- PLO 9: Apply SQL injection prevention techniques and best practices in database security.
- PLO 10: Identify and analyze threats, vulnerabilities, and attacks in various computing environments.
- PLO 15: Capture, analyze, and interpret network traffic for forensic investigations.
- PLO 17: Assess the security risks associated with IoT and smart devices.