Cybersecurity W22
Timeline
-
January 10, 2022Experience start
-
January 22, 2022Project proposal submission
-
March 5, 2022Mid-Way check in
-
April 24, 2022Experience end
Timeline
-
January 10, 2022Experience start
-
January 22, 2022Project proposal submission
Students to submit project proposal: confirming project scope, communication styles, and important dates.
-
March 5, 2022Mid-Way check in
Students to report on work progress and outline any challenges ahead. Employer to report on students' work progress thus far.
-
April 24, 2022Experience end
Categories
Security (cybersecurity and IT security) Information technologySkills
network security policy analysis risk management information security cybersecurityIs your organization looking to analyze or test new cybersecurity applications?
In this course, students in the Bow Valley Cybersecurity Post-Diploma Certificate will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. While cybersecurity projects are preferred, projects from all areas of Information Technology will be considered.
The final project deliverable will vary depending on the nature of the project and the problem to be solved.
Please see project examples for a general overview of the types of deliverables our students will be able to produce for your firm.
Project timeline
-
January 10, 2022Experience start
-
January 22, 2022Project proposal submission
-
March 5, 2022Mid-Way check in
-
April 24, 2022Experience end
Timeline
-
January 10, 2022Experience start
-
January 22, 2022Project proposal submission
Students to submit project proposal: confirming project scope, communication styles, and important dates.
-
March 5, 2022Mid-Way check in
Students to report on work progress and outline any challenges ahead. Employer to report on students' work progress thus far.
-
April 24, 2022Experience end
Project Examples
Project examples could include, but are not limited to:
- Assist with reviewing and creating cybersecurity policies.
- Design & deliver cybersecurity awareness training.
- Developing cybersecurity incident response plans.
- Developing detailed incident response playbooks.
- Answering questions related to a cybersecurity incident scenario.
- Leveraging tools and technologies related to handling and responding to cybersecurity incidents.
- Execute intrusion, detection, and recovery measures.
- Develop and present security risk assessments and business plans.
- Adapt network design to address potential security threats.
- Configure a network to meet security requirements.
- Incorporate cryptographic algorithms into network communication to meet organizational security needs.
- Deploy and maintain endpoint devices.
- Analyze data from cybersecurity incidents.
- Perform Penetration testing.
This is not an exhaustive list of projects our students could work. Any other cybersecurity project is welcome, subject to approval by the educator.
Companies must answer the following questions to submit a match request to this experience:
Provide a dedicated contact who is available to answer periodic emails or phone calls over the duration of the project to address students' questions.
Be available for a quick phone call with the instructor to initiate your relationship and confirm your scope is an appropriate fit for the course.
Timeline
-
January 10, 2022Experience start
-
January 22, 2022Project proposal submission
-
March 5, 2022Mid-Way check in
-
April 24, 2022Experience end
Timeline
-
January 10, 2022Experience start
-
January 22, 2022Project proposal submission
Students to submit project proposal: confirming project scope, communication styles, and important dates.
-
March 5, 2022Mid-Way check in
Students to report on work progress and outline any challenges ahead. Employer to report on students' work progress thus far.
-
April 24, 2022Experience end