Developing a Computer Network Security Policy and Procedures Manual for a Small Business:
This project would involve researching best practices for developing comprehensive security policies and procedures for a small business network. The student would create a complete manual outlining the security policies that address topics like password complexity, remote access, software updates, firewalls, malware protection, etc. The manual would also provide standardized procedures for employees to follow to enforce the policies.
Implementing a Software-defined Wide Area Network (SD-WAN) for a Multi-location Enterprise:
For this project, the student would research SD-WAN technologies and select an appropriate vendor solution. They would design the SD-WAN architecture to connect several office locations with varying types of broadband connections. The project would involve configuring SD-WAN devices, creating overlays, establishing security policies, and setting up automated failover capabilities. Performance monitoring and reporting solutions would also be configured.
Conducting a Penetration Test of a University Campus Network and Providing Recommendations:
This capstone would have the student perform a thorough penetration test of the network infrastructure and key systems at a small university. Both internal and external testing would be done after obtaining proper approval. Upon completion, a professional report would be written detailing any vulnerabilities found, potential impacts, and prioritized recommendations for remediation. Sample documentation for planning the testing, obtaining approval, and reporting out findings would be included.
Designing and Implementing a Disaster Recovery Solution for Critical IT Systems:
For this project, the student would work with an organization to identify their most critical IT systems and services. They would then design and implement a disaster recovery strategy with appropriate redundancy, failover, and backup solutions. This would involve research, requirement gathering, budgeting, equipment procurement, and hands-on configuration of replication, clustering, backup servers, and connectivity required for DR. Comprehensive DR plans and procedures would also be created.
Developing and Delivering Security Awareness Training for Employees:
Here, the student would research best practices for developing effective security awareness training. They would then create a training package tailored for the types of users at a particular company, addressing topics like passwords, phishing, social engineering, malware, data security, etc. Sample training materials like presentations, videos, exercises could be developed. The training would then be pilot tested and delivered to employees, with evaluations to measure usefulness. Refinements would be suggested based on feedback.
Implementing a Web Application Firewall to Protect Custom Web Portals:
In this project, the student would be provided with details of custom web applications and portals used internally by a company. They would research web application firewall capabilities and select an appropriate WAF product. This would then be installed, configured with rules, tested, and optimized to filter and block malicious web traffic and protect the custom applications. Logging, alerting and reporting would also be set up for the WAF.
Design and Configuration of Advanced Routing and Switching Technologies in a Campus Network
For this project, the student works with the network team at a mid-sized company. They assess the current campus network design and performance, and identify areas that can be improved through advanced routing and switching technologies. This includes researching solutions like SDN, segment routing, VXLAN, WAN optimization etc. The design document details proposed network segments, routing protocols, switch virtualization, edge routers etc. Hands-on configuration is done on physical equipment and relevant features verified. Comprehensive testing validates improved network resilience, security segmentation and traffic engineering capabilities.
As these examples show, capstone projects in networking and security provide an opportunity for students to conduct end-to-end applied research on realistic problems, while designing and implementing customized solutions. They help demonstrate a student’s ability to analyze requirements, select appropriate tools/processes, plan deployment activities, and document outcomes – all important skills for IT careers. By working with industry partners, these projects also help students gain practical job experience before graduation.