Capstone in Digital Forensics
CBY 455
Closed
Longmeadow, Massachusetts, United States
Timeline
-
April 29, 2024Experience start
-
June 1, 2024Experience end
Experience
1/1 project matches
Dates set by experience
Preferred companies
Anywhere
Any company type
Any industries
Experience scope
Categories
Security (cybersecurity and IT security) Information technology Operations Project managementSkills
business consulting data analytics communication data analysis researchCybersecurity: Digital Forensics and Incident Response:
- Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity.
- Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization
Cybersecurity: Risk Management:
- Explain ways to mitigate risk across an enterprise.
- Use best practices for the documentation and communication of risk to various stakeholders.
Cybersecurity: Information Assurance:
- Assure confidentiality, integrity, and availability of an organization's data.
- Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization.
- Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.
Learners
Learners
Undergraduate
Any level
7 learners
Project
30 hours per learner
Learners self-assign
Individual projects
Cybersecurity: Digital Forensics and Incident Response
- Digital forensics: Collect, analyze and present digital evidence such as user activity and system data. Attempt to uncover the facts about what happened on a computer system, network devices, phones or tablets for internal company investigations, criminal activity and other types of digital investigations.
- Incident response: investigate computer systems by collecting and analyzing data. Then develop a response to a security incident.
Cybersecurity: Risk Management
- Build a Cybersecurity Risk Management Framework for the Organization
Cybersecurity: Information Assurance:
- Develop an Information Assurance (IA) plan that can identify the potential risks to that data throughout the development, use, storage, transmission, and processing of an application. The plan can help guarantee the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems.
Project timeline
-
April 29, 2024Experience start
-
June 1, 2024Experience end
Project Examples
Requirements
Cybersecurity: Digital Forensics and Incident Response
Cybersecurity: Risk Management
Cybersecurity: Information Assurance
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
A representative of the company will be available for a pre-selection discussion with the administrator of the course to review the project scope.
A representative of the company will be available to answer questions from students in a timely manner for the duration of the project.
Timeline
-
April 29, 2024Experience start
-
June 1, 2024Experience end