Open experiences

Experiences from all portals

Bay Path University
Longmeadow, Massachusetts, United States
GM
Adjunct Professor
(2)
3
General
  • Undergraduate; 4th year, 2nd year
  • 7 learners; individual projects
  • 30 hours per learner
  • Dates set by experience
  • Learners self-assign
Preferred companies
  • 1/1 project matches
  • Anywhere
  • Academic experience
  • Any company type
  • Any
Categories
General Operations Project management Security (cybersecurity and it security) Information technology
Project timeline
  • April 29, 2024
    Experience start
  • June 1, 2024
    Experience end
Overview
Details

Cybersecurity: Digital Forensics and Incident Response:

  • Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity.
  • Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization

Cybersecurity: Risk Management:

  • Explain ways to mitigate risk across an enterprise.
  • Use best practices for the documentation and communication of risk to various stakeholders.

Cybersecurity: Information Assurance:

  • Assure confidentiality, integrity, and availability of an organization's data.
  • Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization.
  • Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.
Learner skills
Business consulting, Data analytics, Communication, Data analysis, Research
Deliverables

Cybersecurity: Digital Forensics and Incident Response

  • Digital forensics: Collect, analyze and present digital evidence such as user activity and system data. Attempt to uncover the facts about what happened on a computer system, network devices, phones or tablets for internal company investigations, criminal activity and other types of digital investigations.
  • Incident response: investigate computer systems by collecting and analyzing data. Then develop a response to a security incident.

Cybersecurity: Risk Management

  • Build a Cybersecurity Risk Management Framework for the Organization

Cybersecurity: Information Assurance:

  • Develop an Information Assurance (IA) plan that can identify the potential risks to that data throughout the development, use, storage, transmission, and processing of an application. The plan can help guarantee the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems.
Project Examples

Cybersecurity: Digital Forensics and Incident Response

Cybersecurity: Risk Management

Cybersecurity: Information Assurance

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

A representative of the company will be available for a pre-selection discussion with the administrator of the course to review the project scope.

A representative of the company will be available to answer questions from students in a timely manner for the duration of the project.