• Length:
    8 Weeks
  • Effort:
    10–12 hours per week
  • Price:

    FREE
    Add a Verified Certificate for 600 USD

  • Institution
  • Subject:
  • Level:
    Advanced
  • Language:
    English
  • Video Transcript:
    English

Prerequisites

Successful completion of the verified track of:

About this course

The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. It also includes the evaluation of the competencies and performance tasks that enable professional cybersecurity success.

Before enrolling in the Cybersecurity Capstone, you must successfully complete and pass the four courses in the RITx Cybersecurity MicroMasters program as a verified learner. Upon successful completion of the Cybersecurity Capstone, you will receive the Cybersecurity MicroMasters certificate.

During the Cybersecurity Capstone, you will perform a set of hands-on lab exercises in a web-based virtual lab environment. Below are the requirements to successfully access the virtual lab environment:

  • Access to a laptop or desktop computer
  • A modern web browser with Javascript enabled
  • A fast internet connection

The areas of hands-on lab activities include, but are not limited to:

  • basic systems and network services such as firewall, DNS, DHCP, Wireshark
  • digital forensics investigation with tools such as Encase, FTK, and Volatility Framework
  • network security related tools such as port scanning, Snort, and Metasploit, etc.

You will be assessed by answering questions and uploading results based on hands-on lab activities completed in the web-based virtual lab environment. Assessment questions are within the edX platform.

What you'll learn

The Cybersecurity Capstone is a practice of hands-on skills and an assessment of various knowledge attained through the Cybersecurity MicroMasters program which includes:
  • implementing solutions to secure computer systems and networks
  • performing digital forensic investigations of real world cases
  • detecting and investigating network intrusions.

Meet your instructors

Bo Yuan
Professor of Computing Security
RIT
Jonathan S. Weissman
Senior Lecturer, Computing Security
RIT
Yin Pan
Professor, Computing Security
RIT
Tong Sun
Adjunct Professor, Computing Security
RIT

Pursue a Verified Certificate to highlight the knowledge and skills you gain $600.00

View a PDF of a sample edX certificate
  • Official and Verified

    Receive an instructor-signed certificate with the institution's logo to verify your achievement and increase your job prospects

  • Easily Shareable

    Add the certificate to your CV or resume, or post it directly on LinkedIn

  • Proven Motivator

    Give yourself an additional incentive to complete the course

  • Support our Mission

    EdX, a non-profit, relies on verified certificates to help fund free education for everyone globally

Who can take this course?

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.