Applied Information Technology in Cyber Security - Graduate

ITEC5900
Closed
Capella University
Minneapolis, Minnesota, United States
Melissa Zgola
Faculty Chair
(10)
4
General
  • Graduate; Capstone
  • 5 learners; teams of 5
  • 300 hours per learner
  • Dates set by experience
  • Educators assign learners to projects
Preferred companies
  • 1/1 project matches
  • Anywhere
  • Academic experience
  • Startup, Family owned, Incubator, Non profit, Small to medium enterprise
  • Any
Categories
Computer science & IT Security (cybersecurity and IT security)
Skills
cyber security time management information technology
Project timeline
  • July 10, 2023
    Experience start
  • December 20, 2023
    Experience end
Overview
Details


Is your organization looking to develop, analyze or test new cybersecurity applications? In this course, IT graduate students in the at Capella will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. Students will work in teams to develop a product of your choosing from concept to implementation.

Learner skills
Cyber security, Time management, Information technology
Deliverables

The final project deliverables could include the following software components:

  • Requirements document.
  • System design document.
  • Code formatted within a coding standard.
  • Test Cases.
  • Documentation.

Deliverables will vary depending on the scope of the project. It will be important to stick to the scope due to time limits and student abilities.

Project Examples

IT graduate students in teams of 3-5 will spend up to 300 cumulative hours to help solve a problem or opportunity of your choosing related to cybersecurity. They will synthesize theories and frameworks that can inform the understanding of the your problem, possible solutions, and the context, while evaluating the global, cultural, and organizational factors that impact the problem. Increased cyber-security can improve your compliance, protect your company data, or fight against viruses, worms, Malware, etc. At the end of the project the students will submit all their key findings or applications developed to your organization.


Project examples include:

  • Analyze data from cybersecurity incidents
  • Implement/Deploy new cybersecurity applications
  • Penetration testing of new applications
  • Assist with reviewing and creating cybersecurity policies
  • Design & deliver cybersecurity awareness training
  • Research & deliver a risk assessment for the organization
  • Review technology architecture of an organization and deliver a report on how to improve
  • Vulnerability analysis report


Please note: Some students who work for government contractors are prohibited from contact with foreign nationals, as their activities and communications are monitored. Client Non-Disclosure agreements can cause push-back from students. Not all students are comfortable with them.