Capstone in Digital Forensics
Timeline
-
October 31, 2022Experience start
-
October 18, 2022Project Scope Meeting
-
November 28, 2022Experience end
Timeline
-
October 31, 2022Experience start
-
October 18, 2022Project Scope Meeting
Meeting between students and company to confirm: project scope, communication styles, and important dates.
-
November 28, 2022Experience end
Categories
Security (cybersecurity and IT security) Information technology Operations Project managementSkills
business consulting data analytics communication data analysis researchCybersecurity: Digital Forensics and Incident Response:
- Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity.
- Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization
Cybersecurity: Risk Management:
- Explain ways to mitigate risk across an enterprise.
- Use best practices for the documentation and communication of risk to various stakeholders.
Cybersecurity: Information Assurance:
- Assure confidentiality, integrity, and availability of an organization's data.
- Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization.
- Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.
Cybersecurity: Digital Forensics and Incident Response
- Digital forensics: Collect, analyze and present digital evidence such as user activity and system data. Attempt to uncover the facts about what happened on a computer system, network devices, phones or tablets for internal company investigations, criminal activity and other types of digital investigations.
- Incident response: investigate computer systems by collecting and analyzing data. Then develop a response to a security incident.
Cybersecurity: Risk Management
- Build a Cybersecurity Risk Management Framework for the Organization
Cybersecurity: Information Assurance:
- Develop an Information Assurance (IA) plan that can identify the potential risks to that data throughout the development, use, storage, transmission, and processing of an application. The plan can help guarantee the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems.
Project timeline
-
October 31, 2022Experience start
-
October 18, 2022Project Scope Meeting
-
November 28, 2022Experience end
Timeline
-
October 31, 2022Experience start
-
October 18, 2022Project Scope Meeting
Meeting between students and company to confirm: project scope, communication styles, and important dates.
-
November 28, 2022Experience end
Project Examples
Cybersecurity: Digital Forensics and Incident Response
Cybersecurity: Risk Management
Cybersecurity: Information Assurance
Companies must answer the following questions to submit a match request to this experience:
A representative of the company will be available for a pre-selection discussion with the administrator of the course to review the project scope.
A representative of the company will be available to answer questions from students in a timely manner for the duration of the project.
Timeline
-
October 31, 2022Experience start
-
October 18, 2022Project Scope Meeting
-
November 28, 2022Experience end
Timeline
-
October 31, 2022Experience start
-
October 18, 2022Project Scope Meeting
Meeting between students and company to confirm: project scope, communication styles, and important dates.
-
November 28, 2022Experience end