Skip to content
CSY399 Week 12 Capstone

Week Content

Cybersecurity Capstone

Track your progress through this week's content

Mental Model

"Your portfolio is proof of capability. Anyone can claim skills on a resume—your portfolio demonstrates them." — Career Development Principle

You've completed a comprehensive security assessment engagement from scoping through executive presentation. This final week brings it all together into a professional portfolio that demonstrates your readiness for cybersecurity roles and provides tangible evidence of your capabilities.

Learning Outcomes

By the end of this week, you will be able to:

  • LO1: Curate and organize professional work samples demonstrating security competencies
  • LO2: Present capstone work in a professional portfolio format suitable for job applications
  • LO3: Articulate the value of your work and skills to potential employers
  • LO4: Reflect on learning journey and identify areas for continued growth
  • LO5: Deliver a professional presentation demonstrating communication skills

Building on Prior Knowledge

This final week brings together deliverables and skills from across the curriculum:

  • CSY203: Application security testing reports and secure coding recommendations for portfolio evidence
  • CSY301: Threat intelligence reports and adversary modeling work products
  • CSY302: Cloud security assessments and infrastructure hardening documentation
  • CSY303: Risk assessment reports, compliance documentation, and executive communication examples
  • CSY399 Week 09-10: Report writing and presentation skills for portfolio delivery

Introduction: The Capstone Portfolio

Over the past 11 weeks, you've produced substantial professional work:

  • Engagement scoping documentation
  • Reconnaissance and OSINT reports
  • Infrastructure vulnerability assessments
  • Web application security testing results
  • Exploitation evidence and attack chains
  • Cloud security configuration audits
  • Risk analysis and prioritization
  • Remediation planning documents
  • Security architecture recommendations
  • Complete technical assessment report
  • Executive presentation materials

This portfolio demonstrates that you can perform the work of a security professional—not just that you studied it. It's evidence that sets you apart from candidates with only certifications or academic credentials.

Why Portfolios Matter

┌─────────────────────────────────────────────────────────────────┐
│                  PORTFOLIO VALUE PROPOSITION                    │
├─────────────────────────────────────────────────────────────────┤
│                                                                 │
│  WHAT EMPLOYERS SEE:                                            │
│  ──────────────────                                             │
│                                                                 │
│  Resume:              "3 years security experience"             │
│                       → Claims, no proof                        │
│                                                                 │
│  Certification:       "OSCP, CEH, Security+"                    │
│                       → Passed exams, theoretical knowledge     │
│                                                                 │
│  Portfolio:           Complete assessment documentation         │
│                       → Actual work product, demonstrated skill │
│                                                                 │
│  ─────────────────────────────────────────────────────────────  │
│                                                                 │
│  YOUR PORTFOLIO SHOWS:                                          │
│  ────────────────────                                           │
│  ✓ You can scope and plan engagements                          │
│  ✓ You can find real vulnerabilities                           │
│  ✓ You can assess risk in business context                     │
│  ✓ You can write professional documentation                    │
│  ✓ You can communicate with executives                         │
│  ✓ You can deliver complete, quality work                      │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘
                

1. Portfolio Structure and Organization

A well-organized portfolio makes it easy for reviewers to understand your capabilities quickly. Structure matters.

Recommended Portfolio Structure

┌─────────────────────────────────────────────────────────────────┐
│                   PORTFOLIO STRUCTURE                           │
├─────────────────────────────────────────────────────────────────┤
│                                                                 │
│  CSY399-Capstone-Portfolio/                                     │
│  │                                                              │
│  ├── README.md                    Portfolio overview            │
│  │                                                              │
│  ├── 00-portfolio-summary/                                      │
│  │   ├── portfolio-overview.pdf   Executive summary of work     │
│  │   ├── skills-demonstrated.pdf  Competency mapping            │
│  │   └── engagement-summary.pdf   NovaTech project summary      │
│  │                                                              │
│  ├── 01-engagement-setup/                                       │
│  │   ├── scope-document.pdf                                     │
│  │   ├── rules-of-engagement.pdf                                │
│  │   └── project-plan.pdf                                       │
│  │                                                              │
│  ├── 02-reconnaissance/                                         │
│  │   ├── osint-report.pdf                                       │
│  │   └── attack-surface-map.pdf                                 │
│  │                                                              │
│  ├── 03-infrastructure/                                         │
│  │   ├── vulnerability-assessment.pdf                           │
│  │   └── scan-results/                                          │
│  │                                                              │
│  ├── 04-web-application/                                        │
│  │   ├── web-assessment.pdf                                     │
│  │   └── findings/                                              │
│  │                                                              │
│  ├── 05-exploitation/                                           │
│  │   ├── exploitation-report.pdf                                │
│  │   └── evidence/                                              │
│  │                                                              │
│  ├── 06-cloud-security/                                         │
│  │   ├── cloud-assessment.pdf                                   │
│  │   └── prowler-results/                                       │
│  │                                                              │
│  ├── 07-risk-analysis/                                          │
│  │   ├── risk-register.xlsx                                     │
│  │   ├── risk-register.pdf                                      │
│  │   └── executive-summary.pdf                                  │
│  │                                                              │
│  ├── 08-remediation/                                            │
│  │   ├── remediation-roadmap.pdf                                │
│  │   └── compensating-controls.pdf                              │
│  │                                                              │
│  ├── 09-architecture/                                           │
│  │   ├── architecture-recommendations.pdf                       │
│  │   └── diagrams/                                              │
│  │                                                              │
│  ├── 10-technical-report/                                       │
│  │   ├── NovaTech-Security-Assessment-v1.0.pdf   ← KEY PIECE   │
│  │   └── appendices/                                            │
│  │                                                              │
│  ├── 11-executive-presentation/                                 │
│  │   ├── executive-presentation.pdf              ← KEY PIECE   │
│  │   └── presentation-recording.mp4                             │
│  │                                                              │
│  └── 12-reflections/                                            │
│      ├── weekly-reflections.pdf                                 │
│      └── capstone-reflection.pdf                                │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘
            

Portfolio Overview Document

Create a 2-3 page overview that introduces your portfolio and guides reviewers to key pieces:

Portfolio Overview Template

1. Introduction

2. Capstone Project Summary

3. Skills Demonstrated

4. Key Deliverables

5. Learning Journey

2. Competency Mapping

Map your portfolio artifacts to industry-recognized competency frameworks. This helps employers understand how your work translates to job requirements.

NICE Framework Mapping

The NIST NICE (National Initiative for Cybersecurity Education) Framework defines work roles and competencies for cybersecurity positions.

NICE Work Role Competency Area Portfolio Evidence
Vulnerability Assessment Analyst Conduct vulnerability scans Week 3: Infrastructure assessment, Nessus results
Analyze scan results Week 7: Risk register, prioritization
Document findings Week 10: Technical report
Exploitation Analyst Identify exploitable vulnerabilities Week 4-5: Web app testing, exploitation
Execute controlled exploitation Week 5: Attack chains, PoC evidence
Document exploitation methods Week 10: Technical report findings
Security Architect Design security controls Week 9: Architecture recommendations
Evaluate security posture Week 6: Cloud security assessment
Security Control Assessor Assess security controls Week 6: Cloud configuration review
Document control deficiencies Week 10: Technical report
Cyber Defense Analyst Analyze threats Week 2: Threat modeling, OSINT
Recommend countermeasures Week 8-9: Remediation, architecture

Skills Matrix

Skill Category Specific Skills Proficiency Evidence
Technical Assessment Vulnerability scanning ●●●●○ Week 3
Web application testing ●●●●○ Week 4
Exploitation techniques ●●●○○ Week 5
Cloud security assessment ●●●●○ Week 6
Analysis & Planning Risk assessment ●●●●○ Week 7
Remediation planning ●●●●○ Week 8
Security architecture ●●●○○ Week 9
Communication Technical writing ●●●●○ Week 10
Executive presentation ●●●●○ Week 11
Stakeholder communication ●●●○○ Week 1, 11

● = Demonstrated proficiency level (1-5)

3. Artifact Selection and Refinement

Not everything you produced needs equal prominence. Select and refine your strongest pieces for maximum impact.

Key Portfolio Pieces

🌟 Technical Assessment Report

Why it matters: This is the primary deliverable of any security assessment engagement. It demonstrates your ability to document findings professionally and provide actionable guidance.

What reviewers look for:

  • Clear, professional writing
  • Accurate technical details
  • Actionable remediation guidance
  • Appropriate severity ratings
  • Well-organized structure

🌟 Executive Presentation

Why it matters: Demonstrates that you can communicate with leadership, not just find vulnerabilities. This differentiates you from purely technical candidates.

What reviewers look for:

  • Business-focused messaging
  • Clear, professional slides
  • Confident delivery (in recording)
  • Appropriate level of detail

🌟 Risk Register

Why it matters: Shows you understand that security isn't just about finding bugs—it's about managing risk in business context.

What reviewers look for:

  • Appropriate risk ratings
  • Business context consideration
  • Clear prioritization rationale
  • Professional formatting

Attack Chain Documentation

Why it matters: Demonstrates exploitation skills and ability to chain vulnerabilities for real-world impact.

What reviewers look for:

  • Clear step-by-step documentation
  • Professional evidence presentation
  • Understanding of attack methodology

Architecture Recommendations

Why it matters: Shows strategic thinking beyond individual vulnerabilities—you can recommend systemic improvements.

What reviewers look for:

  • Understanding of security architecture
  • Practical recommendations
  • Defense-in-depth thinking

Refinement Checklist

Before finalizing each artifact:

4. Portfolio Presentation Formats

Consider how you'll share your portfolio with potential employers. Different formats serve different purposes.

Format Options

GitHub Repository

Best for: Technical roles, demonstrating documentation skills

Approach:

  • Create public repository with professional README
  • Organize folders matching portfolio structure
  • Use GitHub Pages for web-based viewing
  • Include PDF versions of key documents

Example README:

# Cybersecurity Capstone Portfolio

## About This Portfolio
This repository contains work products from a comprehensive 
security assessment engagement completed as part of my 
Bachelor of Cybersecurity capstone project.

## Key Deliverables
- [Technical Assessment Report](./10-technical-report/)
- [Executive Presentation](./11-executive-presentation/)
- [Risk Register](./07-risk-analysis/)

## Skills Demonstrated
- Vulnerability Assessment
- Penetration Testing
- Cloud Security
- Risk Analysis
- Technical Writing
- Executive Communication

## About the Engagement
**Client:** NovaTech Solutions (fictional)
**Scope:** Full security assessment
**Duration:** 12 weeks
                    

Personal Website

Best for: Broader professional presence, consulting

Approach:

  • Create professional portfolio site
  • Include about page, resume, contact
  • Showcase key projects with descriptions
  • Link to downloadable artifacts

PDF Portfolio Package

Best for: Direct submission with applications

Approach:

  • Create single PDF with overview and TOC
  • Include embedded/linked key documents
  • Keep file size reasonable (<25MB)
  • Include contact information on cover

Interview Presentation

Best for: Job interviews with presentation component

Approach:

  • 10-15 minute presentation of capstone
  • Highlight methodology and results
  • Show key artifacts
  • Demonstrate communication skills

Privacy Considerations

Important: Portfolio Privacy

Even though NovaTech is fictional, treat your portfolio as you would real client work:

5. Capstone Reflection

Reflection demonstrates self-awareness and commitment to professional growth—qualities employers value highly.

Reflection Framework

┌─────────────────────────────────────────────────────────────────┐
│                 CAPSTONE REFLECTION FRAMEWORK                   │
├─────────────────────────────────────────────────────────────────┤
│                                                                 │
│  1. JOURNEY OVERVIEW                                            │
│     ─────────────────                                           │
│     • Where did you start? (skills, knowledge, confidence)      │
│     • Where are you now?                                        │
│     • What changed?                                             │
│                                                                 │
│  2. KEY LEARNING MOMENTS                                        │
│     ─────────────────────                                       │
│     • What challenged you most?                                 │
│     • What surprised you?                                       │
│     • What "clicked" during the project?                        │
│                                                                 │
│  3. SKILLS DEVELOPMENT                                          │
│     ───────────────────                                         │
│     • Technical skills gained/strengthened                      │
│     • Soft skills developed                                     │
│     • Areas of unexpected growth                                │
│                                                                 │
│  4. CHALLENGES AND SOLUTIONS                                    │
│     ─────────────────────────                                   │
│     • Obstacles encountered                                     │
│     • How you overcame them                                     │
│     • What you'd do differently                                 │
│                                                                 │
│  5. FUTURE DIRECTION                                            │
│     ────────────────────                                        │
│     • Areas for continued learning                              │
│     • Career goals this supports                                │
│     • Next steps in your development                            │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘
            

Sample Reflection Prompts

Technical Growth

"At the start of this capstone, I could [describe initial skill level]. Through the NovaTech engagement, I learned to [specific skills]. The moment this clicked for me was when [specific experience]."

Professional Skills

"I discovered that security work is as much about [communication/business understanding/etc.] as it is about technical skills. Writing the executive presentation taught me [insight about professional communication]."

Challenges Overcome

"The most challenging aspect of this project was [specific challenge]. I addressed this by [approach taken]. Looking back, I would [alternative approach or lesson learned]."

Looking Forward

"This capstone has prepared me for [career goal/role type]. I'm excited to continue developing skills in [area] and plan to [next steps]. The areas I want to strengthen further include [growth areas]."

6. Portfolio Presentation

The final component is a presentation of your capstone work. This could be for a class, advisory panel, or practice for job interviews.

Presentation Structure

┌─────────────────────────────────────────────────────────────────┐
│              CAPSTONE PRESENTATION STRUCTURE                    │
│                      (15-20 minutes)                            │
├─────────────────────────────────────────────────────────────────┤
│                                                                 │
│  1. INTRODUCTION (2 minutes)                                    │
│     • Your background and goals                                 │
│     • Capstone project overview                                 │
│                                                                 │
│  2. ENGAGEMENT OVERVIEW (3 minutes)                             │
│     • NovaTech scenario                                         │
│     • Scope and objectives                                      │
│     • Methodology used                                          │
│                                                                 │
│  3. KEY FINDINGS HIGHLIGHT (5 minutes)                          │
│     • 2-3 most significant findings                             │
│     • Demonstrate technical depth                               │
│     • Show business impact understanding                        │
│                                                                 │
│  4. DELIVERABLES SHOWCASE (5 minutes)                           │
│     • Walk through key portfolio pieces                         │
│     • Highlight quality and professionalism                     │
│     • Show range of skills demonstrated                         │
│                                                                 │
│  5. REFLECTION AND GROWTH (3 minutes)                           │
│     • What you learned                                          │
│     • How this prepares you for your career                     │
│     • Future development plans                                  │
│                                                                 │
│  6. Q&A (5-10 minutes)                                          │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘
            

Presentation Tips

Tell a Story

Don't just list what you did—tell the story of the engagement. What was the challenge? How did you approach it? What did you discover? What was the outcome?

Show Your Work

Include actual screenshots of your deliverables. Walk through a finding in detail. Show the technical report structure. Let the audience see the quality of your work.

Demonstrate Range

Highlight both technical and communication skills. Show that you can find vulnerabilities AND explain them to executives. This combination is rare and valuable.

Be Authentic

Talk genuinely about challenges you faced and what you learned. Authenticity and self-awareness are impressive. Don't pretend everything was easy.

Practice

Rehearse your presentation multiple times. Time yourself. Get feedback from others. A polished presentation demonstrates professionalism.

7. Career Next Steps

With your capstone complete, you're ready to pursue cybersecurity roles. Here's how to leverage your portfolio.

Using Your Portfolio in Job Search

On Your Resume

  • Reference the capstone project in experience or projects section
  • Include link to GitHub/portfolio site
  • List specific skills demonstrated with evidence available

In Cover Letters

  • Reference specific portfolio artifacts relevant to the role
  • Mention deliverables that align with job requirements
  • Offer to walk through your work in an interview

During Interviews

  • Bring printed copies of key deliverables
  • Be ready to present 5-10 minute overview
  • Use specific examples from your work to answer questions
  • Show, don't just tell—"Here's an example of how I documented a finding"

On LinkedIn

  • Add capstone project to Featured section
  • Write post about completing the project
  • Include skills demonstrated in Skills section

Entry-Level Roles Your Portfolio Supports

Role Portfolio Evidence
Security Analyst Vulnerability assessment, risk analysis, documentation
Penetration Tester (Junior) Technical assessment, exploitation, report writing
GRC Analyst Risk register, compliance mapping, documentation
Security Consultant (Junior) Full engagement lifecycle, client deliverables
Cloud Security Analyst AWS security assessment, cloud configuration review
Application Security Analyst Web application testing, secure coding recommendations

Continued Learning Path

Recommended Next Steps

  1. Certifications to Consider:
    • CompTIA Security+ (foundational)
    • eJPT/PNPT (penetration testing)
    • AWS Security Specialty (cloud)
    • OSCP (advanced penetration testing)
  2. Practice Platforms:
    • HackTheBox, TryHackMe (technical skills)
    • PentesterLab (web application security)
    • CloudGoat, flAWS (cloud security)
  3. Community Involvement:
    • Local security meetups (OWASP, DEF CON groups)
    • CTF competitions
    • Bug bounty programs (for real-world experience)

Self-Check Questions

Final review before portfolio submission:

Question 1

If a hiring manager has only 5 minutes to review your portfolio, which three artifacts should they see, and why?

Reveal Answer

Recommended three artifacts:

  1. Technical Assessment Report (Executive Summary + 1 Critical Finding)
    • Shows you can produce professional deliverables
    • Demonstrates technical and writing skills
    • The executive summary shows business awareness
  2. Executive Presentation (first 3-4 slides)
    • Shows you can communicate with leadership
    • Demonstrates business translation ability
    • Differentiates you from purely technical candidates
  3. Risk Register (first page)
    • Shows you understand risk, not just vulnerabilities
    • Demonstrates prioritization and business context
    • Professional formatting shows attention to detail

Key principle: Lead with work that shows range—technical depth, communication skills, and business understanding.

Question 2

How would you explain this capstone project in a job interview when asked "Tell me about a project you've worked on"?

Reveal Answer

Sample response structure (STAR method):

Situation: "For my capstone project, I conducted a full security assessment of a fictional B2B SaaS company called NovaTech. The scenario simulated a real consulting engagement where the company was preparing for SOC 2 certification."

Task: "My objective was to identify security vulnerabilities across their infrastructure, web applications, and AWS cloud environment, then provide prioritized recommendations and present findings to executive leadership."

Action: "I conducted comprehensive testing using industry methodologies—vulnerability scanning, web application testing, cloud configuration review. I identified 28 findings including 3 critical vulnerabilities. I documented everything in a professional technical report and created an executive presentation communicating business risk."

Result: "The deliverables I produced are comparable to what you'd see from a professional security consultancy—a 40-page technical report, risk register, remediation roadmap, and executive presentation. I can walk you through any of these if you'd like to see examples of my work."

Question 3

What are the top three things you learned from this capstone that you didn't expect when you started?

Reveal Answer

This is a personal reflection question—your answer will be unique. Common themes students report:

  1. Communication is half the job: "I expected security work to be mostly technical. I was surprised how much time goes into documentation, reporting, and presenting findings in ways non-technical people can understand."
  2. Context matters more than severity: "A critical vulnerability isn't always the top priority. Business context—what system it's on, what data is at risk, what compliance implications exist—often matters more than the CVSS score."
  3. Professional quality takes time: "Finding vulnerabilities was actually the faster part. Documenting them professionally, with clear evidence and actionable recommendations, took much longer than I expected."

Question 4

Review your portfolio against this checklist. What items need attention before final submission?

Portfolio Completion Checklist
  • ☐ Portfolio overview document complete
  • ☐ All 12 weeks' deliverables organized
  • ☐ Technical report is polished and professional
  • ☐ Executive presentation is complete with recording
  • ☐ Risk register is properly formatted
  • ☐ All documents spell-checked and proofread
  • ☐ File naming is consistent and professional
  • ☐ README/overview guides reviewers effectively
  • ☐ Competency mapping is complete
  • ☐ Capstone reflection is thoughtful and complete
  • ☐ All fictional elements are clearly marked
  • ☐ Portfolio is accessible (GitHub/website/PDF)
Reveal Guidance

Work through each item systematically. The most commonly overlooked items are:

  • Portfolio overview document (students jump straight to deliverables)
  • Consistent file naming
  • Competency mapping to industry frameworks
  • Final proofread of key documents

Budget 2-3 hours for final polish—it makes a significant difference in professional presentation.

Question 5

What would you do differently if you were starting this capstone over? What advice would you give to someone beginning the project?

Reveal Answer

This is another personal reflection. Common advice from students:

  1. "Start documentation early": Don't wait until the end to write things up. Document as you go—it's easier and produces better results.
  2. "Focus on quality over quantity": It's better to have 10 well-documented findings than 50 poorly documented ones. Depth matters more than breadth in a portfolio.
  3. "Don't skip the business context": It's tempting to focus only on technical findings, but the risk analysis and executive communication pieces are what differentiate your portfolio.
  4. "Use real tools on practice targets": The skills transfer directly to real work. Time spent on practice platforms (HTB, THM) is time well spent.
  5. "Ask for feedback": Have someone else review your key deliverables. Fresh eyes catch issues you've become blind to.

Lab: Final Portfolio Assembly

Objective

Assemble, refine, and present your complete capstone portfolio, demonstrating professional security assessment capabilities and readiness for cybersecurity roles.

Deliverables

Time Estimate

8-10 hours

Lab Tasks

Part 1: Content Inventory

  1. Gather all deliverables from Weeks 1-11
  2. Create inventory checklist
  3. Identify any missing or incomplete items
  4. Complete or refine missing pieces

Part 2: Quality Review (LO1)

  1. Review each deliverable for:
    • Professional formatting
    • Spelling and grammar
    • Technical accuracy
    • Completeness
  2. Refine key pieces (technical report, executive presentation)
  3. Ensure consistent naming and organization

Part 3: Portfolio Structure (LO2)

  1. Organize files into recommended structure
  2. Create portfolio overview document
  3. Write README for GitHub (if using)
  4. Set up chosen presentation format (GitHub/website/PDF)

Part 4: Competency Documentation (LO3)

  1. Complete NICE Framework mapping
  2. Create skills matrix with proficiency levels
  3. Link each skill to specific portfolio evidence

Part 5: Capstone Reflection (LO4)

  1. Write 500-750 word capstone reflection covering:
    • Learning journey overview
    • Key skills developed
    • Challenges and solutions
    • Future development goals
  2. Review and refine weekly reflections
  3. Compile into reflection document

Part 6: Portfolio Presentation (LO5)

  1. Create 10-15 slide presentation covering:
    • Introduction and goals
    • Engagement overview
    • Key findings highlight
    • Deliverables showcase
    • Learning and growth
  2. Practice presentation
  3. Record final presentation (15-20 minutes)

Part 7: Final Review

  1. Complete final checklist review
  2. Test all links and navigation
  3. Have someone else review key pieces
  4. Make final refinements

Self-Assessment Checklist

Portfolio Completeness

  • ☐ All 12 weeks' deliverables included
  • ☐ Portfolio overview document complete
  • ☐ Competency mapping complete
  • ☐ Capstone reflection included

Professional Quality

  • ☐ All documents professionally formatted
  • ☐ No spelling or grammar errors
  • ☐ Consistent naming and organization
  • ☐ Key deliverables are polished

Presentation Quality

  • ☐ Slides are professional and clear
  • ☐ Recording is clear and audible
  • ☐ Presentation covers key elements
  • ☐ Delivery is confident and professional

Career Readiness

  • ☐ Portfolio demonstrates range of skills
  • ☐ Work is suitable for sharing with employers
  • ☐ Competencies clearly mapped to roles
  • ☐ Reflection shows growth and self-awareness

Final Portfolio Submission

Submit your complete portfolio in your chosen format:

Include:

🎯 Hands-On Capstone Activities

Week 12 capstone activities - Final Portfolio Assembly

🎯 Final Portfolio Assembly Lab

Deliverable: Professional capstone component ready for portfolio
Time estimate: 4-8 hours

🚀 Career Launch Pack

What you'll do: Build a career-ready package: resume bullets, LinkedIn summary, and a portfolio README.
Why it matters: A strong narrative turns your capstone into job offers.
Time estimate: 2-3 hours
Deliverable: Career launch pack ready for applications

💡 Capstone Strategy: This work becomes your portfolio—make it job-interview ready.

Resources

Required

NICE Cybersecurity Workforce Framework

NIST framework defining cybersecurity work roles and competencies. Use for mapping your skills to industry standards.

NICE Framework 45 minutes
Required

Building a Security Portfolio

Guidance on creating effective security portfolios for job seekers.

Building an InfoSec Career 30 minutes
Optional

GitHub Profile Best Practices

Guide to creating professional GitHub profiles for technical portfolios.

GitHub Profile Documentation 20 minutes

Final Capstone Reflection

Prompt

Write a comprehensive reflection on your capstone journey (500-750 words). Address the following:

  1. Journey Overview: Where did you start in terms of skills, knowledge, and confidence? Where are you now? What changed most significantly?
  2. Key Learning Moments: What challenged you most during this project? What surprised you about security work? Describe a specific moment when something "clicked."
  3. Skills Development: What technical skills did you develop or strengthen? What professional/soft skills did you develop? What areas of unexpected growth did you experience?
  4. Challenges and Growth: What obstacles did you encounter and how did you overcome them? What would you do differently if starting over?
  5. Future Direction: How has this capstone prepared you for your career goals? What areas do you want to continue developing? What are your next steps?

Target length: 500-750 words

🎓 Course Completion

Congratulations!

You have completed CSY399: Cybersecurity Capstone Project. Over the past 12 weeks, you've demonstrated the full range of skills required for professional security work:

Your portfolio demonstrates that you're ready for entry-level cybersecurity roles. Take pride in what you've accomplished, and good luck in your career!