Welcome to the Cybersecurity Capstone course!
This course is the capstone course for all students in the Networking and CyberSecurity curriculum track. This course will draw together information from previous courses to demonstrate appropriate and relevant implementation techniques. In this course, students will design a "Policies and Procedures" manual appropriate for a small business, medium business, or enterprise. Working in teams, students design virtual networks to attack and defend against attacks.
By the end of the course, students will be able to proficiently complete the following:
- Describe how a variety of policies and procedures can support a small business in dealing with its own cyber security risks
- Create a risk analysis for a small or medium sized business typical of the local area
- Create a policies and procedures manual appropriate for a small to medium sized office
- Design a network using a variety of security components (this may be performed using either a virtual or real network)
- Design an attack strategy for a typical network
- Attack a contained network (that is, a network developed in the class) in a "capture the flag" event
- Analyze an attacked network. Identify where and how the defenses failed, and describe how the defenses could be redesigned to prevent
In addition to the above, students will have the opportunity to pursue areas of interest through independent study, which can include programming in Java, discrete mathematics for computer science, networking infrastucture and architecture.