1 |
Can design and implement web-based projects. |
X |
|
|
|
2 |
Can use algorithmic thinking & planning approaches in programming. |
X |
|
|
|
3 |
Demonstrate awareness of the basic working principles of networking. |
X |
|
|
|
4 |
Can design & implement database applications for small & medium projects. |
X |
|
|
|
5 |
Evaluate cybersecurity risk management policies to adequately protect an organization\'s critical information and assets. |
X |
|
|
|
6 |
Has a basic knowledge of computer hardware and software. |
X |
|
|
|
7 |
Demonstrates problem-solving skills. |
X |
|
|
|
8 |
Uses web technologies |
X |
|
|
|
9 |
Uses productivity software effectively (spreadsheets, database software and project management software). |
X |
|
|
|
10 |
Works effectively individually and/or as a team member. |
X |
|
|
|
11 |
Apply the skills covered by this program to business scenarios. |
X |
|
|
|
12 |
Demonstrates a basic proficiency in programming and reasoning skills. |
X |
|
|
|
13 |
Demonstrates ability to use debugging techniques. |
X |
|
|
|
14 |
Implements secure network management principles such as preventing intrusions. |
X |
|
|
|
15 |
Explains the main purposes of cyber security and the importance of information security and current threats to networks. |
X |
|
|
|
16 |
Demonstrates awareness of the importance of professional ethical behavior in the field of ICT. |
X |
|
|
|
17 |
Follows latest updated in the field with awareness of lifelong learning. |
X |
|
|
|