Applied Information Technology in Cyber Security - Graduate

ITEC 5900/5905
Closed
Capella University
Minneapolis, Minnesota, United States
Gerald Huff
Adjunct Fauclty
(10)
5
Timeline
  • July 19, 2020
    Experience start
  • July 21, 2020
    Project Scope Meeting
  • August 18, 2020
    Project Check-In
  • September 22, 2020
    Project Check-In
  • October 27, 2020
    Project Check-In
  • November 28, 2020
    Experience end
Experience
2/2 project matches
Dates set by experience
Preferred companies
Anywhere
Any
It & computing

Experience scope

Categories
Information technology Operations Project management
Skills
vulnerability analysis cyber security project planning business consulting data analysis
Learner goals and capabilities

Is your organization looking to develop, analyze or test new cybersecurity applications? In this course, IT graduate students in the at Capella will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. Students will work in teams to develop a product of your choosing from concept to implementation.

Learners

Learners
Graduate
Any level
20 learners
Project
60 hours per learner
Learners self-assign
Teams of 5
Expected outcomes and deliverables

The final project deliverables could include the following software components:

  • Requirements document.
  • System design document.
  • Code formatted within a coding standard.
  • Test Cases.
  • Documentation.

Deliverables will vary depending on the scope of the project. It will be important to stick to the scope due to time limits and student abilities.

Project timeline
  • July 19, 2020
    Experience start
  • July 21, 2020
    Project Scope Meeting
  • August 18, 2020
    Project Check-In
  • September 22, 2020
    Project Check-In
  • October 27, 2020
    Project Check-In
  • November 28, 2020
    Experience end

Project Examples

Requirements

IT graduate students in teams of 3-5 will spend up to 300 cumulative hours to help solve a problem or opportunity of your choosing related to cybersecurity. They will synthesize theories and frameworks that can inform the understanding of the your problem, possible solutions, and the context, while evaluating the global, cultural, and organizational factors that impact the problem. Increased cyber-security can improve your compliance, protect your company data, or fight against viruses, worms, Malware, etc. At the end of the project the students will submit all their key findings or applications developed to your organization.

Project examples include:

  • Analyze data from cybersecurity incidents
  • Implement/Deploy new cybersecurity applications
  • Penetration testing of new applications
  • Assist with reviewing and creating cybersecurity policies
  • Design & deliver cybersecurity awareness training
  • Research & deliver a risk assessment for the organization
  • Review technology architecture of an organization and deliver a report on how to improve
  • Vulnerability analysis report

Please note: Some students who work for government contractors are prohibited from contact with foreign nationals, as their activities and communications are monitored. Client Non-Disclosure agreements can cause push-back from students. Not all students are comfortable with them.

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

  • question

    Be available for the final presentation.

  • question

    Be available for a quick phone call with the instructor to initiate your relationship and confirm your scope is an appropriate fit for the course.

  • question

    Be available to meet with Capella learner teams at a minimum of seven times over the course of the 20-week project, to aid in kicking-off the project, to offer consultation and to allow for students to present their results.