Course DescriptionThis capstone course provides a hands-on opportunity for students to utilize what has been learned throughout the program: identifying vulnerable system resources; devising security controls, policies, and procedures within the context of a security architecture and design; selecting and deploying appropriate hardware/software controls and countermeasures to reduce exposure; and implementing a cohesive security environment which includes monitoring, feedback, and metrics. Participants will complete a practical project related to computer security and/or digital forensics.
Sample Course OutlineDistance Course Outline (subject to change)
This course is fully online and asynchronous, meaning you typically will not have to be online at specific times. You will engage in course-related activities through online tools such as announcements, discussions, and email. Your course learning will be based on weekly module content and activities that you can go through independently. Note: there are still deadlines for assignment submissions, and you may be expected to participate in discussion board interactions with your peers on a regular basis.
Your instructor may also include occasional scheduled sessions for Q&As and other discussion activities, using web conferencing tools such as Zoom and Google Meet. More details will be included in your course outline available on the first day of class.
Knowledge of TCP/IP is recommended.
Students must have a Windows or Linux computer operating system; the Apple (Mac) operating system is not supported by this course.
This course will run during the Winter break.
RequisitesDepartment Consent Required
- Cybersecurity, Data Protection and Digital Forensics : Required Courses