
|
|
| 16 |
Demonstrates awareness of the importance of professional ethical behavior in the field of ICT. |
X |
|
|
|
| 17 |
Follows latest updated in the field with awareness of lifelong learning. |
X |
|
|
|