CYBR490 — Senior Capstone
Student teams apply CS and cybersecurity principles to specified projects with milestone reports and presentations.
Learning Objectives & Matches
Complete a comprehensive cybersecurity project addressing real-world security challenges
Gather cyber intelligence to identify vulnerabilities.
Maintain cyber defense software or hardware to support responses to cyber incidents.
Recommend cyber defense software or hardware to support responses to cyber incidents.
Write cyber defense recommendations, reports, or white papers using research or experience.
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.
Analyze log files or other digital information to identify the perpetrators of network intrusions.
Discuss security solutions with information technology teams or management.
Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
Apply security principles and best practices to project design and implementation
Develop information security standards and best practices.
Implement Web site security measures, such as firewalls or message encryption.
Design and implement Web site security measures, such as firewalls and message encryption.
Provide customers or installation teams guidelines for implementing secure systems.
Identify or implement solutions to information security problems.
Discuss security solutions with information technology teams or management.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
Recommend information security enhancements to management.
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
Collaborate effectively in professional teams using project management methodologies
Prepare articles for publication or presentation at professional conferences.
Assign work to biostatistical assistants or programmers.
Participate in staffing decisions and direct training of subordinates.
Design research studies in collaboration with physicians, life scientists, or other professionals.
Disseminate research by writing reports, publishing papers, or presenting at professional conferences.
Maintain knowledge in the field by reading professional journals, talking with other mathematicians, and attending professional conferences.
Direct daily operations of departments, coordinating project activities with other departments.
Provide technical support to junior staff or clients.
Provide technical support to junior staff or clients.
Work as part of a project team to coordinate database development and determine project scope and limitations.
Present technical security work to stakeholders and industry professionals
Provide technical support to computer users for installation and use of security products.
Discuss security solutions with information technology teams or management.
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
Design and implement Web site security measures, such as firewalls and message encryption.
Identify, standardize, and communicate levels of access and security.
Provide customers or installation teams guidelines for implementing secure systems.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
Identify or implement solutions to information security problems.
Document security solutions including architecture, implementation, and testing