- Portals
-
-
Longmeadow, Massachusetts, United States
-
- Categories
- Security (cybersecurity and IT security)
Achievements
![](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/achievement/17/avatar/medium-6ee92f28b369eda91ece7117eedd7834.png)
![](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/achievement/10/avatar/medium-172d14a94aa58f2681d5c0e6b4ea009d.png)
![](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/achievement/9/avatar/medium-f97d9ad7a0f0972088de884c9e374063.png)
Latest feedback
![Rahi Tajzadeh](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/employer/23159/avatar/xsmall-a39fad681787f23fe2a671a8495a2133.jpg)
Experience feedback
![Bay Path University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/464/avatar/xsmall-980af100-64ae-40ee-bec9-af21353c9ca0.jpeg)
![Knowquest Inc.](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/company/3944/avatar/xsmall-f11eb191a99c3d434a142ac114279e20.png)
Experience feedback
![Bay Path University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/464/avatar/xsmall-980af100-64ae-40ee-bec9-af21353c9ca0.jpeg)
![SingularityX Studios](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/company/17631/avatar/xsmall-7f84b51b-7e43-440c-9684-2536c13656aa.jpeg)
![Rahi Tajzadeh](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/employer/23159/avatar/xsmall-a39fad681787f23fe2a671a8495a2133.jpg)
Experience feedback
![Bay Path University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/464/avatar/xsmall-980af100-64ae-40ee-bec9-af21353c9ca0.jpeg)
![Knowquest Inc.](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/company/3944/avatar/xsmall-f11eb191a99c3d434a142ac114279e20.png)
Recent experiences
![Bay Path University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/464/avatar/small-980af100-64ae-40ee-bec9-af21353c9ca0.jpeg)
Capstone in Digital Forensics
CBY 455
Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.
![Bay Path University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/464/avatar/small-980af100-64ae-40ee-bec9-af21353c9ca0.jpeg)
Capstone in Digital Forensics
CBY 455
Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.
![Bay Path University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/464/avatar/small-980af100-64ae-40ee-bec9-af21353c9ca0.jpeg)
Capstone in Digital Forensics
CBY 455
Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.
![Bay Path University](https://riipen-platform2-ca-central-1-production.s3.ca-central-1.amazonaws.com/uploads/portal/464/avatar/small-980af100-64ae-40ee-bec9-af21353c9ca0.jpeg)
Capstone in Digital Forensics
CBY 455
Cybersecurity: Digital Forensics and Incident Response: Use current approaches to detect and or deter cybercrime, and to investigate incidences related to digital crime activity. Look at current issues relating to digital forensics and determine the best practices for attending to them based upon available resources and tools, and the overall needs of the organization Cybersecurity: Risk Management: Explain ways to mitigate risk across an enterprise. Use best practices for the documentation and communication of risk to various stakeholders. Cybersecurity: Information Assurance: Assure confidentiality, integrity, and availability of an organization's data. Recommend policy, practices, and procedures required to ensure accuracy, authenticity, utility, and possession of data, within the organization. Research, understand, and then communicate appropriate responses to test a variety of information assurance threats.