Reference no: EM133185337
Cybersecurity Graduate Capstone
The guidelines for the capstone course require a student to demonstrate the application of academic and professional abilities developed as agraduate student. The capstone challenges students to integrate skills and knowledge from several program domains into one project. As a result, it is highly recommended your topic resolve a current or perceived business problem. As stated, you want to exemplify what you have learned in your cybersecurity graduate program to showcase your skills. Remember, your research topic exemplifies scholarship and research at the highest level and is significant and helpful to potential employers in identifying your abilities. Your research will always be something you can look back on with pride. Finally, it is recommended for students to use publicly available datasets for transparency and external validity.
The purpose of this document is to help you clearly state the research question you will be exploring in your capstone project, your project's scope, and your timeline in order to assure these align with your degree emphasis. Without clearly defining each of these areas, you will not have a complete and realistic overview of your project, and it cannot be accurately assessed whether your project will be acceptable for the purposes of these courses. Of course, if this is a project you have already completed at work or elsewhere, this form should be easy to complete. Many students use a project they have already completed in the past several years. In that case, you will write the proposal as if the project has not been done yet, and when you report on your project, you will use your complete after-implementation report. If you have not yet done your project, this document can help ensure the scope is within the acceptable range for this capstone. An instructor will approve this form before submitting this task for evaluation. The task will not be evaluated without an instructor's signature. The instructor may ask for additional information before approving the form.
The purpose of this document is to help you clearly state the research question for this capstone project, as well as your project's scope and timeline, to ensure these align with your degree emphasis. While you may not have a complete and realistic overview of your project at this time, the acceptability of your project for the purposes of this course cannot be accurately assessed without clearly defining each of these areas. Many students use a project they have already completed within the past two years. If you choose a finished project, you will write the proposal as if the project is not yet complete. Then, when you report on your project, use your complete after-implementation report.
If you have not yet started your project, this document can help ensure the scope is in the acceptable range for this capstone. A instructor must approve this form before you submit your capstone for evaluation. The task will not be evaluated without an instructor's signature. The instructor may ask for additional information before approving the form.
Attachment:- Cybersecurity Graduate Capstone.rar