Cybersecurity Capstone

Course 5 of 5: MicroMasters® in Cybersecurity 8 weeks total 10 – 12 hours each week
725

Please select the start dates for your courses below.

Scheduled Start:

About this course

The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters® program. It also includes the evaluation of the competencies and performance tasks that enable professional cybersecurity success.

Before enrolling in the Cybersecurity Capstone, you must successfully complete and pass the four courses in the RITx Cybersecurity MicroMasters® program as a verified learner. Upon successful completion of the Cybersecurity Capstone, you will receive the Cybersecurity MicroMasters® certificate.

During the Cybersecurity Capstone, you will perform a set of hands-on lab exercises in a web-based virtual lab environment. Below are the requirements to successfully access the virtual lab environment:

  • Access to a laptop or desktop computer
  • A modern web browser with Javascript enabled
  • A fast internet connection

The areas of hands-on lab activities include, but are not limited to:

  • basic systems and network services such as firewall, DNS, DHCP, Wireshark
  • digital forensics investigation with tools such as Encase, FTK, and Volatility Framework
  • network security related tools such as port scanning, Snort, and Metasploit, etc.

You will be assessed by answering questions and uploading results based on hands-on lab activities completed in the web-based virtual lab environment. Assessment questions are within the edX platform.

 

What you’ll learn

The Cybersecurity Capstone is a practice of hands-on skills and an assessment of various knowledge attained through the Cybersecurity MicroMasters program which includes:

  • implementing solutions to secure computer systems and networks
  • performing digital forensic investigations of real world cases
  • detecting and investigating network intrusions.

Prerequisites

Successful completion of the verified track of:

  • Cybersecurity Fundamentals
  • Computer Forensics
  • Cybersecurity Risk Management
  • Network Security

Who can take this course?

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

Meet Your Instructors

Bo Yuan

Professor of Computing Security at RIT Bo Yuan is a professor of computing security at the B. Thomas Golisano College of Computing and Information Sciences at RIT. He received his PhD in Systems Science from Binghamton University.

Jonathan S. Weissman

Senior Lecturer, Computing Security at Rochester Institute of Technology Jonathan S. Weissman is a senior lecturer in the Department of Computing Security at Rochester Institute of Technology, where he was awarded the RIT Outstanding Teaching Award in 2014, the RIT GCCIS Outstanding Educator Award in 2018, and the RIT Distinguished Teacher Recognition Program Honors in 2019. He was also awarded the RIT Disability Services Office Kudos in 2014 and the RIT GCCIS Parking Pass for March 2018. In total, he's the recipient of 8 teaching honors and awards.

Yin Pan

Professor, Computing Security at RIT Yin is a Professor in the Computing Security department. She received her Ph.D. in Systems Science and M.S. degree in Computer Science from Binghamton University in 1997.

Tong Sun

Adjunct Professor, Computing Security at RIT Dr. Tong Sun is an adjunct professor at Department of Computer Science, Rochester Institute of Technology. She is leading data analytics research lab at PARC, Xerox Company. She received her Ph.D. in Electrical & Computer Engineering from University of Rhode Island, MS in Artificial Intelligence from Huazhong University of Science and Technology in China.
725

Experience Level

Advanced

Learning Partner

Rochester Institute of Technology

Program Type

MicroMasters®

Subject

IT
Advanced Business Harvard X-Series