Applied Information Technology in Cyber Security - Graduate Summer/Fall 2022
![Capella University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/292/avatar/medium-7f884d72-d6a3-4d39-bf3e-053d2b14afc0.jpeg)
![Melissa Zgola](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/educator/13435/avatar/medium-fd63fe9a-be16-4f97-b529-7a479b2fa7bd.jpeg)
Timeline
-
April 10, 2022Experience start
-
October 1, 2022Experience end
Experience scope
Categories
Security (cybersecurity and IT security) Information technologySkills
project planning business consulting cyber security data analysis vulnerability analysisIs your organization looking to develop, analyze or test new cybersecurity applications? In this course, IT graduate students in the at Capella will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. Students will work in teams to develop a product of your choosing from concept to implementation.
Students
The final project deliverables could include the following software components:
- Requirements document.
- System design document.
- Code formatted within a coding standard.
- Test Cases.
- Documentation.
Deliverables will vary depending on the scope of the project. It will be important to stick to the scope due to time limits and student abilities.
Project timeline
-
April 10, 2022Experience start
-
October 1, 2022Experience end
Project Examples
Requirements
IT graduate students in teams of 3-5 will spend up to 300 cumulative hours to help solve a problem or opportunity of your choosing related to cybersecurity. They will synthesize theories and frameworks that can inform the understanding of the your problem, possible solutions, and the context, while evaluating the global, cultural, and organizational factors that impact the problem. Increased cyber-security can improve your compliance, protect your company data, or fight against viruses, worms, Malware, etc. At the end of the project the students will submit all their key findings or applications developed to your organization.
Project examples include:
- Analyze data from cybersecurity incidents
- Implement/Deploy new cybersecurity applications
- Penetration testing of new applications
- Assist with reviewing and creating cybersecurity policies
- Design & deliver cybersecurity awareness training
- Research & deliver a risk assessment for the organization
- Review technology architecture of an organization and deliver a report on how to improve
- Vulnerability analysis report
Please note: Some students who work for government contractors are prohibited from contact with foreign nationals, as their activities and communications are monitored. Client Non-Disclosure agreements can cause push-back from students. Not all students are comfortable with them.
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Timeline
-
April 10, 2022Experience start
-
October 1, 2022Experience end