CYBR490 — Senior Capstone

5 credits Catalog-Derived

Student teams apply CS and cybersecurity principles to specified projects with milestone reports and presentations.

5
Objectives
40
Matches
40
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
56.6% Computer Systems Engineers/Architec 20t
64.0% Information Security Engineers 20t
60.8% Penetration Testers 20t
48.1% Telecommunications Engineering Spec 19t
53.3% Computer Network Architects 17t

Learning Objectives & Matches

LO1

Complete a comprehensive cybersecurity project addressing real-world security challenges

10 O*NET task matches
Batch:
Penetration Testers
59% ok

Gather cyber intelligence to identify vulnerabilities.

Claude Opus 4.6 denied
Digital Forensics Analysts
58% ok

Maintain cyber defense software or hardware to support responses to cyber incidents.

Claude Opus 4.6 denied
Digital Forensics Analysts
57% ok

Recommend cyber defense software or hardware to support responses to cyber incidents.

Claude Opus 4.6 denied
Digital Forensics Analysts
56% ok

Write cyber defense recommendations, reports, or white papers using research or experience.

Claude Opus 4.6 denied
Network and Computer Systems A 3.7/5
56% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 denied
Web Administrators 4.8/5
55% ok

Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.

Claude Opus 4.6 denied
Digital Forensics Analysts
54% ok

Analyze log files or other digital information to identify the perpetrators of network intrusions.

Claude Opus 4.6 denied
Penetration Testers
53% ok

Discuss security solutions with information technology teams or management.

Claude Opus 4.6 denied
Computer Network Architects 4.3/5
53% ok

Develop or recommend network security measures, such as firewalls, network security audits, or automated security probes.

Claude Opus 4.6 denied
Penetration Testers
53% ok

Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

Claude Opus 4.6 denied
LO2

Apply security principles and best practices to project design and implementation

10 O*NET task matches
Batch:
Information Security Engineers 3.9/5
64% ok

Develop information security standards and best practices.

Claude Opus 4.6 approved at 400
Web Administrators 4.2/5
59% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Web Developers
59% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
57% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.9/5
56% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 300
Penetration Testers
56% ok

Discuss security solutions with information technology teams or management.

Claude Opus 4.6 approved at 300
Information Security Analysts 3.8/5
54% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.8/5
53% ok

Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.

Claude Opus 4.6 approved at 300
Information Security Engineers 3.9/5
53% ok

Recommend information security enhancements to management.

Claude Opus 4.6 approved at 300
Penetration Testers
52% ok

Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

Claude Opus 4.6 approved at 300
LO3

Collaborate effectively in professional teams using project management methodologies

10 O*NET task matches
Batch:
Biostatisticians 4.0/5
42% ok

Prepare articles for publication or presentation at professional conferences.

Claude Opus 4.6 denied
Biostatisticians 3.5/5
41% ok

Assign work to biostatistical assistants or programmers.

Claude Opus 4.6 denied
Computer and Information Resea 3.0/5
36% ok

Participate in staffing decisions and direct training of subordinates.

Claude Opus 4.6 denied
Biostatisticians 4.3/5
36% ok

Design research studies in collaboration with physicians, life scientists, or other professionals.

Claude Opus 4.6 denied
Mathematicians 4.1/5
36% ok

Disseminate research by writing reports, publishing papers, or presenting at professional conferences.

Claude Opus 4.6 denied
Mathematicians 4.2/5
35% ok

Maintain knowledge in the field by reading professional journals, talking with other mathematicians, and attending professional conferences.

Claude Opus 4.6 denied
Computer and Information Resea 3.3/5
33% ok

Direct daily operations of departments, coordinating project activities with other departments.

Claude Opus 4.6 denied
Database Administrators 3.5/5
33% ok

Provide technical support to junior staff or clients.

Claude Opus 4.6 denied
Database Architects 3.2/5
33% ok

Provide technical support to junior staff or clients.

Claude Opus 4.6 denied
Database Architects 3.9/5
32% ok

Work as part of a project team to coordinate database development and determine project scope and limitations.

Claude Opus 4.6 denied
LO4

Present technical security work to stakeholders and industry professionals

10 O*NET task matches
Batch:
Information Security Engineers 3.4/5
64% ok

Provide technical support to computer users for installation and use of security products.

Claude Opus 4.6 approved at 400
Penetration Testers
59% ok

Discuss security solutions with information technology teams or management.

Claude Opus 4.6 approved at 300
Penetration Testers
55% ok

Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

Claude Opus 4.6 approved at 300
Web Developers
55% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Web Administrators 4.5/5
54% ok

Identify, standardize, and communicate levels of access and security.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
54% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 approved at 300
Information Security Analysts 3.8/5
53% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 approved at 300
Information Security Analysts 4.2/5
53% ok

Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Claude Opus 4.6 approved at 300
Database Administrators 3.9/5
53% ok

Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
53% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 300
LO5

Document security solutions including architecture, implementation, and testing

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)