For your capstone, you will identify an original cybersecurity problem and propose a project to address it. In later tasks, you will be asked to gather, analyze, and present data related to your research question. Your capstone proposal serves the purpose of organizing your ideas for a project so you can complete the project as efficiently as possible. To start this capstone project, you must first discuss your project ideas and potential research question with a course instructor. After you reach an agreement on your research topic, you must fill out the top portion of the attached “Cybersecurity Graduate Capstone Topic Approval Form” and send it to the course instructor. The course instructor will digitally sign your form and then lock it to prevent further changes to the document.
The capstone projects should not be based on or include any proprietary or classified information or material belonging to your employer or any other organization unless you obtain the owner’s permission to use it. Such material belongs to this third party and is referred to as “restricted information.” You must declare with a digital signature whether your capstone project is based on or includes restricted information by submitting the attached “IT Capstone Release Form.” This completed attachment also documents that you have permission from the third party to use the restricted information.
Quick Links
Use Our Writing Service
Our team has experienced writers that follow all the codes used in professionalism when writing academic essays. We focus our services on satisfied clients. Through critical attention to detail, our writers abide by all the instructions given by clients. Additionally, the paper format is done according to the dictates of the client in respect to the set academic style. We are proud of completing outstanding top-quality papers.