Greg Miller
Adjunct Professor -
(3)
3
Portals
Categories
Security (cybersecurity and IT security)

Achievements

Latest feedback

Recent experiences

Bay Path University
Bay Path University
Longmeadow, Massachusetts, United States

Capstone in Digital Forensics

CBY 455

Apr 29, 2024 - Jun 1, 2024

Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.

Matches 1
Category Information technology + 3
Closed
Bay Path University
Bay Path University
Longmeadow, Massachusetts, United States

Capstone in Digital Forensics

CBY 455

Oct 29, 2023 - Dec 9, 2023

Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.

Matches 1
Category Information technology + 3
Closed
Bay Path University
Bay Path University
Longmeadow, Massachusetts, United States

Capstone in Digital Forensics

CBY 455

Mar 24, 2023 - Apr 16, 2023

Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.

Matches 0
Category Information technology + 3
Closed
Bay Path University
Bay Path University
Longmeadow, Massachusetts, United States

Capstone in Digital Forensics

CBY 455

Oct 31, 2022 - Nov 28, 2022

Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.

Matches 1
Category Information technology + 3
Closed