CYB815 – Cybersecurity Capstone
The capstone unit provides students with an authentic learning experience where they can apply the knowledge, skills and abilities developed across the whole program of study. Students will undertake a practice-oriented investigation of a substantive project assigned to them under the supervision of an academic mentor and/or industry client. Both systems and management projects will be available to students according to their selected stream. The project will typically involve establishing formal requirements, engaging in a range of practice-oriented activities to meet the requirements, and delivery of a substantive outcome that may take a variety of forms (e.g. report, software, policy, risk assessment, strategy document, training protocol).
Learning Outcomes:
- Apply knowledge and skills in cybersecurity as well as project management skills to plan, develop, implement and manage a substantial cybersecurity project and/or capstone experience in a real-world context
- Develop state-of-the-art knowledge of and apply skills in critical thinking and problem solving as well as technical and creative skills, to evaluate and manage complex and diverse cybersecurity information, concepts, theories and systems in the context of real-world organisations
- Develop and apply technical and communication skills as well as personal, interpersonal and teamwork skills to design and evaluate advances in technology, the threat environment and industry standards suited to real-world organisations for specialist and non-specialist audiences
- Gain experience in evaluating and communicating technical and management issues as well as information using digital technologies to new and existing cybersecurity situations at strategic and operational levels in organisations
- Apply knowledge and skills in cybersecurity with a high level of personal autonomy and accountability to address new and existing situations in professional practice.
- Demonstrate an understanding of ethical standards and professional codes of conduct as they apply to real world cybersecurity practice in the global context