Apply cybersecurity skills in a hands-on capstone project. Build secure software, identify vulnerabilities, and enhance system security.
Apply cybersecurity skills in a hands-on capstone project. Build secure software, identify vulnerabilities, and enhance system security.
This intensive Cybersecurity Capstone Project offers a unique, hands-on experience in secure software development and vulnerability assessment. Participants work in teams to build a secure software system, then attempt to find flaws in other teams' projects. The course follows a "Build-it, Break-it, Fix-it" format, challenging students to apply their cybersecurity knowledge in practical scenarios. Through this process, learners gain valuable experience in creating secure systems and identifying potential security vulnerabilities. The project runs 3-4 times a year and includes phases for system development, peer evaluation, and feedback. This capstone is designed to solidify and apply the skills learned throughout a cybersecurity program in a real-world-like environment.
4.3
(158 ratings)
9,799 already enrolled
Instructors:
English
22 languages available
What you'll learn
Design and implement a secure software system
Deploy and manage projects using cloud platforms like Heroku
Conduct security assessments on peer-developed systems
Identify and document security vulnerabilities in software
Develop skills in both offensive and defensive cybersecurity
Collaborate effectively in a team-based security project
Skills you'll gain
This course includes:
6 Minutes PreRecorded video
2 peer reviews
Access on Mobile, Tablet, Desktop
Batch access
Shareable certificate
Closed caption
Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.
There are 4 modules in this course
The Cybersecurity Capstone Project is an intensive, hands-on experience that challenges students to apply their cybersecurity knowledge in a practical setting. Following a "Build-it, Break-it, Fix-it" format, participants work in teams to develop a secure software system, then attempt to identify vulnerabilities in other teams' projects. This course covers the entire lifecycle of secure software development, from initial design and implementation to security testing and vulnerability remediation. Students will gain experience with tools like Heroku for deployment and learn to evaluate systems based on security criteria. The project emphasizes both offensive and defensive security practices, providing a well-rounded capstone experience for cybersecurity students.
CAPSTONE OVERVIEW AND SETUP
Module 1 · 1 Hours to complete
DEVELOPMENT OF PROJECT SYSTEM
Module 2 · 1 Hours to complete
EVALUATION OF OTHER TEAM'S SYSTEMS
Module 3 · 1 Hours to complete
Evaluation Feedback
Module 4 · 20 Minutes to complete
Fee Structure
Payment options
Financial Aid
Instructor
Expert in Social Media Analysis and Human-Computer Interaction
Dr. Jennifer Golbeck is the Director of the Human-Computer Interaction Lab and an Associate Professor at the College of Information Studies, University of Maryland. Her research specializes in analyzing social media, with a focus on modeling social relationships like trust and user preferences to enhance online information interactions. A Research Fellow of the Web Science Research Initiative, she was named one of IEEE Intelligent Systems' Top Ten AI Researchers to Watch in 2006. Dr. Golbeck’s work advances the understanding of social media dynamics and user-centric system design.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.3 course rating
158 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.