In this course, students conduct a literature review in Information Security and other relevant bodies of research to identify a proposed solution to the business problem. Using this literature review, they present support for the selection of the proposed solution and identify criteria to be used in assessing its feasibility.
Learning Objectives
By the end of this course, the student should know or be able to:
- To develop an understanding of the underlying concepts of academic research
- To apply these research concepts to the modifications required for dissertation deliverables
- To work on the Chapter 2 of the dissertation proposal (a.k.a., the Literature Review)
Framework Connections
Specialty Areas
- Risk Management
- Technology R&D
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.