Course DescriptionThis capstone course provides a hands-on opportunity for students to utilize what has been learned throughout the program: identifying vulnerable system resources; devising security controls, policies, and procedures within the context of a security architecture and design; selecting and deploying appropriate hardware/software controls and countermeasures to reduce exposure; and implementing a cohesive security environment which includes monitoring, feedback, and metrics. Participants will complete a practical project related to computer security and/or digital forensics.
Sample Course OutlineDistance Course Outline (subject to change)
Knowledge of TCP/IP is recommended.
Students must have a Windows or Linux computer operating system; the Apple (Mac) operating system is not supported by this course.
This course will run during the Winter break.
RequisitesDepartment Consent Required
- Cybersecurity, Data Protection, and Digital Forensics : Required Courses