ct-logo

131+ Impressive Cybersecurity Capstone Project Ideas for Students

In today’s digital age, cybersecurity is more critical than ever. As the world becomes increasingly connected, the need for skilled cybersecurity professionals continues to rise. If you’re a student pursuing a degree in cybersecurity, your capstone project is an excellent opportunity to showcase your skills, creativity, and problem-solving abilities.

To help you get started, we’ve compiled a list of over 131+ impressive cybersecurity capstone project ideas. Whether you’re interested in cryptography, network security, ethical hacking, or any other aspect of cybersecurity.

You’ll find a project idea that sparks your interest and challenges your skills.

What is a capstone project for cyber security

Table of Contents

A capstone project in cybersecurity is a culminating project or experience typically undertaken by students in a cybersecurity program or related field towards the end of their studies. It is designed to apply the knowledge and skills gained throughout the program to address real-world cybersecurity challenges or problems. The main objectives of a cybersecurity capstone project are to demonstrate a deep understanding of cybersecurity concepts, tools, and techniques, as well as to provide practical solutions to cybersecurity issues.

Following are the best cybersecurity capstone project ideas for students. It is such as;

Cryptography and Encryption

  • Develop a secure messaging app with end-to-end encryption.
  • Design a blockchain-based voting system with cryptographic safeguards.
  • Implement a digital signature verification system for document authenticity.
  • Create a password manager with robust encryption and secure storage.
  • Investigate quantum-resistant cryptographic algorithms for future security.

Network Cybersecurity Capstone Project Ideas

  • Build a network intrusion detection system (NIDS) using machine learning.
  • Conduct a penetration testing on a simulated network environment.
  • Develop a secure remote access solution for a corporate network.
  • Design a firewall rule optimization tool for better network security.
  • Implement a network traffic anomaly detection system.

Web Application Security

  • Develop a web application vulnerability scanner.
  • Create a secure coding guidelines and best practices tool for developers.
  • Perform a comprehensive security audit on a popular website.
  • Design a web-based honeypot to lure and study attackers.
  • Build a secure file upload system with real-time malware scanning.

Internet of Things (IoT) Security

  • Investigate vulnerabilities in IoT devices and propose countermeasures.
  • Develop a home automation security framework.
  • Create a secure IoT device management platform.
  • Build a tool for analyzing and securing IoT protocols.
  • Design a secure IoT sensor network for environmental monitoring.

Mobile App Cybersecurity Capstone Project Ideas

  • Conduct a security assessment of a popular mobile app.
  • Create a mobile app firewall to monitor and control app permissions.
  • Build a mobile app that detects and defends against SMS phishing attacks.
  • Investigate security risks in mobile payment apps and propose improvements.
  • Develop a secure mobile authentication solution using biometrics.

Cloud Cybersecurity Capstone Project Ideas

  • Build a cloud-based threat intelligence platform.
  • Design a secure cloud storage and file-sharing service.
  • Implement a multi-factor authentication system for cloud services.
  • Conduct a security audit of a cloud infrastructure.
  • Develop a tool for monitoring and mitigating cloud-based DDoS attacks.

Ethical Hacking and Penetration Testing

  • Perform a red team vs. blue team simulation exercise.
  • Conduct a security assessment of a real-world organization’s infrastructure.
  • Develop a custom exploit for a known vulnerability.
  • Build a phishing awareness training platform.
  • Create a tool for analyzing and exploiting IoT vulnerabilities.

Incident Response and Forensics

  • Design an automated incident response system.
  • Build a digital forensics toolkit for analyzing mobile devices.
  • Investigate and document a real-world cyber incident.
  • Develop a threat hunting platform for proactive security.
  • Create a tool for recovering data from encrypted storage.

Social Engineering and Awareness

  • Design a social engineering awareness training program.
  • Conduct a simulated phishing campaign and analyze results.
  • Develop a tool for detecting fake news and misinformation.
  • Create a social engineering toolkit for ethical testing.
  • Investigate the psychology of cybercriminals and their tactics.

Biometrics and Authentication

  • Build a biometric authentication system using facial recognition.
  • Develop a behavioral biometrics-based authentication method.
  • Investigate the security of voice recognition authentication.
  • Design a multi-modal biometric authentication framework.
  • Create a secure passwordless authentication solution.

Machine Learning and AI in Cybersecurity

  • Develop an AI-based threat detection and response system.
  • Build a machine learning model for predicting cyber threats.
  • Investigate adversarial attacks on machine learning-based security systems.
  • Design an AI-driven malware detection and classification tool.
  • Create a deep learning model for anomaly detection in network traffic.

Privacy and Data Protection

  • Develop a privacy-preserving data sharing platform using homomorphic encryption.
  • Investigate privacy issues in IoT and propose solutions.
  • Design a tool for data anonymization and de-identification.
  • Create a privacy-focused browser extension.
  • Build a data breach notification and response system.

Cybersecurity Policy and Governance

  • Conduct a cybersecurity risk assessment for an organization.
  • Develop a cybersecurity policy framework for a government agency.
  • Investigate the impact of international cybersecurity regulations on businesses.
  • Design a compliance monitoring and reporting tool.
  • Create a cybersecurity awareness campaign for a specific industry.

Legal and Ethical Aspects of Cybersecurity

  • Investigate the legal implications of cyberattacks and data breaches.
  • Create a guide to ethical hacking and responsible disclosure.
  • Develop a tool for tracking and reporting cybercrime incidents.
  • Design a framework for assessing the ethics of AI in cybersecurity.
  • Build a database of cybersecurity case studies and their legal outcomes.

Blockchain Cybersecurity Capstone Project Ideas

  • Investigate vulnerabilities in blockchain smart contracts.
  • Design a blockchain-based secure voting system.
  • Develop a tool for analyzing blockchain transactions for fraud detection.
  • Create a secure digital identity management system using blockchain.
  • Build a blockchain-based supply chain security solution.

Biometric and IoT-Based Access Control

  • Develop a secure access control system using biometrics and IoT.
  • Investigate vulnerabilities in existing biometric access control systems.
  • Design a biometric authentication system for smart homes.
  • Create an IoT-based access control solution for industrial facilities.
  • Build a secure biometric time and attendance system.

Capstone Project Ideas For Cybersecurity in Healthcare

  • Investigate security challenges in healthcare IoT devices.
  • Develop a secure telemedicine platform.
  • Design a tool for detecting and preventing healthcare data breaches.
  • Create a healthcare-focused ransomware detection system.
  • Build a patient privacy monitoring solution for healthcare institutions.

Cybersecurity Capstone Project Ideas in Education

  • Conduct a security assessment of an educational institution’s network.
  • Develop an e-learning platform with enhanced security features.
  • Investigate and propose solutions for cyberbullying in schools.
  • Design a tool for protecting student data in educational software.
  • Create a secure online examination platform.

Top Cybersecurity Capstone Project Ideas in Finance

  • Investigate cybersecurity risks in online banking applications.
  • Develop a secure mobile banking app with advanced authentication.
  • Design a tool for detecting fraudulent financial transactions.
  • Create a financial fraud prediction model using machine learning.
  • Build a secure cryptocurrency wallet.

Cybersecurity Project Ideas in Transportation

  • Investigate vulnerabilities in autonomous vehicles.
  • Develop a secure vehicle-to-vehicle communication system.
  • Design a tool for detecting and preventing GPS spoofing attacks.
  • Create a secure ticketing and payment system for public transportation.
  • Build a transportation fleet security monitoring platform.

Best Cybersecurity Projects in Critical Infrastructure

  • Investigate vulnerabilities in power grid control systems.
  • Develop a secure industrial control system (ICS) firewall.
  • Design a tool for assessing the security of water treatment facilities.
  • Create a critical infrastructure threat intelligence platform.
  • Build a secure communication system for emergency responders.

Cybersecurity Capstone Project Ideas in Social Media

  • Investigate privacy and security issues in popular social media platforms.
  • Develop a privacy-focused social media network.
  • Design a tool for identifying and reporting cyberbullying on social media.
  • Create a social media content authenticity verification system.
  • Build a secure social media analytics platform.

Great Cybersecurity Projects in Gaming

  • Investigate security vulnerabilities in online gaming platforms.
  • Develop an anti-cheat system for online games.
  • Design a tool for protecting against distributed denial-of-service (DDoS) attacks in gaming.
  • Create a secure in-game item trading platform.
  • Build a game-specific threat intelligence feed.

Cybersecurity Capstone Project Ideas in Smart Cities

  • Investigate security risks in smart city infrastructure.
  • Develop a secure smart city traffic management system.
  • Design a tool for detecting and mitigating cyberattacks on smart grids.
  • Create a secure smart city surveillance system.
  • Build a smart city data privacy framework.

Best Cyber security Projects in Cloud Gaming

  • Investigate security challenges in cloud gaming platforms.
  • Develop a secure cloud gaming platform.
  • Design a tool for protecting against cloud gaming server attacks.
  • Create a secure game streaming service.
  • Build a cloud gaming security assessment framework.

Good Cybersecurity Capstone Project Ideas in Aviation

  • Investigate vulnerabilities in aviation communication systems.
  • Develop a secure air traffic control system.
  • Design a tool for detecting and preventing GPS spoofing attacks in aviation.
  • Create a secure aviation data sharing platform.
  • Build an aviation cybersecurity training simulator.

How to do projects on cyber security

How to do projects on cyber security

Following are the steps to do the Cybersecurity capstone project ideas.

  • Define Project Objectives: Clearly outline the project’s goals and objectives, specifying the cybersecurity problem you intend to solve or explore.
  • Research and Analysis: Thoroughly research the chosen cybersecurity topic, analyzing existing solutions, vulnerabilities, and best practices.
  • Design Secure Solutions: Develop a detailed plan for implementing secure solutions, including architectural design and security measures.
  • Implementation and Testing: Build and implement the security measures, software, or configurations while conducting rigorous testing to ensure their effectiveness.
  • Documentation: Create comprehensive project documentation, including a report detailing your project’s methodology, findings, and recommendations.

Conclusion – Cybersecurity Capstone Project Ideas

These 131+ cybersecurity capstone project ideas cover a wide range of topics and challenges in the ever-evolving field of cybersecurity. When choosing a project, consider your interests, strengths, and the specific area of cybersecurity that excites you the most. Remember that a successful capstone project not only demonstrates your technical skills but also your ability to research, analyze, and propose solutions to real-world cybersecurity problems. So, pick a project that inspires you, and embark on your journey to become a cybersecurity expert. Good luck!

What are the 3 P’s of cyber security?

No matter what your level of cybersecurity knowledge and experience, understanding these critical three P’s (patches, passwords, phishing) can help lead to comprehensive protection.

What are the five keys of cyber security?

The NIST Cybersecurity Framework includes five primary functions: Identify, Protect, Detect, Respond, Recover, with awareness and training as key objectives within the Protect function.

Similar Articles

Tips To Write An Assignment

13 Best Tips To Write An Assignment

Whenever the new semester starts, you will get a lot of assignment writing tasks. Now you enter the new academic…

How To Do Homework Fast

How To Do Homework Fast – 11 Tips To Do Homework Fast

Homework is one of the most important parts that have to be done by students. It has been around for…

Leave a Comment Cancel Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed .

capstone project in cybersecurity

  • Privacy Policy

cybersecurity capstone project ideas

capstone project in cybersecurity

In an increasingly competitive job market, cybersecurity projects you work on during your academic career can make your resume stand out to employers. These projects will testify to your technical skills and prowess, giving you an edge over competing candidates.

In this article, we'll go over 6 impressive cybersecurity capstone project ideas for college students in detail, list some additional ideas you might want to look into, and answer some questions you may have in mind.

6 Cybersecurity Capstone Project Ideas

Cyber security projects may well be the X factor that helps you land a great first job when you enter the job market after college. 

Therefore, regardless of whether you're planning to venture into a career in network security, information technology, a cybersecurity specialization, etc., it is always a good idea to carefully consider which projects serve your career goals the best.

To make this process easier, we've explained 6 great cyber security project ideas below:

Keylogger Projects

As a computer science student, you may already be familiar with the keylogger, a surveillance software that records every keystroke made on a system to which it is installed.

As a part of your cybersecurity capstone project, you can build a keylogger from scratch. However, this would require some great coding skills.

If coding is not your forte, maybe you'd like to try creating a process for detecting keyloggers so that they can be deleted from the system since they can often be used to carry out cyber attacks.

For ideas, you can always go to places like github and look at peoples' projects - and the build your own!

For example: a C Programming Language Keylogger .

Network Traffic Analysis

Another excellent choice for your first or next cybersecurity project is Network Traffic Analysis. This is a popular concept among internet security enthusiasts and is commonly referred to as packet sniffing.

In this project, most of your work will be analysis-based, i.e., you will learn how a packet sniffer software program can be used to surveil and intercept data packets passing through a network.

Caesar Cipher Decoder

Consider developing an app to crack a Caesar Cipher as a cybersecurity project if you're into cryptography. Not familiar with a caesar cipher? Don't worry; it's pretty simple.

A Caesar Cipher is a method of encryption that involves replacing each letter in a given text with other letters that come much later in the alphabet. Still don't get it? Let's illustrate with an example. Say you want to encrypt the word Network by shifting every letter by three alphabets. Then, the Caesar Cipher for it will read QHWZRUN. 

You can start by developing an app that cracks such ciphers, starting with more straightforward texts and moving on to more complex ones with time.

If programming is a talent, and you're confident enough to take on a more challenging and sophisticated project, give creating your own antivirus a go.

To get started, you'll need to define which protection method you want to develop. Next, you'll have to select the platforms your software will be compatible with. Next, use VBScript to create Windows macro protection and portals like GitHub for coding references to make your work easier. Finally, you'll need to design a user-friendly UI.

Build Your Own Encryption Software

One of the most significant fields in cybersecurity is data encryption, which is why employers are likely to be impressed to see your own encryption software development project on your resume.

Before you start, map out the scope of the project, such as building an app using pre-existing algorithms to encrypt files. Then, to implement encryption in your app, you can use AWS Encryption SDK (Software Development Kit).

Bug Bounties and Hackathons

Finding bugs in websites can be another exciting project to try your hands on. A cursory web search will take you to several bug bounty programs to choose from. You can partake in such activities and gain first-hand experience identifying and weeding out bugs. You may even get paid by some programs for finding relevant bugs.

Many companies organize hackathons, a portmanteau of hacking and marathons, for those who aspire to enter the field of cyber security. If you ever have a chance to participate in one, never let the opportunity go.

This is the best, and perhaps only, way to collaborate with seasoned industry professionals worldwide.

Other Cybersecurity Capstone Project Ideas 

  • Cyber security and Business Continuity
  • Network Security Approaches
  • Key Aspects of Cybersecurity
  • Increasing end-user Security
  • Increasing Cybersecurity Awareness
  • Containing a computer virus to stop it from infecting other computer systems
  • Improving the safety of government information systems
  • Are App Store apps safe?
  • How much security does a firewall provide?
  • Cybersecurity plays and its role in governance transparency
  • How do banks protect their business from cyber threats?
  • Cybersecurity and Encryption
  • Military data breaches and cyber attacks
  • Confidentiality and Cybersecurity

Frequently Asked Questions

The following answers some of the most common questions students ask before undertaking cybersecurity capstone projects.

What is a capstone project?

Capstone projects are frequently referred to as final projects. This is because they show what students have learned during their time in school. These projects encompass most of the educational experiences accumulated over the course of a school year.

The goal is for students to learn to be more creative and organized and communicate with others while working in groups when they complete capstone projects.

How to write a capstone proposal?

Begin by considering the project idea you choose; It's best to know what you will write about right away. 

Next, prepare a capstone project proposal by determining what information you'll require and planning how to acquire it. Finally, start working on the proposal once you have all the info you need. Make sure it is succinct and to the point. Being direct is the best approach.

How long should a capstone project proposal be?

Give a brief overview of your project's motivation, methods, expected outcomes, and conclusions. Then, summarize the project in no more than 100 to 150 words.

What makes a good capstone project?

Capstone projects are designed to encourage students to ask challenging questions, solve problems, and hone research and media literacy abilities, communication, public speaking, teamwork, planning, and goal setting.

What makes a good capstone proposal?

The best proposals are not urgent, are feasible within the academic timetable and budget, clearly explain the problem or issue to be addressed, have a realistic scope, and explicitly outline the responsibilities of each team member.

Final Thoughts 

There is no scarcity of ideas for cybersecurity capstone projects, but the most important thing is to keep in mind how your project sets you up for success in your career. Get started on said project, and see it through to the end!

Cyber security projects are essential for acquiring hands-on experience and will add to your credibility as a candidate when you enter the job market as a fresh college graduate. 

Author Image

Leave a Reply

Your email address will not be published. Required fields are marked

Save my name, email, and website in this browser for the next time I comment.

📕 Studying HQ

220+ Cybersecurity Capstone Project Ideas

Bob cardens.

  • September 6, 2022
  • Essay Topics and Ideas

It is now more important than ever to have a strong understanding of cybersecurity. With so much of our lives and information being stored online, it is crucial to know how to protect ourselves from cyber-attacks. Whether you are looking for a capstone project idea for your own education or to complete with a team, this list of 220 ideas is sure to give you plenty of inspiration!

What You'll Learn

Cybersecurity Capstone Project Ideas

1. Develop a new cybersecurity algorithm 2. Create a tool to detect and prevent phishing attacks 3. Develop a security protocol for a new IoT device 4. Create a program to encrypt data in transit 5. Develop a system to secure medical devices 6. Create a security plan for a new mobile app 7. Evaluate the security of a new website or service 8. Perform a security audit of an existing organization 9. Investigate and report on a major data breach 10. Create a awareness campaign about online safety

11. Develop a contingency plan for a major security incident 12. Evaluate the effectiveness of a new security measure 13. Investigate and report on a malware outbreak 14. Create a tool to prevent SQL injection attacks 15. Develop a system to secure sensitive data 16. Create a program to detect and block malicious traffic 17. Evaluate the security of an existing system 18. Perform a penetration test of an organization’s network 19. Investigate and report on an data privacy incident 20. Develop a policy for managing data breaches

21. Create a system to detect and prevent DDoS attacks 22. Develop a plan for responding to a security incident 23. Investigate and report on a security breach 24. Evaluate the effectiveness of a new security measure 25. Perform a security assessment of an organization 26. Create a program to encrypt data at rest 27. Develop a system to secure mobile devices 28. Evaluate the security of a new website or service 29. Investigate and report on an online scam 30. Create an awareness campaign about cyberbullying

Twenty Latest Cybersecurity Capstone Project Topics

1. Developing a security system for medical devices 2. Building a secure messaging app 3. Creating a secure email system 4. Developing a secure online payment system 5. Building a secure file sharing system 6. Creating a secure social media platform 7. Developing a security system for the Internet of Things 8. Building a secure cloud storage system 9. Creating a security system for smart homes 10. Developing a security system for autonomous vehicles11. Building a secure blockchain platform 12. Creating a security system for virtual reality 13. Developing a security system for wearables 14. Building a secure network for smart cities 15. Creating a security system for online banking 16. Developing a security system for e-commerce 17. Building a secure network for critical infrastructure 18. Creating a security system for the military 19. Developing a security system for energy grids 20. Building a secure network for the aviation industry

Twenty Cybersecurity Capstone Project topics to write about

1. Developing a cybersecurity plan for a small business. 2. Creating a cybersecurity awareness campaign for a school or other organization. 3.Designing a secure network for a company or other organization. 4. Investigating a data breach to determine its cause and potential impact. 5. Conducting a risk assessment for a company or other organization. 6. Developing disaster recovery plans for companies or other organizations in the event of a cyber attack. 7. Studying the impact of cyber-attacks on individuals and society. 8. Examining the role of social media in cybersecurity. 9. Investigating the use of cryptography in cybersecurity. 10. Evaluating the effectiveness of current cybersecurity measures. 11. Studying the history of cybersecurity and its evolution. 12. researching cybercrime and its impact on businesses and society. 13. Investigating the role of artificial intelligence in cybersecurity. 14. Examining the ethical implications of cybersecurity measures. 15. Studying the legal aspects of cybersecurity. 16. Investigating the psychological impact of cyber attacks on individuals. 17. Examining the economic impact of cybercrime on businesses and society. 18. Researching the environmental impact of data breaches and other cyber attacks. 19. Investigating the political implications of cybersecurity measures. 20. Examining the societal impact of cyber attacks

You can also check out :

How Many Sentences Are in a Paragraph

Creative Narrative Essay Topics

Creative Synthesis Essay Topics

1 Step on how to write an introduction for an argumentative essay

Find out more  Capstone Project Ideas for Nursing Leadership [50 Topics]

check out  130+ Good nursing capstone project ideas to Write About )

As you continue,  thestudycorp.com  has the top and most qualified writers to help with any of your assignments. All you need to do is place an order

Start by filling this short order form order.studyinghq.com

And then follow the progressive flow. 

Having an issue, chat with us here

Cathy, CS. 

New Concept ? Let a subject expert write your paper for You​

Have a subject expert write for you now, have a subject expert finish your paper for you, edit my paper for me, have an expert write your dissertation's chapter.

Typically replies within minutes

Hey! 👋 Need help with an assignment?

🟢 Online | Privacy policy

WhatsApp us

Discover the Top 75 Free Courses for August

capstone project in cybersecurity

Udemy Announces Layoffs Without Saying ‘Layoffs’

Udemy’s latest ‘Strategic Business Update’ uses corporate euphemisms to signal job cuts while pivoting to enterprise clients.

  • [2024] 300+ Free Google Certifications
  • 10 Best Free Programming Courses for 2024
  • 7 Best Reverse Engineering Courses for 2024
  • 10 Best Organic Chemistry Courses for 2024
  • 10 Best Applied AI & ML Courses for 2024

600 Free Google Certifications

Most common

Popular subjects.

Management & Leadership

Communication Skills

Popular courses

Understanding Clinical Research: Behind the Statistics

Preventing Dementia

Perdón y reconciliación: cómo sanar heridas

Organize and share your learning with Class Central Lists.

View our Lists Showcase

Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Advanced Cybersecurity Concepts and Capstone Project

Microsoft via Coursera Help

  • Threat modeling
  • This week introduces common threat modeling and mitigation steps, and the processes and procedures used to manage and reduce the risk of threats to an organization or system. It also covers the steps of threat modeling, each of which requires different tools and approaches. Additionally, various threat modeling frameworks will be introduced.
  • Advanced threats and mitigation
  • This week covers threat vectors, ransomware, defense in depth security, cloud security, network security, data security, and monitoring security in Azure. It also includes understanding the MITRE ATT&CK Matrix and IoT security. The module aims to provide you with an understanding of common cyberthreats, and how to mitigate them using various tools and strategies. By the end of the module, you will have a comprehensive understanding of the different components of cybersecurity and the measures you can take to protect your infrastructure from cyberthreats.
  • Security conscious modeling
  • This week provides an overview of various cybersecurity concepts and practices. It covers the basics of threat vectors, entry points, and prevention methods in cybersecurity. It also explains defense in depth security, Azure security, network security, data security, and monitoring security. You will gain a deeper understanding of these concepts, learn how to identify and mitigate security threats, and develop strategies to protect data and applications from unauthorized access. By the end of this module, you will have a comprehensive understanding of cybersecurity and be able to create an effective defense in depth security strategy for an organization.
  • Capstone project
  • In this week, you will be assessed on the key skills covered throughout this course and the other courses in the Cybersecruity Analyst Program. This module contains the Final Capstone project of the program which encapsulates the learning into a practical whole. The Final Capstone project consists of several stages and graded self-reviews. This module also includes the final graded quiz.
  • united states

Related Courses

Cybersecurity threat vectors and mitigation, cybersecurity solutions and microsoft defender, cybersecurity tools and technologies, cybersecurity management and compliance, microsoft cybersecurity analyst, introduction to networking and cloud computing, related articles, 200+ online courses to prepare for 20 microsoft azure certifications and exams, 1700 coursera courses that are still completely free, 250 top free coursera courses of all time, massive list of mooc-based microcredentials.

4.6 rating at Coursera based on 40 ratings

Select rating

Start your review of Advanced Cybersecurity Concepts and Capstone Project

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Cybersecurity Bootcamp

Jumpstart your Cybersecurity career in as little as 15 weeks.

The Flatiron School Advantage

Upcoming course start dates.

  • --> --> -->

What is Cybersecurity?

Possible career paths.

The demand for Cybersecurity professionals is growing rapidly. In fact, The Bureau of Labor & Statistics indicate a 35% national growth for Security Analysts, which is much faster than the average of all occupations. Here are some in-demand jobs you could land:

Cyber Engineer

Cyber Engineers, sometimes called Information Security Engineers, identify threats and vulnerabilities, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime.

* ZipRecruiter (September 2023)

Security analyst.

Security Analysts are responsible for ensuring that the company’s digital assets are protected from unauthorized access. This includes securing both online and on-premise infrastructures, weeding through data to filter out suspicious activity, and mitigating risks.

Penetration Tester

Penetration Testers help organizations identify and resolve security vulnerabilities affecting their digital assets and computer networks. They try to break things by simulating a cyber attack and attempting to breach networks and information systems.

Security Consultant

A Security Consultant works as a supervisor for all security measures necessary to effectively protect a company or client’s assets. Security Consultants use their expertise to assess possible security threats and create contingency protocols and plans for when violations occur.

Over $8.6 Million Awarded in Scholarships

We believe that anybody who wants to pursue a career in tech should be able to do so – regardless of how they identify, their background, or financial circumstances.

We offer three different scholarships – Access Scholarship, Merit Scholarship, and Women Take Tech – to support our students in their pursuit of a better life through education.

Student Success Stories

Not sure if our course is right for you? Hear from students who’ve been where you are. These students took charge of their futures, enrolled in our Cybersecurity course, and jumped head-first into an exciting career.

capstone project in cybersecurity

Tony Khawaja-Lopez: MMA Coach to Cybersecurity

“My life simply wouldn’t be the same without changing careers. My wife and I are living well because of my career switch.”

capstone project in cybersecurity

Qingsong Chen: Biology to Cybersecurity

“My favorite part of the program was the hands-on labs. Only by getting your hands dirty can truly understand what you have learned.”

capstone project in cybersecurity

Cybersecurity Awareness Month 2023

For the 20th Cybersecurity Awareness Month we’re featuring 5 recent Cybersecurity grads and their reasons for pursuing a career in the field.

Great companies have hired Flatiron School graduates

Course Dates
Start Date Pace Location Discipline Status
Part-Time Online Cybersecurity Few Spots Left!
Part-Time Online Cybersecurity Open
Part-Time Online Cybersecurity Open

Become a Cybersecurity Engineer in as little as 15 weeks

Your life won’t wait for a career change.

You’re ready to commit to a full-time course load. You’ll graduate in 15 weeks thanks to a rigorous schedule: 8 hours a day, Monday to Friday.

  • In-person or online
  • Synchronous learning with your cohort
  • Group work with instructor help
  • Paired with design sessions
  • Lab time with instructional staff

Our part-time course is designed for busy people. If you don’t have 8 hours to dedicate a day, then our part-time course is for you.

  • Asynchronous learning at your own pace
  • Optional live and pre-recorded lessons
  • Optional study groups and office hours
  • Discord with classmates and instructors

Attend An Event

Whether you attend online or on-campus, a Flatiron School event is a great way to get insight into student life, community, and our curriculum.

NYC Campus Tour

NYC Campus Tour

Flatiron School’s Sneak Peek Social

Flatiron School’s Sneak Peek Social

Cybersecurity curricululm.

Our curriculum incorporates the latest emerging technologies, including artificial intelligence (AI) tools. During class, we have a hands-on, community approach to learning, one that includes lab work, creating a real-world portfolio, and 1-on-1 instructor access.

Cybersecurity Engineering Prep

No matter where you’re starting from, Prework is meant to build your foundational knowledge and prepare you for success in the course. Learn to leverage artificial intelligence, machine learning, and ChatGPT to assist with various concepts and tasks.

Cybersecurity Foundational Skills

Everyone starts out learning the fundamentals of Cybersecurity. You’ll learn about network security components, such as Ethernet and Wi-Fi, and explore systems security with concepts such as operating systems architecture and system exploits. Learn to leverage artificial intelligence, machine learning, and ChatGPT to assist with various concepts and tasks.

Cybersecurity Intermediate Skills

Next, you’ll be briefed on military principles of intelligence analysis and the concept of cyber warfare. You’ll cover a range of topics on securing the modern enterprise from outside threats including governance, risk management, and compliance. Learn to leverage artificial intelligence, machine learning, and ChatGPT to assist with various concepts and tasks.

Cybersecurity Skills Development

Python and engineering solutions are up next. You’ll use basic coding and analysis to create Python scripts and automation and learn to analyze logs in various network devices. Learn to leverage artificial intelligence, machine learning, and ChatGPT to assist with various concepts and tasks.

Gray Hat Hacking

After developing coding skills, you’ll use your new knowledge to perform penetration testing for vulnerabilities in applications and network security resources. Learn to leverage artificial intelligence, machine learning, and ChatGPT to assist with various concepts and tasks.

Cybersecurity Skills Application

Next, you’ll learn the components of cryptography with hands-on experience configuring a web server with SSL/TLS, interfacing with Certificate Authorities, issuing certificates, and securely configuring SSH. Learn to leverage artificial intelligence, machine learning, and ChatGPT to assist with various concepts and tasks.

Capstone Project

The course finishes out with a scenario capstone activity. You’ll use everything you’ve learned to work through the particulars along multiple paths and prepare to highlight it in your professional portfolio. Learn to leverage artificial intelligence, machine learning, and ChatGPT to assist with various concepts and tasks.

Now Offering Cybersecurity Prep Work

Image of prospective Flatiron School student

Whether you are learning from campus or online, full-time or part-time, our programs are the same price.

  • $16,900 As low as $14,900*

We have 3 easy ways to pay:

  • Pay up front & in full ($1,000 discount)
  • Pay with a traditional loan (as low as $388/month)
  • Pay with a payment plan (as low as $642/month)

*Average tuition after scholarships and reflective of financing method, as low as $14,900 upfront or $388 per month

Frequently Asked Questions

What is an online cybersecurity engineering bootcamp.

While they may vary with each course and each school, online cybersecurity engineering bootcamps are short-term and often rigorous training programs to help students learn the skills they need to become professional cybersecurity engineers.

Are cybersecurity engineering bootcamps worth it?

We get asked this a lot — and it’s a great question — and encourage you to think about what you mean by “worth it.” If “worth it,” to you, means attending a cybersecurity engineering bootcamp, learning the skills you need to become a cybersecurity engineer, and landing a job as one, then yes, good cyber engineering bootcamps are certainly worth it.

In fact, that’s what most bootcamps set out to help you do — and the best ones will indeed help you get there.

But if you’re simply looking to brush up on your cybersecurity knowledge without a goal to work in cyber, then a full-time or part-time bootcamp would not end up being worth it for you.

If you’re looking to join the cybersecurity field professionally, though, it’s a growing and lucrative field — and the best bootcamps can help you break into it.

Read more about whether or not cybersecurity bootcamps are worth it for you and your goals.

Do Cybersecurity bootcamps work?

Employers value people who can do the job and who can learn and adapt quickly on the job. By successfully completing a bootcamp, you’re demonstrating that you can “do” as evidenced by your projects, and that you can “learn” as evidenced by completing the program. 

At Flatiron School, you’ll be able to demonstrate both. You’ll learn how to learn because new technologies and tools appear on the market everyday. Our approach enables graduates to learn and apply new tools when needed. In other words, it’s not just the skills themselves that are important to hiring managers, but how you go about acquiring skills to complete a job that sets you apart. 

In many ways, cybersecurity bootcamps definitely do work, and there’s a lot of proof behind that statement.

But it’s better to first ask yourself, “What do I want to get out of attending a cybersecurity bootcamp?” Asking yourself what your goals and ambitions are is how you’ll know if a bootcamp would work for you.

Some people want to just become acquainted with the cybersecurity field, which is great, but a full-time bootcamp might not be the best route if you’re looking for a basic understanding of cybersecurity.

If your goal is to learn to become a cybersecurity engineer, then yes, cybersecurity bootcamps do work.

What requirements do you need to join the cybersecurity engineering course?

We don’t require you to have prior experience to apply for the Cybersecurity Engineering program. Our admissions requirements are being at least 18 years old, having a high school diploma, a GED or equivalent credential, having a native or highly proficient fluency in English, and completing the admissions process.

Before joining your cohort on Day 1, you will have to complete around 40 hours of coursework called Prep to learn the basics of cybersecurity so you are prepared to get started straight away.

What is the difference between the Live and Flex experience?

The Live program is 15 weeks, but rather than going to a campus, you’ll be logged on learning remotely full-time. Both on-campus and Live programs monitor attendance daily. The Flex program gives students up to 60 weeks to complete the curriculum, and offers the most flexibility day to day. Students enrolled in Flex programs must attend 10 check-ins in order to be eligible for graduation but are not otherwise required to attend live instructional activities.

How do Flatiron School’s courses stack up against free tutorials and other live instructor bootcamps?

The price of our courses reflect our unique approach to learning and support. There are many free resources that can help you learn any discipline, but given the complexity of the topic they can be difficult to navigate independently. Furthermore, students often rave about the camaraderie they establish with instructors, other students, coaches, and alumni – all valuable networking opportunities when it comes to a job search. Our courses and support after graduation are built specifically to provide the structure and community that’s required to be successful. 

As for our more traditional competitors – those who are priced similarly and offer live instruction – most haven’t been around as long as Flatiron School, so they may not have the same depth of expertise, employer partner relationships, or alumni network. 

What’s the application process like?

The first step is to fill out a written application. Once submitted, you will receive prompts from the admissions team to schedule an interview and take a 15 min aptitude assessment. During the interview a member of the admissions team will learn about your learning needs, career goals, and help you decide whether the program is the right fit for you. If you passed your assessment, we will give you the admissions decision after your interview. 

What financing options are available?

You have a few options in terms of financing your enrollment in one of Flatiron School’s courses. See all of your options on our Tuition & Financing page .

We also offer initiatives that can help to offset the cost of tuition on our Scholarships and Diversity Initiatives page .

What does job search support look like?

The Flatiron School Career Services team exists to help get you hired. You’ll receive guidance on how to:

  • Build and Optimize your LinkedIn Profile and Resume
  • Ace your behavioral and technical interviews
  • Grow your network of tech professionals
  • Connect with Flatiron School employer partners 
  • Negotiate your salary
  • Optimize your job search using AI
  • Track job search activity using Huntr

You’ll partner with a dedicated Career Coach regularly to make forward progress each week, with up to six months of one-on-one support after graduation. 

What types of companies hire Flatiron School graduates?

Our graduates have and continue to make lasting impact in a range of companies from small startups to Fortune 500 companies. 

Companies who have hired our grads include:

  • Kickstarter
  • The New York Times
  • Thought Works
  • Goldman Sachs

What is Flatiron School’s job placement rate?

You can view our latest job placement rates in our Jobs Report .

We’ve issued a third-party examined Jobs Report each year since 2014 and remain committed to honesty and transparency with student outcomes.

I would like to talk to a Flatiron School team member. What should I do?

If you would like to connect with a member of our team, please simply schedule a chat with one of our Admissions representatives.

Privacy Overview

CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.

UC Berkeley School of Information - home

  • Certificate in Applied Data Science
  • What is Cybersecurity?
  • MICS Class Profile
  • What Is Data Science?
  • Careers in Data Science
  • MIDS Class Profile
  • Study Applied Statistics
  • International Admissions
  • Fellowships
  • Student Profiles
  • Alumni Profiles
  • Video Library
  • Apply Now External link: open_in_new

Home / Cybersecurity / Curriculum / Capstone Course

Capstone Course

In the MICS capstone class, students use the full range of cybersecurity skills, techniques, and concepts gained throughout the program to design and execute a semester-long team project. Student teams propose a complex cybersecurity project to which they can apply multi-faceted research, analysis, and problem-solving. Projects typically focus on real-world issues, applications and solutions (or prototypes) with the aim of preparing students for practical and long-term success as cybersecurity professionals. Project topics may include analysis, measurement, design/innovation, testing, attack, or research. Students are evaluated based on the quality of their project deliverables as well as their ability to collaboratively develop and communicate their work in both written and oral form.

Throughout the course, students communicate with classmates and instructors about their work, receive and provide feedback in informal group discussions and formal class presentations, and ultimately deliver a web-based presentation and final deliverable. Includes relevant readings, case studies and discussions, and real-world examples and perspectives from cybersecurity experts and industry practitioners.

Request More Information

You might be using an unsupported or outdated browser. To get the best possible experience please use the latest version of Chrome, Firefox, Safari, or Microsoft Edge to view this website.

  • Best Online Cybersecurity Bootcamps

Best Online Cybersecurity Bootcamps Of 2024

Doug Wintemute

Updated: Jan 11, 2024, 1:31pm

The constant threat of cybercrime has forced organizations to put serious consideration into cybersecurity , which has become one of the fastest-growing fields in the country.

While many colleges and universities offer online cybersecurity degrees , students can also master the skills needed to work in this field by completing an online cybersecurity bootcamp. Plus, students can typically enroll in and complete a bootcamp more quickly than a traditional cybersecurity degree . A Forbes Advisor survey found that more than 88% of coding bootcamp graduates would recommend the learning experience to others.

Moreover, because online coding bootcamps can adapt to industry changes quickly, these programs are particularly suited to this fast-evolving field.

If you want to learn career-ready skills in an immersive, accelerated program, check out our ranking of the five best online cybersecurity bootcamps. We examine what these programs have to offer and what you should look for to find the best fit for you.

Why You Can Trust Forbes Advisor Education

Forbes Advisor’s education editors are committed to producing unbiased rankings and informative articles covering online colleges, tech bootcamps and career paths. Our ranking methodologies use data from the National Center for Education Statistics , education providers, and reputable educational and professional organizations. An advisory board of educators and other subject matter experts reviews and verifies our content to bring you trustworthy, up-to-date information. Advertisers do not influence our rankings or editorial content.

  • 6,290 accredited, nonprofit colleges and universities analyzed nationwide
  • 52 reputable tech bootcamp providers evaluated for our rankings
  • All content is fact-checked and updated on an annual basis
  • Rankings undergo five rounds of fact-checking
  • Only 7.12% of all colleges, universities and bootcamp providers we consider are awarded

Our Methodology

We scored 10 online cybersecurity bootcamps in the U.S. using 14 data points in the categories of career support, credibility, affordability and student experience. We pulled data for these categories from individual bootcamp providers. Data is accurate as of November 2023.

We scored bootcamps based on the following metrics:

Career Support

  • Access to career coaching or mentorship
  • Availability of job guarantee
  • Official hiring partners

Credibility

  • Council on Integrity in Results Reporting (CIRR) membership status
  • Student outcomes data transparency
  • Pricing transparency
  • Length of time provider has been operating

Affordability

  • Upfront cost per week
  • Availability of installment payment plan
  • Availability of delayed payment plan
  • Accepts GI Bill® or VET TEC program

Student Experience

  • Average time to completion (in hours)
  • Scheduling flexibility

We chose the five best bootcamps to display based on those receiving a curved final score of 86% or higher.

Find our full list of methodologies here .

  • Best Coding Bootcamps Online
  • Best Data Science Bootcamps
  • Best Java Bootcamps
  • 5 Best UI/UX Design Bootcamps
  • Best Online Data Analytics Bootcamps

Best Online Cybersecurity Bootcamp Options

Should you enroll in an online cybersecurity bootcamp, online cybersecurity bootcamp credibility, how to find the right online cybersecurity bootcamp for you, how to pay for an online cybersecurity bootcamp, frequently asked questions (faqs) about online cybersecurity bootcamps, coding temple (flex) cybersecurity, devmountain cybersecurity course, ironhack cybersecurity bootcamp, flatiron school cybersecurity bootcamp, springboard (part-time) cybersecurity bootcamp.

Coding Temple (Flex) Cybersecurity

Total Upfront Cost

Job Guarantee

Official Hiring Partners

Accenture, Wayfair, Cisco, Yale, Deloitte

Coding Temple offers a 12-week, part-time cybersecurity bootcamp and a six-month, self-paced flex program. In the flex program, students learn the technologies and practices required to become a cybersecurity professional on their own time.

As a cybersecurity bootcamp student at Coding Temple, you’ll set your own schedule, access synchronous group sessions and receive one-on-one support with a student relations manager. Coding Temple offers its graduates lifetime career support and a network of more than 300 hiring partners.

  • Time Commitment: Six months
  • Bootcamp Enrollment Options: Part-time, full-time, self-paced
  • Notable Bootcamp Courses: Systems and network security, cryptography
  • Prerequisites: N/A
  • Finance Options: Upfront, installment plan, deferred tuition
  • Scholarships Available: Full-tuition scholarship, $10,000 scholarship

Devmountain Cybersecurity Course

In Devmountain ‘s cybersecurity course, you’ll pick up the strategies, technologies and programming language skills used by cybersecurity engineers. You’ll cover cybersecurity principles and systems via synchronous instruction, plus a few hands-on projects for your portfolio.

Devmountain sets no prerequisites for admission, opening the door both to beginners and experienced advanced IT professionals. Along with the remote program, Devmountain offers full-time and part-time courses at its seven campuses in Texas, Georgia and Utah.

  • Time Commitment: 16 to 36 weeks
  • Bootcamp Enrollment Options: Part-time, full-time
  • Notable Bootcamp Courses: Security auditing, offensive security
  • Finance Options: Third-party loans
  • Scholarships Available: Bridge the Gap Scholarship, Adversity Scholarship, Pay It Forward Scholarship

Ironhack Cybersecurity bootcamp

Amazon, Uber, Meta, Zara, Google

At Ironhack , you can become a cybersecurity expert in as little as three months. The remote cybersecurity bootcamp features synchronous classes in foundations, digital forensics and security principles.

Ironhack offers multiple start dates each year and flexible schedule options that include full-time days or part-time evening and weekend classes. While Ironhack does not require prior experience or education, enrollees must complete 20 hours of online pre-work to prepare for the program.

  • Time Commitment: 12 to 26 weeks
  • Notable Bootcamp Courses: Digital forensics and ethical hacking, malware and dealing with incidents and threats
  • Finance Options: Third-party loans, Income sharing agreement
  • Scholarships Available: N/A

Flatiron School Cybersecurity Bootcamp

Goldman Sachs, Citibank, Google, IBM, Meta

Flatiron School ‘s cybersecurity bootcamp can prepare full-time students for careers in the cybersecurity field—as engineers, consultants or analysts—in less than three months. Along with full-time, on-campus classes in Denver and New York, learners can study full time in synchronous online classes or part time in asynchronous online classes.

Flatiron offers monthly start dates, portfolio-building opportunities and six months of one-on-one career coaching after graduation. The school does not set prerequisites, but learners must complete 40 hours of prep coursework before starting.

  • Time Commitment: 15 to 40 weeks
  • Notable Bootcamp Courses: Gray Hat hacking, Cybersecurity skills application
  • Finance Options: Upfront, traditional loan, interest-free loan
  • Scholarships Available: Access Scholarship, Merit Scholarship, Women Take Tech Scholarship

Springboard (Part-Time) Cybersecurity Bootcamp

Accenture, Cisco, Walmart, Meta, Coinbase

Springboard ‘s part-time cybersecurity bootcamp equips students to analyze and assess cyber incidents and risks. Learners who complete the six-month program acquire the skills for offensive or defensive cybersecurity careers, along with a CompTIA Security+ certification.

The beginner-friendly program features 50 labs and an applied capstone project, plus one-on-one mentorship and career coaching. If graduates don’t find work after completing the bootcamp and career prep work, Springboard promises to refund their tuition money.

  • Time Commitment: Six months, 15 to 20 hours per week
  • Bootcamp Enrollment Options: Part-time
  • Notable Bootcamp Courses: Cybersecurity attacks, host-based security
  • Finance Options: Upfront, monthly installments, deferred tuition, loan
  • Scholarships Available: Women In Technology Scholarship, Diversity In Tech Scholarship, Needs-Based Scholarship

Cybersecurity bootcamps offer accelerated, flexible training that can lead to entry-level or even more advanced roles in the information technology field. Through online learning, busy and working professionals can study without significant travel or having to overhaul their schedules.

To figure out if an online cybersecurity bootcamp is for you, consider the following:

Study Schedule

Most online bootcamps have full-time, part-time and self-paced options. While full-time study allows you to graduate faster, it usually doesn’t leave time for a full-time job. Part-time programs often run during the evenings or weekends, while self-paced options afford more control over your study schedule.

Delivery Style

Online bootcamp classes can run synchronously or asynchronously. Most full-time programs feature live, synchronous sessions, whereas self-paced programs feature anytime, anywhere asynchronous sessions. Part-time programs may feature either delivery style or a combination of both.

Learning Style

Asynchronous courses offer more freedom than on-campus courses, but they require more self-discipline, time management, motivation and independence. While synchronous classes more closely resemble on-campus learning, online learning in general tends to have less structure and interaction than in-person classes.

Despite the general lack of regulatory oversight, online bootcamps can still provide valuable, timely and practical training for aspiring cybersecurity professionals. However, without a governing body accrediting or certifying bootcamps, you need to be diligent in your search to find the most suitable programs.

The Council on Integrity in Results Reporting (CIRR) can help. By vetting data on bootcamp student outcomes and job placement rates, CIRR offers quality assurance to prospective students and employers. However, it’s up to bootcamp providers to report this data in the first place, which is an optional process.

Some bootcamps also confer industry-recognized cybersecurity certifications . You may look for online cybersecurity bootcamps that lead to CompTIA Security+ certification.

To find the right online cybersecurity bootcamp, you’ll first need to consider a few factors:

What Are Your Career Goals?

Think about what you want professionally and how a bootcamp might serve you. For example, if you want to get into cybersecurity as a beginner, you may look for a program that covers the fundamentals and helps you build practical experience and a portfolio. You might also prioritize programs that provide career support and mentorship.

If you already have experience, your ideal program might offer more advanced training or lead to a specific professional certification.

What’s Your Availability?

Bootcamps offer condensed training, but their curriculums can be intensive and time-consuming. If you work a full-time job or need a flexible study schedule, you should probably focus on part-time asynchronous or self-paced bootcamps. Enrolling part time will ultimately extend the length of your studies as well, which is worth considering.

What’s Your Budget?

Bootcamps are generally less expensive than traditional degrees, but many still come with a high price tag. Bootcamp costs fluctuate depending on the length of the program, the resources and facilities available and the provider’s reputation and stature.

Before settling on bootcamp, compare the program prices and what they have to offer. You should also look into their financing options and aid offerings.

Paying for a bootcamp is no small financial investment. Here’s how to fund your studies.

How Much Does an Online Cybersecurity Bootcamp Cost?

The cost of an online cybersecurity bootcamp depends on the program and the provider. According to our research, the median coding bootcamp cost is $9,500. Tuition prices for the programs on this list range between $8,500 and $16,900.

The cost of a bootcamp varies by provider depending on student resources, curriculum and faculty. Even your payment method can impact the total cost.

Upfront Payment

Nearly every bootcamp provider accepts upfront, lump-sum payments. In some cases, paying upfront for the entire bootcamp will get you a discount compared to other payment options.

Pay in Installments

Most bootcamps allow learners to pay in installments, such as monthly payments. The drawback to this option is usually a higher overall price than an upfront payment.

Income Share Agreement

Income share agreements (ISAs) allow you to enroll without paying upfront on the condition that you repay the provider with a percentage of your eventual salary after graduation. While this option may appeal to students who do not qualify for traditional loans, you should approach ISAs with caution.

At the end of the day, ISAs are loans, and they may impose penalties on you if you don’t follow the proper repayment plan. In the end, you could end up paying considerably more in tuition than you would with a standard loan.

Many bootcamps provide career assistance and boast job placement numbers, and some even offer tuition guarantees to students who fail to get a qualifying job after graduation. With these agreements, the bootcamp provider promises a tuition refund to any graduate who cannot secure a job within an agreed-upon time frame, such as six months.

When considering a bootcamp with a job guarantee , be sure to read the fine print. You may need to perform a series of tasks to qualify, or you may need to accept the first qualifying offer you get, regardless of its quality.

Loans, Scholarships and Other Aid

Since bootcamp students rarely have access to federal student aid, you’ll need to focus on other forms of aid, such as private loans and third-party scholarships. Many bootcamp providers maintain relationships with various lenders to make the loan process easier for students. You can also work out your own private loan.

Depending on your chosen bootcamp, you may qualify for scholarships based on merit or other factors. If you’re a military veteran, you may be able to use funding from the GI Bill® or the Veteran Employment Through Technology Education Courses (VET TEC) program for the bootcamp. Check with the Veterans Affairs website to see if you qualify.

Is a cybersecurity bootcamp worth it?

A cybersecurity bootcamp can prove valuable for many current and aspiring professionals. These accelerated programs offer practice-based, career-focused training to help learners enter the field for the first time or advance their existing cybersecurity careers . Our survey found that more than 89% of coding bootcamp graduates were satisfied with their learning experience, with around 80% seeing a salary increase as a result of their program.

What are the prerequisites for a cybersecurity bootcamp?

Most cybersecurity bootcamps do not require prior education or experience. However, many programs include prep coursework that students must complete prior to starting the actual classes.

Which cybersecurity bootcamp is best?

According to our methodology, Coding Temple offers the best online cybersecurity bootcamp on the market. But the best program for you depends on your budget, scheduling availability and career goals, among other factors.

Is a cybersecurity bootcamp enough to get a job?

Yes, an intensive bootcamp should equip you with the skills needed to land an entry-level job in cybersecurity . Some providers even offer job guarantees.

How much does a cybersecurity bootcamp cost?

Upfront tuition for the best online cybersecurity bootcamps on our list ranges from $8,500 to $16,900.

Doug Wintemute

For nearly a decade, Doug Wintemute has specialized in helping students and professionals make sound education and career decisions. In addition to Forbes Advisor, his work has been featured on many online publications, including ZDNet, Bankrate and NurseJournal.

  • Menu  Close 
  • Search 

Engineering a Safer School Environment

EP alumnus’s capstone project aims to revolutionize campus safety with smart technology integration.

  • Systems Engineering

Share Options

  • Share toTwitter
  • Share toFacebook
  • Share toLinkedIn

An AI rendering of a large academic building with various trust symbols around it, with the word "ProtectED." Insert: headshot photo of Dakota Robbins

In his job as a cyber engineer at Oasis Systems LLC in California, Dakota Robbins not only helps identify weaknesses in networks and computer systems but also creates and tests security measures to help organizations improve their defenses against real-world threats.

Drawing on his background in cybersecurity and bachelor’s degree in information systems technology, he developed ProtectEd as his capstone project for his master’s degree in Johns Hopkins Engineering for Professionals Systems Engineering program.

ProtectED, a comprehensive cybersecurity and safety system designed for educational institutions, safeguards against a wide range of threats, including active shooters, natural disasters, and other emergencies. ProtectED leverages a school’s existing security system, integrating smart devices and technologies to bolster campus safety and security.

“Most educational institutions lack a cybersecurity framework capable of offering physical protection for students, faculty, and infrastructure,” Robbins said. “ProtectED’s goal is to shield educational communities from diverse dangers, integrating into existing network infrastructures and notifying emergency services promptly and in detail.”

Based on systems engineering principles, ProtectED’s automated system is designed to interpret various data inputs—from sound decibel levels to weather conditions—and deliver vital information to stakeholders during critical situations.

“Decibel readers would be placed in classrooms and hallways to determine if a gun has been fired in a specified area via a decibel monitor. For example, if the volume of a classroom reaches a specified decibel level, then an alert would be sent to authorities and the IT team that a firearm has been potentially discharged. Weather stations that communicate that inclement weather is approaching the surrounding area alert ProtectED. These reports are then synchronized with the operation of other subsystems, like smart windows,” he said.

One of Robbins’ biggest challenges was figuring out exactly what the ProtectED system needed to do and how to incorporate those requirements into the system. After interviewing area directors and cybersecurity professionals about their needs and concerns, he translated them into requirements for ProtectED.

“As the system matured, I better understood what was necessary and how to integrate requirements that would capture these needs,” he said. “As I developed the conceptual design report, test plans, and system specification a-specs, the system began to build itself. Understanding this, I more easily grasped what needed to be removed or expanded on over the system’s lifecycle.”

He used systems modeling tools like Cameo to create detailed diagrams that explained the physical and data flow connections between subsystems, ensuring ProtectED’s robustness and reliability. The resulting system integrates into a school’s existing security system, leveraging various smart devices and technologies to enhance the overall safety and security of the campus.

Robbins says his EP coursework was “directly applicable to” his capstone project and that the program’s emphasis on real-world applications and problem-solving allowed him to seamlessly transfer knowledge from his classes to his final project.

“By completing this project, I am now considering pursuing full-scale development of ProtectED,” he said.

For Robbins, pursuing a master’s degree in systems engineering was a strategic decision.

“Given my schooling and career, it made sense to develop the ‘other half’ of my career field academically,” he explains.

He offers other students tackling a master’s degree this advice: “Understand the material and what the professors are asking for. The assignments may be vague intentionally, allowing you to figure out what is necessary to satisfy these needs through your research.”

TechRepublic

Account information.

capstone project in cybersecurity

Share with Your Friends

Security Experts Welcome NIST’s New Encryption Standards For Quantum Computers

Your email has been sent

Image of Esther Shein

The U.S. National Institute of Standards and Technology this week unveiled three encryption algorithms designed to resist cyberattacks, which industry observers said are a positive step toward preventing cyberattacks that break current encryption methods .

The Federal Information Processing Standard (FIPS) 203, 204, and 205 provide standards for general encryption and protecting digital signatures. They were derived from multiple submissions in NIST’s post-quantum cryptography standardization project.

Quantum computers are rapidly increasing the ability for high-performance computing, and the new standards are ready for immediate use, NIST said.

“Quantum computing technology could become a force for solving many of society’s most intractable problems, and the new standards represent NIST’s commitment to ensuring it will not simultaneously disrupt our security,” said Under Secretary of Commerce for Standards and Technology and NIST Director Laurie E. Locascio, in a statement . “These finalized standards are the capstone of NIST’s efforts to safeguard our confidential electronic information.”

Today’s RSA encryption won’t suffice

Although the IEEE pointed out that large-scale quantum computers likely won’t be built for another 10 years, NIST is concerned about PQC because almost all data on the internet is protected with the RSA encryption scheme. Once large quantum computers are built, they would be able to undermine the security of the entire internet, the IEEE said.

Devices using RSA security, such as cars and IoT devices, will remain in effect for at least another decade, the IEEE said, so they need to be equipped with quantum-safe cryptography before they are used.

Another reason the new standards are needed is the “harvest now, decrypt later” strategy, where a threat actor potentially downloads and stores encrypted data today with plans to decrypt it once a quantum computer goes online, the IEEE noted.

The standards — which contain the encryption algorithms’ computer code, instructions for how to implement them, and their intended uses — took eight years to develop, NIST said. The agency added that it cast a wide net among the world’s cryptography experts to conceive, submit, and then evaluate cryptographic algorithms that could resist the assault of quantum computers.

Although the nascent technology could change the nature of industries spanning weather forecasting to fundamental physics to drug design, it poses threats as well.

‘A pivotal moment in our cybersecurity landscape’

These new algorithms are the first of many NIST will provide over the coming years, said Aaron Kemp, director of advisory technology risk at KPMG.

“The threat of quantum computing against current cryptographic standards cannot be understated,” he said. “And these algorithms provide the first step towards a new era of cryptographic agility.”

Organizations that have been waiting to begin their post-quantum cryptographic migration now have a set of standards to integrate into their systems, Kemp added.

“The federal government has mandated adoption of these standards by 2035 for federal entities, and businesses working with the government will need to follow suit,’’ he noted. “This is the first step in the largest cryptographic migration in history.”

Tom Patterson, emerging technology security lead at Accenture, characterized the new global encryption standards for quantum as “a pivotal moment in our cybersecurity landscape.”

Quantum computers present a significant risk to our current encryption methods, Patterson said.

Consequently, “Organizations must assess their quantum risk, discover vulnerable encryption within their systems, and develop a resilient cryptographic architecture now,” he explained, adding that the new standards will help organizations maintain their cyber resilience in the post-quantum world.

While today’s quantum computers are small and experimental, they are rapidly becoming more capable, “and it is only a matter of time before cryptographically-relevant quantum computers (CRQCs) arrive,’’ observed Tim Hollebeek, industry and standards technical strategist at DigiCert.

“These are quantum computers that are powerful enough to break the asymmetric cryptography used to protect communications and devices on the internet — and they could arrive in as little as five to 10 years.”

Hollebeek added: “The good news is that the problem can be solved by switching to new hard math problems that are not vulnerable to quantum computers, and the new NIST standards describe in precise detail exactly how to use these new hard math problems to protect internet traffic in the future.”

Colin Soutar, US and global quantum cyber readiness leader at Deloitte, called the new NIST standards “a great accomplishment.” But he noted that the key question around quantum cyber readiness is not so much when a CRQC will exist but whether there is a probability of one existing in the next five to 10 years.

In that case, organizations need to understand what their exposure will be from future CRQCs and ask themselves how long it will take to update their public key cryptography for data confidentiality and integrity, he said.

“We welcome the broader awareness that the NIST standards evoke in many industries—and hope that these upgrades are done in a voluntary risk-management based process,” Soutar said.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

  • The Top 4 CrowdStrike Alternatives & Competitors in 2024
  • CrowdStrike: Buggy Validator Started Massive Outage
  • 5 Best Endpoint Detection & Response (EDR) Solutions for 2024
  • What Is Cloud Penetration Testing & Why Is It Important?
  • Cybersecurity: More Must-Read Coverage

Image of Esther Shein

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

* - indicates required fields

Sign in to TechRepublic

Lost your password? Request a new password

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support .

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

Want to receive more TechRepublic news?

You're all set.

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add [email protected] to your contacts list.

  • Wednesday, August 21, 2024

businessday logo

© 2023 - Businessday NG. All Rights Reserved.

  • UC Berkeley
  • Sign Up to Volunteer
  • I School Slack
  • Alumni News
  • Alumni Events
  • Alumni Accounts
  • Career Support
  • Academic Mission
  • Diversity & Inclusion Resources
  • DEIBJ Leadership
  • Featured Faculty
  • Featured Alumni
  • Work at the I School
  • Subscribe to Email Announcements
  • Logos & Style Guide
  • Directions & Parking

The School of Information is UC Berkeley’s newest professional school. Located in the center of campus, the I School is a graduate research and education community committed to expanding access to information and to improving its usability, reliability, and credibility while preserving security and privacy.

  • Career Outcomes
  • Degree Requirements
  • Paths Through the MIMS Degree
  • Final Project
  • Funding Your Education
  • Admissions Events
  • Request Information
  • Capstone Project
  • Jack Larson Data for Good Fellowship
  • Tuition & Fees
  • Women in MIDS
  • MIDS Curriculum News
  • MICS Student News
  • Dissertations
  • Applied Data Science Certificate
  • ICTD Certificate
  • Cybersecurity Clinic

The School of Information offers four degrees:

The Master of Information Management and Systems (MIMS) program educates information professionals to provide leadership for an information-driven world.

The Master of Information and Data Science (MIDS) is an online degree preparing data science professionals to solve real-world problems. The 5th Year MIDS program is a streamlined path to a MIDS degree for Cal undergraduates.

The Master of Information and Cybersecurity (MICS) is an online degree preparing cybersecurity leaders for complex cybersecurity challenges.

Our Ph.D. in Information Science is a research program for next-generation scholars of the information age.

  • Fall 2024 Course Schedule
  • Summer 2024 Course Schedule

The School of Information's courses bridge the disciplines of information and computer science, design, social sciences, management, law, and policy. We welcome interest in our graduate-level Information classes from current UC Berkeley graduate and undergraduate students and community members.  More information about signing up for classes.

  • Ladder & Adjunct Faculty
  • MIMS Students
  • MIDS Students
  • 5th Year MIDS Students
  • MICS Students
  • Ph.D. Students

capstone project in cybersecurity

  • Publications
  • Centers & Labs
  • Computer-mediated Communication
  • Data Science
  • Entrepreneurship
  • Human-computer Interaction (HCI)
  • Information Economics
  • Information Organization
  • Information Policy
  • Information Retrieval & Search
  • Information Visualization
  • Social & Cultural Studies
  • Technology for Developing Regions
  • User Experience Research

Research by faculty members and doctoral students keeps the I School on the vanguard of contemporary information needs and solutions.

The I School is also home to several active centers and labs, including the Center for Long-Term Cybersecurity (CLTC) , the Center for Technology, Society & Policy , and the BioSENSE Lab .

  • Why Hire I School?
  • Request a Resume Book
  • For Nonprofit and Government Employers
  • Leadership Development Program
  • Mailing List
  • Jobscan & Applicant Tracking Systems
  • Resume & LinkedIn Review

I School graduate students and alumni have expertise in data science, user experience design & research, product management, engineering, information policy, cybersecurity, and more — learn more about hiring I School students and alumni .

  • Press Coverage
  • I School Voices

images of Eric Meyer smiling with arms crossed wearing a yellow tie

  • Distinguished Lecture Series
  • I School Lectures
  • Information Access Seminars
  • CLTC Events
  • Women in MIDS Events

14870795610_1bc2dae00d_o.jpg

Cybersecurity Spring 2021 Capstone Project Showcase

Capstone projects are the culmination of the MICS students’ work in the School of Information’s Master of Information and Cybersecurity program.

Over the course of their final semester, teams of students propose and select project ideas, conduct and communicate their work, receive and provide feedback, and deliver compelling presentations along with a web-based final deliverable. A panel of judges will select an outstanding project for the Lily L. Chang MICS Capstone Award .

Join us for an online presentation of these capstone projects. Each team will present for twenty minutes, including Q&A.

Join the online showcase

If this is your first time using Zoom, please allow a few extra minutes to download and install the browser plugin or mobile app.

capstone project in cybersecurity

Danielle Desalu is an experienced security professional with experience in customer-facing sales, delivery and product management roles. Currently, Danielle is the director of customer experience product management security where she leads the global development of security service offers and customer success programs. she plays a key role in supporting a growth area of Cisco’s business transformation from hardware to software and recurring revenue streams. Formerly she served as the global security services practice manager at Cisco where she led delivery in the creation, deployment and migration of security services for enterprise customers. As a trusted advisor, Danielle has successfully led customers through development of security strategies that include risk management, technology enablement, governance and compliance, resulting in an increased security posture for their organizations.

Danielle is a 20+ year Cisco veteran with a demonstrated track record of building strong technical teams to drive customer engagements, architect solutions and grow customer revenues. Formerly as a security engagement manager in the threat response, intelligence and development organization at Cisco she was responsible for leading teams through the strategy and implementation of security requirements that were built into the development lifecycle of Cisco products.  

Outside of the office, Danielle has a strong passion for inspiring young girls to pursue careers in science, technology, engineering and math (STEM). She is a Girls Scout troop leader and a Junior First Lego League (Jr. FLL) co-facilitator where she works to expose elementary and middle school girls to exciting careers with engineering and science. danielle also serves on the board of trustees at the Highland School in Warrenton, VA.

Danielle holds a bachelor’s and master’s degree in computer and systems engineering from Rensselaer and has several career certifications including (Certified Information Systems Security Professional (CISSP) and Cisco Certified Network Professional (CCNP). She has received the National Women of Color STEM Rising Star Award, the Modern Day Technology Leader Award of Black Engineer of the Year Conference and was awarded the 2018 ITSMF Mentor of the Year award. She is a graduate of Cisco’s SE Transitions & Leadership Development Program, ITSMF’s Executive Protégé Program and ITSMF’s Executive Academy Program-2020 cohort.

capstone project in cybersecurity

Aaron Hughes is group vice president and CISO at Albertsons Companies. In this role he is responsible for enabling the business and securing the infrastructure, digital assets, and payments for a network of over 2200 supermarkets operating under 20 brands across the United States serving 30 million customers per week and driving $60B in annual revenue. Previously he was vice president for information security and deputy CISO at Capital One where he led the team providing security services across all of the Capital One lines of business to include card, financial services, commercial and retail banking as well enterprise IT, digital products, and data initiatives. Mr. Hughes is also the former deputy assistant secretary of defense for cyber policy where, as the senior DoD cybersecurity official, he was the primary interface with the broader US government, Congress, the public, and foreign governments for all defense related cyber policy matters. His office was responsible for overseeing the development and implementation of cyber policies, strategies, operations, and plans for the Department of Defense.

Prior to his appointment with the Department of Defense, Mr. Hughes was the vice president of intelligence community support at the strategic investment firm In-Q-Tel. In this role, he led the company’s engagement with the intelligence community and assisted in the prioritization of investment decisions and technology identification for In-Q-Tel’s partners.

In addition to his full-time employment, Mr. Hughes is a colonel in the United States Air Force Reserve currently serving as a senior advisor to the commander of USCYBERCOM.

He is active in leading diversity & inclusion initiatives having served as the accountable executive at Capital One for the black in tech business resource group, focusing on enhancing the development, recruitment, and advocacy for black associates in the technology organization. Aaron is a frequent contributor and speaker in a variety of forums focused on national security, cyber, and diversity/inclusion/belonging. He received his BS in mechanical engineering from the University of Virginia, MS in telecommunications and computers from George Washington University, and MBA from the Stanford Graduate School of Business.

capstone project in cybersecurity

Rich Mason is a 20+ year veteran of technology titans such as AT&T, Lucent Technologies’ Bell Labs, and Honeywell International and possesses deep expertise in the fields of cybersecurity, physical security, and enterprise resilience. His last corporate post was as Honeywell’s global vice president and chief security officer (CSO). Prior to that, he held the role of enterprise chief information security officer (CISO). Honeywell is a Fortune 100 conglomerate with a market cap in excess of $140B and supporting over 110,000 employees in 120 countries. Honeywell Global Security, a converged unit within Honeywell that provided cyber, physical, product, and classified security services, achieved a number 1 global ranking in the industrial and manufacturing sector during his tenure (Security Magazine, Security 500 Report).

A graduate of Honeywell’s elite Executive Development Program, Rich now leads a private practice based in Virginia, where he combines this unique experience, a Honeywell Operating System (HOS) and Six Sigma mindset, and a relentless focus on innovation and security as business enablers. His evidence-led approach enables startups, venture capital firms and corporate boards to challenge assumptions, positively disrupt markets and digitally transform businesses.

Mason is a former member of the Secret Service’s New York Electronic Crimes Task Force, a graduate of the FBI’s Executive Academy, and a retired member of the FBI’s National Security Business Alliance Council (NSBAC) and Domestic Security Alliance Council (DSAC).

Mason received his criminal justice bachelor’s degree with honor from Michigan State University with a specialization in security management. He continues to support his alma mater through his active role in MSU’s Axia Institute, focusing on supply chain security innovation and value-chain optimization.

More information

Spring 2021 MICS Project Descriptions

Judging Guidelines

If you have questions about this event, please contact the Student Affairs team at [email protected] .

capstone project in cybersecurity

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards

NIST Releases First 3 Finalized Post-Quantum Encryption Standards

  • NIST has released a final set of encryption tools designed to withstand the attack of a quantum computer.
  • These post-quantum encryption standards secure a wide range of electronic information, from confidential email messages to e-commerce transactions that propel the modern economy.
  • NIST is encouraging computer system administrators to begin transitioning to the new standards as soon as possible.

Collage illustration of servers, laptops and phones is divided into left "Old Encryption Standards" and right "New Encryption Standards."

GAITHERSBURG, Md. — The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer. 

Researchers around the world are racing to build quantum computers that would operate in radically different ways from ordinary computers and could break the current encryption that provides security and privacy for just about everything we do online.  The algorithms announced today are specified in the first completed standards from NIST’s  post-quantum cryptography (PQC) standardization project , and are ready for immediate use.

The three new standards are built for the future. Quantum computing technology is developing rapidly, and some experts predict that a device with the capability to break current encryption methods could appear  within a decade , threatening the security and privacy of individuals, organizations and entire nations. 

Want to learn more about post-quantum cryptography? Check out our explainer.  

“The advancement of quantum computing plays an essential role in reaffirming America’s status as a global technological powerhouse and driving the future of our economic security,” said Deputy Secretary of Commerce Don Graves.   “Commerce bureaus are doing their part to ensure U.S. competitiveness in quantum, including the National Institute of Standards and Technology, which is at the forefront of this whole-of-government effort. NIST is providing invaluable expertise to develop innovative solutions to our quantum challenges, including security measures like post-quantum cryptography that organizations can start to implement to secure our post-quantum future. As this decade-long endeavor continues, we look forward to continuing Commerce’s legacy of leadership in this vital space.”

The standards — containing the encryption algorithms’ computer code, instructions for how to implement them, and their intended uses — are  the result of an eight-year effort managed by NIST, which has a long history of developing encryption. The agency has rallied the world’s cryptography experts to conceive, submit and then evaluate cryptographic algorithms that could resist the assault of quantum computers. The nascent technology could revolutionize fields from weather forecasting to fundamental physics to drug design, but it carries threats as well. 

“Quantum computing technology could become a force for solving many of society’s most intractable problems, and the new standards represent NIST’s commitment to ensuring it will not simultaneously disrupt our security,” said Under Secretary of Commerce for Standards and Technology and NIST Director Laurie E. Locascio . “These finalized standards are the capstone of NIST’s efforts to safeguard our confidential electronic information.”

The Journey Toward Quantum Resistant Algorithms: NIST's Initiative

Encryption carries a heavy load in modern digitized society. It protects countless electronic secrets, such as the contents of email messages, medical records and photo libraries, as well as information vital to national security. Encrypted data can be sent across public computer networks because it is unreadable to all but its sender and intended recipient. 

Encryption tools rely on complex math problems that conventional computers find difficult or impossible to solve. A sufficiently capable quantum computer, though, would be able to sift through a vast number of potential solutions to these problems very quickly, thereby defeating current encryption. The algorithms NIST has standardized are based on different math problems that would stymie both conventional and quantum computers.

“These finalized standards include instructions for incorporating them into products and encryption systems,” said NIST mathematician Dustin Moody, who heads the PQC standardization project. “We encourage system administrators to start integrating them into their systems immediately, because full integration will take time.”

Moody said that these standards are the primary tools for general encryption and protecting digital signatures. 

NIST also continues to evaluate two other sets of algorithms that could one day serve as backup standards. 

One of these sets consists of three algorithms designed for general encryption but based on a different type of math problem than the general-purpose algorithm in the finalized standards. NIST plans to announce its selection of one or two of these algorithms by the end of 2024.

The second set includes a larger group of algorithms designed for digital signatures.  In order to accommodate any ideas that cryptographers may have had since the initial 2016 call for submissions , NIST asked the public for additional algorithms in 2022 and has begun a process of evaluating them. In the near future, NIST expects to announce about 15 algorithms from this group that will proceed to the next round of testing, evaluation and analysis. 

While analysis of these two additional sets of algorithms will continue, Moody said that any subsequent PQC standards will function as backups to the three that NIST announced today. 

“There is no need to wait for future standards,” he said. “Go ahead and start using these three. We need to be prepared in case of an attack that defeats the algorithms in these three standards, and we will continue working on backup plans to keep our data safe. But for most applications, these new standards are the main event.” 

More Details on the New Standards

Encryption uses math to protect sensitive electronic information, including secure websites and emails. Widely used  public-key encryption systems , which rely on math problems that computers find intractable, ensure that these websites and messages are inaccessible to unwelcome third parties. Before making the selections, NIST considered not only the security of the algorithms’ underlying math, but also the best applications for them. 

The new standards are designed for two essential tasks for which encryption is typically used: general encryption, used to protect information exchanged across a public network; and digital signatures, used for identity authentication. NIST  announced its selection of four algorithms — CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+ and FALCON — slated for standardization in 2022 and  released draft versions of three of these standards in 2023. The fourth draft standard based on FALCON is planned for late 2024.  

While there have been no substantive changes made to the standards since the draft versions, NIST has changed the algorithms’ names to specify the versions that appear in the three finalized standards, which are: 

  • Federal Information Processing Standard (FIPS) 203 , intended as the primary standard for general encryption. Among its advantages are comparatively small encryption keys that two parties can exchange easily, as well as its speed of operation. The standard is based on the  CRYSTALS-Kyber algorithm, which has been renamed ML-KEM, short for Module-Lattice-Based Key-Encapsulation Mechanism.
  • FIPS 204 , intended as the primary standard for protecting digital signatures. The standard uses the  CRYSTALS-Dilithium algorithm, which has been renamed ML-DSA, short for Module-Lattice-Based Digital Signature Algorithm.
  • FIPS 205 , also designed for digital signatures. The standard employs the  Sphincs+ algorithm, which has been renamed SLH-DSA, short for Stateless Hash-Based Digital Signature Algorithm. The standard is based on a different math approach than ML-DSA, and it is intended as a backup method in case ML-DSA proves vulnerable.

Similarly, when the draft FIPS 206 standard built around FALCON is released, the algorithm will be dubbed FN-DSA, short for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm. 

capstone project in cybersecurity

  • Air Warfare
  • Land Warfare
  • Naval Warfare
  • Networks / Cyber
  • Multi-Domain
  • Indo-Pacific
  • All Domain: Connecting the Joint Force
  • Defense Budget Coverage
  • Advanced Weapons Technology
  • Air Dominance
  • Newsletters
  • Newsletter Signup
  • Resource Library

Long Range Discrimination Radar (LRDR)

After delay, Missile Defense Agency plans to conduct critical test for new long-range radar next year

MY_01430

NATO activates first small C-UAS contract as allies target drone proliferation threat

240819_x56_drone_NASA

Istari unveils Lockheed partnership in hopes of digitally certifying aircraft

Global Autonomous Reconnaissance Crafts Operate off of Coronado Ahead of Unmanned Surface Vessel Squadron 3 Standup Ceremony

EXCLUSIVE: Pentagon reveals 5 more funded RDER projects, including a top Marine priority

Sol22-095-022.jpg.iCfyg_XMMWATAA.r_lB-1906y

South Korea cleared to buy ‘up to’ 36 new Apache AH-64E helicopters

GHWB Operates the MQ-25 Aircraft

Navy finishes first control room on aircraft carrier designed to operate MQ-25

Japan Coast Guard MQ-9B SeaGuardian by General Atomics

Japan inks deal on 2 General Atomics SeaGuardian surveillance drones

Last Harrier flight

From jump jets to satellites, Iran’s nominee for defense minister outlines ambitious wishlist

Balikatan 23 | Coastal Air Defense

US clears potential $5B Patriot missile sale for Germany, $738M in Reaper drones for Italy

Poland AH-64 08e5

A ‘breakthrough’ moment for Polish military aviation as Apache deal is signed

launched effects

Army plans for Black Hawk to be Future Vertical Lift testbed for launched effects and autonomy

FARP crew in Iraq is the 'NASCAR pit crew of aviation'

Iraq boosts helicopter fleet ahead of pending US troops withdrawal

53922043471_de007b85b7_k

Estonia and Helsing strike AI technologies agreement

Defense Industry Fair in Iran

Iran shows off drones at Russian defense expo

F-15EX Visit

State clears potential $20B in weapon sales to Israel, including new F-15s

Defense industry news, analysis and commentary.

  • Special Features

Breaking Defense In your inbox

Want the latest defense industry news? Sign up for the Breaking Defense newsletter.

  • Air Warfare , All Domain , Naval Warfare , Networks & Digital Warfare , Pentagon

The Rapid Defense Experimentation Reserve, brainchild of Pentagon CTO Heidi Shyu, has funded low-profile but high-value niche technologies the services couldn’t or wouldn’t, from robot boats to a multi-domain targeting node.

Global Autonomous Reconnaissance Crafts Operate off of Coronado Ahead of Unmanned Surface Vessel Squadron 3 Standup Ceremony

Global Autonomous Reconnaissance Craft (GARC) from Unmanned Surface Vessel Squadron 3 (USVRON 3) operate remotely in San Diego Bay ahead of the unit’s establishment ceremony. (U.S. Navy photo by Mass Communication Specialist 1st Class Claire M. DuBois)

WASHINGTON — The Pentagon’s  Rapid Defense Experimentation Reserve has successfully transitioned at least seven technology projects to the services so far, from high-altitude balloons to underwater communications, including five that were not previously linked to the high-speed acquisition effort.

The Pentagon’s R&D chief Heidi Shyu had already claimed two programs in an interview with Breaking Defense, but new details provided by program officials about five others indicate that a top focus for RDER is squarely on surveillance and communications, the eyes and ears of the joint force. Three of the projects focus on “enhancements” to comms, sensors, and other technical abilities aboard platforms developed by other programs: unmanned speedboats, 4th generation fighters, and the MQ-9 Reaper. Four develop new systems: surveillance balloons, underwater communications, and two types of targeting node.

Such high-tech but low-profile projects create crucial connective tissue, especially as the military tries to link its disparate forces into the nascent global battle network known as CJADC2 .

But these niche capabilities are also all too often overshadowed in service budgets by big-ticket weapons systems like stealth jets or manned warships. In fact, one of the programs, a sensor-fusion system called the Maritime Targeting Cell, was number one on the Navy/Marine Corps Unfunded Priorities list before RDER came to the rescue.

“We’re doing things because the services are not,” Pentagon CTO Heidi Shyu told Breaking Defense in a recent interview defending RDER from critics.

RDER casts a wide net for “things” to do, then winnows them down ruthlessly through a multi-stage series of field tests and high-level reviews. The initial round looked at over 200 proposed projects; 32 of those — less than one in six — were selected for further investigation, of which 23 were funded for field-testing, according to Shyu’s office. Of those 23, just nine so thoroughly proved their technical maturity and military utility that they “transitioned” from RDER to the armed services for further development and production. Five of the nine are already funded in the services’ 2025 budget requests.

But RDER doesn’t stop there. Another 11 of the most promising first-round projects are still under consideration by Pentagon leaders. Meanwhile, a second round is now underway with 51 projects selected and 25 funded for field testing, officials in Shyu’s office said. Future rounds are envisioned to follow in overlapping two-year cycles, with a new RDER round starting even as the previous one wraps up.

RDER data

Breaking Defense graphic from DoD data. OSD: Office of the Secretary of Defense. DMAG: Deputy’s Management Action Group.

7 RDERs We Know About

Of the nine total technologies to graduate RDER and transition to the services so far, two are too highly classified to discuss, Shyu told Breaking Defense in a recent interview . But she and other officials have made information available on the other seven.

Two have been previously reported:

High-Altitude Balloons (HAB). Similar to those used by Chinese spy agencies over the US last year , these balloons are intended to carry surveillance gear and/or communications relays high into the air, above the reach of conventional anti-aircraft weapons. “None of the services wanted to develop this capability, so it’s a gap,” Shyu told Breaking Defense . “But once we developed the capability and tested it, both the Air Force and the Army said, ‘Hey, we want this.’”

Family of Integrated Targeting Cells (FITC). This is a “capstone research and development project” [ PDF ] for the Marine Corps’ modernization drive, Force Design 2030 . It’s intended to combine traditionally distinct staff functions – specifically “operations, intelligence, and fires” – in a single command center, improving coordination of long-range firepower not just for the Marines but across the services. In a recent speech, Deputy Secretary Kathleen Hicks highlighted FITC as one of RDER’s successes, saying it “was accelerated by five years.”

Five others were recently disclosed by Pentagon officials who spoke to Breaking Defense:

Global Autonomous Reconnaissance Craft (GARC). This is a small unmanned speedboat, about 16 feet long, now in service with a Navy Unmanned Surface Vessel Squadron out of Coronado, Calif. Shyu’s staff describes GARC a “low-cost, attritable platform” that can be configured for a wide variety of missions, such as intelligence, electronic warfare, and communications. RDER helped get GARC funding from another DoD initiative known as APFIT ( Accelerate the Procurement and Fielding of Innovative Technologies ), “accelerating production and fielding of initial units by at least two years,” one official said. (Shyu did previously mention the GARC in Congressional testimony in February [ PDF ].)

MQ-9 enhancements. These are upgrades for the venerable and widely deployed Reaper drone , specifically improved communications and sensing to meet “unique USMC [United States Marine Corps] needs.” Shyu’s staff said RDER helped fund prototype development, integration, and experimentation, which “accelerated capability fielding by approximately two years.”

Global Thunder . Not related to the nuclear exercise of the same name, this Global Thunder provides “enhancements” to improve “communications resilience” on 4th generation fighters. (While Shyu’s staff didn’t specify which 4th gen jets, the Air Force F-15 and F-16 and the Navy/Marine Corps F-18 are the most numerous models). RDER helped fund development and provided venues for experimentation and assessment.

Octopus . This is a Navy system for “underwater communications.” (It’s not clear if this would be for Navy divers, submarines, unmanned submersibles, or all of the above). RDER helped fund technology integration and provided venues for experimentation and assessment.

Maritime Targeting Cell – Afloat . RDER improved “communications resilience” and “accelerated fielding” for MTC, a Marine Corps project for “multi-domain fusion of national, theater, and tactical sensors.”

For the final item, what that description means, and what it matters for the Pentagon’s high-priority CJADC2 project, makes MTC a revealing case study of the gaps that RDER is trying to fill.

In March 2023, the then-Chief of Naval Operations, Adm. Mike Gilday , officially submitted his unfunded priorities  [ PDF ] to Congress, listing the most important programs the Navy and Marine Corps hadn’t found space for in their submitted budgets. At the top: a $45.3 million ask — modest by Pentagon standards — for the Maritime Targeting Cell.

Built by Northrop Grumman , MTC is a high-tech “fusion” node, meant to pull in data from satellites and a host of other sensors for frontline Marine Corps forces, both ashore and afloat. Budget documents say it supports a trio of major modernization initiatives: the Marines’ Force Design 2030 (alongside the Family of Integrated Targeting Cells), the Navy’s Project Overmatch , and the all-service CJADC2 , which intends to link “every sensor [and] every shooter” in the US military into a lethally well-coordinated “kill web,” particularly to protect the West Pacific.

Such projects are, in theory, top priorities. In practice, though, they often fall between the cracks of service budgets consumed by big bills for procuring and maintaining marquee weapons.

But, luckily for the Marines and the MTC program, something else happened in 2023: RDER’s congressional funding finally came through, two years after the initiative was originally proposed .

“Remember I came here in ’21,” Shyu told reporters at last week’s NDIA Emerging Technologies conference . “We proposed all of this in ’21, got the budget in ’23 – because POM [the budgetary Program Objecive Memorandum ] is a two-year process, I can’t short-change that ….But we plan everything out of ahead of time, we worked very closely with combatant commanders and the Joint Staff, [so we can] sprint it.”

“The stuff we’re developing will provide resilient communications in a highly contested fight — and other capabilities I can’t talk about,” she said, with a laugh.

Latest from Breaking Defense

Post-Revolt Tunisia Can Alter E-Mail With Big Brother Software

US approves $110 million deal for patrol boats for Tunisia

Austal photo

In expansion, Austal USA undergoes ‘unique evolution’ beyond a two-trick shipbuilder

Philippines Undertakes Supply Mission To Ayungin Shoal

After ship collisions, experts say China testing Philippine resolve, US ties

DISA AI Hearing at HASC

Skinner: DISA hitting ‘the accelerator’ on DODNET, setting lofty user goal

GHWB Operates the MQ-25 Aircraft

Sign up and get Breaking Defense news in your inbox.

  • Advertising & Marketing Solutions
  • Breaking Defense
  • Breaking Energy
  • Breaking Gov
  • Above the Law
  • Dealbreaker
  • MedCity News

Copyright © 2024 Breaking Media, Inc. All rights reserved. Registration or use of this site constitutes acceptance of our Terms of Service and Privacy Policy .

Privacy Center | Do not sell my information

Friend's Email Address

Your Email Address

COMMENTS

  1. Top 131+ Impressive Cybersecurity Capstone Project Ideas

    A capstone project in cybersecurity is a culminating project or experience typically undertaken by students in a cybersecurity program or related field towards the end of their studies. It is designed to apply the knowledge and skills gained throughout the program to address real-world cybersecurity challenges or problems. The main objectives ...

  2. cybersecurity capstone project ideas

    6 Cybersecurity Capstone Project Ideas. Cyber security projects may well be the X factor that helps you land a great first job when you enter the job market after college. Therefore, regardless of whether you're planning to venture into a career in network security, information technology, a cybersecurity specialization, etc., it is always a ...

  3. 220+ Cybersecurity Capstone Project Ideas

    Twenty Cybersecurity Capstone Project topics to write about. 1. Developing a cybersecurity plan for a small business. 2. Creating a cybersecurity awareness campaign for a school or other organization. 3.Designing a secure network for a company or other organization. 4.

  4. Cyber Security Projects to Grow Your Skills & Portfolio

    What Is a Capstone Cybersecurity Project? To graduate from Springboard's Cybersecurity Career Track bootcamp, students must complete a final capstone project under the guidance of an expert mentor. For their capstone project, students work on a hypothetical penetration test and create a corrective action plan for a given problem statement. ...

  5. Advanced Cybersecurity Concepts and Capstone Project

    This capstone project integrates the knowledge you'll have gained from the previous courses into a standalone portfolio piece, demonstrating your new cybersecurity skills. The course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.

  6. Cybersecurity Capstone Project

    This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please note that sessions of this Cybersecurity Capstone Project only run 3-4 times a year, depending on ...

  7. What are some examples of cybersecurity capstone projects?

    Ritchie School of Engineering and Computer Science professor Nate Evans discusses the types of capstone courses students complete as part of their studies in...

  8. Cybersecurity Capstone Project

    A Note on Capstone Frequency: Please note that sessions of this Cybersecurity Capstone Project only run 3-4 times a year, depending on course team availability and learner interest. Please keep this in mind as you enroll into the Capstone program. While you will still be able to access certain elements of the course between sessions, you will ...

  9. Advanced Cybersecurity Concepts and Capstone Project

    This capstone project integrates the knowledge you'll have gained from the previous courses into a standalone portfolio piece, demonstrating your new cybersecurity skills. The course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.

  10. Capstone Project in Cybersecurity

    Capstone Project in Cybersecurity - 695.795. This course permits graduate students in cybersecurity to work with other students and a faculty mentor to explore a topic in depth and apply principles and skills learned in the formal cybersecurity courses to a real world problem. Students will work in self-organized groups of two to five students ...

  11. Cyber Security Bootcamp

    Cyber Engineer. Average Salary: $116,497*. Cyber Engineers, sometimes called Information Security Engineers, identify threats and vulnerabilities, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime. * ZipRecruiter (September 2023)

  12. MICS Capstone Projects

    During the final semester of the I School's Master of Information and Cybersecurity program, students undertake semester-long capstone projects which cement skills learned throughout the MICS program — core cybersecurity technical skills, understanding of the societal factors that impact the cybersecurity domain and how cybersecurity issues impact humans, and professional skills such as ...

  13. Cybersecurity Summer 2023 Capstone Project Showcase

    Cybersecurity Summer 2023 Capstone Project Showcase. 2023-08-09T16:00:00 - 2023-08-09T18:30:00. Wednesday, August 9, 2023. 4:00 pm - 6:30 pm PDT. Online. Capstone projects are the culmination of the MICS students' work in the School of Information's Master of Information and Cybersecurity program. Over the course of their final semester ...

  14. Cybersecurity Capstone

    Capstone Course 3 Units In the MICS capstone class, students use the full range of cybersecurity skills, techniques, and concepts gained throughout the program to design and execute a semester-long team project. Student teams propose a complex cybersecurity project to which they can apply multi-faceted research, analysis, and problem-solving. Projects typically focus on real-world issues ...

  15. Cybersecurity Fall 2022 Capstone Project Showcase

    Capstone projects are the culmination of the MICS students' work in the School of Information's Master of Information and Cybersecurity program. Over the course of their final semester, teams of students propose and select project ideas, conduct and communicate their work, receive and provide feedback, and deliver compelling presentations ...

  16. Cybersecurity Capstone. Throughout the Flatiron cybersecurity…

    Cybersecurity Capstone. Throughout the Flatiron cyber security analytics bootcamp we learned many important pieces of the cyber security world in our GRC, Network, Systems, Hunt, SIEM, Strategy, and Threat courses. The knowledge we gained from these courses culminated in our Capstone project. The premise of the Capstone was that a fictitious ...

  17. Cybersecurity Capstone Project

    The Cybersecurity Capstone project unit provides an opportunity for high-achieving students (WAM of 75+) to carry out an individual defined piece of work with academics of our school. The students will acquire skills including the capacity to define a project, show how it relates to existing work, and carry out the project in a systematic ...

  18. Microsoft Cybersecurity Analyst Professional Certificate

    The projects will include practicing on: A real-world scenario focused on penetration testing, building configuration, and testing strategy for white box testing of a penetration test on virtual networks. A real-world capstone project that enables you to demonstrate your cybersecurity analyst skills.

  19. Best Online Cybersecurity Bootcamps Of 2024

    Check out our list of the top online cybersecurity bootcamps and get started finding the right one for you. ... The beginner-friendly program features 50 labs and an applied capstone project, plus ...

  20. Engineering a Safer School Environment

    Drawing on his background in cybersecurity and bachelor's degree in information systems technology, he developed ProtectEd as his capstone project for his master's degree in Johns Hopkins Engineering for Professionals Systems Engineering program. ... Robbins says his EP coursework was "directly applicable to" his capstone project and ...

  21. Cyber Security Full Course

    🔥Post Graduate Program In Cyber Security: https://www.simplilearn.com/pgp-cyber-security-certification-training-course?utm_campaign=16AugCyberFC&utm_medium=...

  22. Spring 2024 Capstone Projects

    Some of our spring 2024 company sponsors for capstone projects included: The U.S. Army Combat Capabilities Development Command - BRL-CAD ... everyday applications. In doing so, we need to also know how this will affect our network performance. Research area: Cybersecurity. Recent Capstone Design Projects; Fall 2022 Capstone Projects; Spring ...

  23. Cybersecurity Fall 2021 Capstone Project Showcase

    Wednesday, December 8, 2021. 4:00 pm - 6:00 pm PST. Capstone projects are the culmination of the MICS students' work in the School of Information's Master of Information and Cybersecurity program. Over the course of their final semester, teams of students propose and select project ideas, conduct and communicate their work, receive and ...

  24. PDF www.heinz.cmu.edu

    www.heinz.cmu.edu

  25. NIST's New Post-Quantum Cryptography Standards Announced

    'A pivotal moment in our cybersecurity landscape' These new algorithms are the first of many NIST will provide over the coming years, said Aaron Kemp, director of advisory technology risk at KPMG.

  26. The Business of Cybersecurity Capstone

    The Business of Cybersecurity Capstone. This course is part of Cybersecurity: Developing a Program for Your Business Specialization. Instructors: Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP. +4 more. Enroll for Free. Starts Aug 19. Financial aid available. 4,366 already enrolled.

  27. FG, partners upskills 400 Nigerians on AI, Cybersecurity

    According to the organisers, these participants are currently completing their capstone projects and preparing for their certification exams. Representing the Minister of Education and National Project Coordinator, Ndem Ndiyo, consultant for the Innovation Grant Facility, said it was imperative to develop skills for the youth in the country to ...

  28. Cybersecurity Spring 2021 Capstone Project Showcase

    Wednesday, April 14, 2021. 4:00 pm - 6:00 pm PDT. Capstone projects are the culmination of the MICS students' work in the School of Information's Master of Information and Cybersecurity program. Over the course of their final semester, teams of students propose and select project ideas, conduct and communicate their work, receive and ...

  29. NIST Releases First 3 Finalized Post-Quantum Encryption Standards

    Cybersecurity experts are now encouraged to incorporate these new algorithms into their systems. Encryption carries a heavy load in modern digitized society. It protects countless electronic secrets, such as the contents of email messages, medical records and photo libraries, as well as information vital to national security.

  30. EXCLUSIVE: Pentagon reveals 5 more funded RDER projects, including a

    This is a "capstone research and development project" for the Marine Corps' modernization drive, Force Design 2030. It's intended to combine traditionally distinct staff functions ...