We may earn an affiliate commission when you visit our partners.
Course image
Bo Yuan, Jonathan S. Weissman, Yin Pan, and Tong Sun

The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. It also includes the evaluation of the competencies and performance tasks that enable professional cybersecurity success.

Read more

The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. It also includes the evaluation of the competencies and performance tasks that enable professional cybersecurity success.

Before enrolling in the Cybersecurity Capstone, you must successfully complete and pass the four courses in the RITx Cybersecurity MicroMasters program as a verified learner. Upon successful completion of the Cybersecurity Capstone, you will receive the Cybersecurity MicroMasters certificate.

During the Cybersecurity Capstone, you will perform a set of hands-on lab exercises in a web-based virtual lab environment. Below are the requirements to successfully access the virtual lab environment:

Access to a laptop or desktop computer

A modern web browser with Javascript enabled

A fast internet connection

The areas of hands-on lab activities include, but are not limited to:

basic systems and network services such as firewall, DNS, DHCP, Wireshark

digital forensics investigation with tools such as Encase, FTK, and Volatility Framework

network security related tools such as port scanning, Snort, and Metasploit, etc.

You will be assessed by answering questions and uploading results based on hands-on lab activities completed in the web-based virtual lab environment. Assessment questions are within the edX platform.

What you'll learn

  • implementing solutions to secure computer systems and networks
  • performing digital forensic investigations of real world cases
  • detecting and investigating network intrusions.

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches cybersecurity skills, knowledge, and tools that are highly relevant to industry
Offers hands-on labs and interactive materials
Develops professional cybersecurity skills and deep expertise in cybersecurity
Taught by Yin Pan, Tong Sun, Bo Yuan, and Jonathan S. Weissman, who are recognized for their work in cybersecurity
Builds a strong foundation for beginners in cybersecurity
Implements solutions to secure computer systems and networks

Save this course

Save Cybersecurity Capstone to your list so you can find it easily later:
Save

Reviews summary

Focused network security

The "Cybersecurity Capstone" course is not a comprehensive review of the "RITx Cybersecurity MicroMasters" program as its name suggests. Instead, it is mostly focused on network security. This may be disappointing to students who were expecting hands-on training in the other areas covered in the previous four courses, such as digital forensics.
Primarily focused on network security
"...The Capstone class is really a network security class in disguise..."
Not a comprehensive review of previous knowledge
"...It was intended to be a review and hands-on training of the previous 4 classes, however, only 3 classes were represented..."

Activities

Coming soon We're preparing activities for Cybersecurity Capstone. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Cybersecurity Capstone will develop knowledge and skills that may be useful to these careers:
Network Security Analyst
Network Security Analysts monitor and analyze network traffic to identify and mitigate security threats. They also work to develop and implement security policies and procedures, as well as to conduct security audits and risk assessments. This course will help you develop the skills you need to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Security Engineer
Security Engineers use their knowledge in cybersecurity to plan and implement security measures to protect their organization's computer networks and systems. This course can help you develop the skills to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect their organization's information assets. They also work to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. This course will help you develop the skills you need to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Cybersecurity Analyst
Cybersecurity Analysts use their knowledge in cybersecurity to protect their organization's computer networks and systems from cyberattacks. They work to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. This course will help you develop the skills you need to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Digital Forensics Examiner
Digital Forensics Examiners use their knowledge in cybersecurity to investigate digital evidence in order to identify and prosecute criminals. They work with law enforcement and intelligence agencies to investigate cybercrimes, such as hacking, fraud, and identity theft. This course will help you develop the skills you need to identify and collect digital evidence, as well as to analyze and interpret it. It also includes hands-on lab exercises where you will use real-world tools and techniques to investigate digital forensics cases.
Penetration Tester
Penetration Testers use their knowledge in cybersecurity to identify and exploit security vulnerabilities in their organization's computer networks and systems. They work to help organizations improve their security posture and to prevent cyberattacks. This course will help you develop the skills you need to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Incident Responder
Incident Responders use their knowledge in cybersecurity to respond to and mitigate security incidents. They work with organizations to identify and contain security breaches, as well as to recover from them. This course will help you develop the skills you need to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Security Consultant
Security Consultants use their knowledge in cybersecurity to help organizations improve their security posture. They work with organizations to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. This course will help you develop the skills you need to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Security Architect
Security Architects use their knowledge in cybersecurity to design and implement security solutions for their organization. They work with organizations to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. This course will help you develop the skills you need to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures. It also includes hands-on lab exercises where you will use real-world tools and techniques to detect and investigate network intrusions.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the security of their organization's information assets. They work with senior management to develop and implement security policies and procedures, as well as to oversee the organization's security program. This course may be useful for CISOs who want to develop their skills in cybersecurity. It will help them to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures.
Security Manager
Security Managers are responsible for the security of their organization's computer networks and systems. They work with senior management to develop and implement security policies and procedures, as well as to oversee the organization's security program. This course may be useful for Security Managers who want to develop their skills in cybersecurity. It will help them to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures.
Network Administrator
Network Administrators are responsible for the management of their organization's computer networks. They work with senior management to develop and implement network policies and procedures, as well as to oversee the organization's network program. This course may be useful for Network Administrators who want to develop their skills in cybersecurity. It will help them to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures.
Systems Administrator
Systems Administrators are responsible for the management of their organization's computer systems. They work with senior management to develop and implement systems policies and procedures, as well as to oversee the organization's systems program. This course may be useful for Systems Administrators who want to develop their skills in cybersecurity. It will help them to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures.
IT Manager
IT Managers are responsible for the management of their organization's information technology (IT) resources. They work with senior management to develop and implement IT policies and procedures, as well as to oversee the organization's IT program. This course may be useful for IT Managers who want to develop their skills in cybersecurity. It will help them to identify and fix security vulnerabilities, as well as to create and manage security policies and procedures.
Cloud Security Engineer
Cloud Security Engineers use their knowledge in cybersecurity to protect their organization's cloud-based assets. They work with senior management to develop and implement security policies and procedures for cloud computing, as well as to oversee the organization's cloud security program. This course may be useful for Cloud Security Engineers who want to develop their skills in cybersecurity. It will help them to identify and fix security vulnerabilities in cloud computing environments, as well as to create and manage security policies and procedures for cloud computing.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser