🎓 This is the capstone course of the B.S. Cybersecurity Technology program at the University of Maryland Global Campus (UMGC). It represents the culmination of the full degree program — integrating hands-on technical labs, professional whitepapers, threat intelligence research, and cybersecurity policy analysis.
Verified capstone coursework from the University of Maryland Global Campus.
Topics covered: Cloud virtualization, AWS EC2 deployment, Windows VM provisioning, EFS & S3, IP subnetting, SDN & IBN architecture, cybersecurity threat landscape analysis, supply chain attacks, and cybersecurity law & policy.
CMIT 495 is the final capstone course of the B.S. Cybersecurity Technology degree at UMGC. Projects include both individual hands-on labs and collaborative group research assignments. The work documented here reflects individual contributions and solo assignments completed throughout the course.
| Project | Type | Description |
|---|---|---|
| Project 1 — Virtualization & AWS Lab | Individual Lab | Hands-on AWS EC2 provisioning, SSH configuration, Linux commands, hypervisor security analysis |
| Project 2 — Cloud Computing & AWS Infrastructure Lab | Individual Lab | Windows VM deployment, EFS, S3, IP subnetting calculations, full AWS vs GCP vs Azure comparison |
| Project 3 — SDN & IBN Whitepaper | Individual Whitepaper | Professional whitepaper on Software-Defined Networking, Intent-Based Networking, and desktop virtualization |
| Project 4 — Threat Landscape Analysis | Group Contribution | Cybersecurity threat landscape analysis — SolarWinds & MOVEit supply chain attack case studies |
| Project 5 — Cybersecurity Law & Policy | Group Contribution | GDPR vs US law analysis — OPM breach case study and federal data protection policy recommendations |
- AWS Cloud Infrastructure — Provisioned and launched Ubuntu and Windows EC2 instances, configured VPCs, security groups, EFS, S3, and SSH access
- Linux Administration — Executed system commands, updates, and network configuration in a live cloud environment
- IP Subnetting — Calculated network addresses, broadcast addresses, and subnet masks using CIDR notation and binary math
- Hypervisor Security — Analyzed Type 1 vs Type 2 hypervisor vulnerabilities and mitigation strategies
- Network Architecture — Authored a professional whitepaper on SDN and IBN vs traditional networking
- Threat Intelligence — Analyzed real-world supply chain attacks including SolarWinds and MOVEit
- Cybersecurity Policy — Evaluated GDPR vs US data protection law and applied framework analysis to the OPM breach
- Technical Writing — Produced professional whitepapers, lab reports, and policy analyses suitable for executive audiences