Capstone in Digital Forensics

CBY 455
Closed
Bay Path University
Longmeadow, Massachusetts, United States
GM
Adjunct Professor
(3)
3
Timeline
  • April 29, 2024
    Experience start
  • June 1, 2024
    Experience end
General
  • Undergraduate; 4th year, 2nd year
  • 7 learners; individual projects
  • 30 hours per learner
  • Dates set by experience
  • Learners self-assign
Preferred companies
  • 1/1 project matches
  • Anywhere
  • Academic experience
  • Any company type
  • Any industries
Categories
Security (cybersecurity and IT security) Information technology Operations Project management
Skills
business consulting data analytics communication data analysis research
Project timeline
  • April 29, 2024
    Experience start
  • June 1, 2024
    Experience end
Overview
Learner goals and capabilities

Cybersecurity: Digital Forensics and Incident Response:

  • Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity.
  • Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization

Cybersecurity: Risk Management:

  • Explain ways to mitigate risk across an enterprise.
  • Use best practices for the documentation and communication of risk to various stakeholders.

Cybersecurity: Information Assurance:

  • Assure confidentiality, integrity, and availability of an organization's data.
  • Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization.
  • Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.
Expected outcomes and deliverables

Cybersecurity: Digital Forensics and Incident Response

  • Digital forensics: Collect, analyze and present digital evidence such as user activity and system data. Attempt to uncover the facts about what happened on a computer system, network devices, phones or tablets for internal company investigations, criminal activity and other types of digital investigations.
  • Incident response: investigate computer systems by collecting and analyzing data. Then develop a response to a security incident.

Cybersecurity: Risk Management

  • Build a Cybersecurity Risk Management Framework for the Organization

Cybersecurity: Information Assurance:

  • Develop an Information Assurance (IA) plan that can identify the potential risks to that data throughout the development, use, storage, transmission, and processing of an application. The plan can help guarantee the availability, integrity, authentication, confidentiality, and non-repudiation of information and information systems.
Project Examples

Cybersecurity: Digital Forensics and Incident Response

Cybersecurity: Risk Management

Cybersecurity: Information Assurance

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

A representative of the company will be available for a pre-selection discussion with the administrator of the course to review the project scope.

A representative of the company will be available to answer questions from students in a timely manner for the duration of the project.