Applied Information Technology in Cyber Security - Graduate

ITEC5900
Closed
Capella University
Minneapolis, Minnesota, United States
Melissa Zgola
Faculty Chair
(10)
5
Timeline
  • July 10, 2023
    Experience start
  • December 20, 2023
    Experience end
Experience
1 projects wanted
Dates set by experience
Preferred companies
Anywhere
Startup, Family-Owned, Incubator, Non profit, Small to medium enterprise
Any industries

Experience scope

Categories
Security (cybersecurity and IT security)
Skills
cyber security time management information technology
Student goals and capabilities


Is your organization looking to develop, analyze or test new cybersecurity applications? In this course, IT graduate students in the at Capella will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. Students will work in teams to develop a product of your choosing from concept to implementation.

Students

Students
Graduate
Any level
5 students
Project
300 hours per student
Level UP Teams assign students to projects
Teams of 5
Expected outcomes and deliverables

The final project deliverables could include the following software components:

  • Requirements document.
  • System design document.
  • Code formatted within a coding standard.
  • Test Cases.
  • Documentation.

Deliverables will vary depending on the scope of the project. It will be important to stick to the scope due to time limits and student abilities.

Project timeline
  • July 10, 2023
    Experience start
  • December 20, 2023
    Experience end

Project Examples

Requirements

IT graduate students in teams of 3-5 will spend up to 300 cumulative hours to help solve a problem or opportunity of your choosing related to cybersecurity. They will synthesize theories and frameworks that can inform the understanding of the your problem, possible solutions, and the context, while evaluating the global, cultural, and organizational factors that impact the problem. Increased cyber-security can improve your compliance, protect your company data, or fight against viruses, worms, Malware, etc. At the end of the project the students will submit all their key findings or applications developed to your organization.


Project examples include:

  • Analyze data from cybersecurity incidents
  • Implement/Deploy new cybersecurity applications
  • Penetration testing of new applications
  • Assist with reviewing and creating cybersecurity policies
  • Design & deliver cybersecurity awareness training
  • Research & deliver a risk assessment for the organization
  • Review technology architecture of an organization and deliver a report on how to improve
  • Vulnerability analysis report


Please note: Some students who work for government contractors are prohibited from contact with foreign nationals, as their activities and communications are monitored. Client Non-Disclosure agreements can cause push-back from students. Not all students are comfortable with them.