Cybersecurity - Q2 (2025)


Timeline
-
April 17, 2025Experience start
-
June 17, 2025Applications due date
-
July 1, 2025Experience end
Experience scope
Categories
Security (cybersecurity and IT security) Information technology Hardware Networking Cloud technologiesSkills
cloud computing wireless security network protocols logical security online communication cyber security wireless networks authentications change management risk managementLooking to elevate your organization, and bring it to the next level? Bring on learners from Calbright College to be your learner-consultants, in a project-based experience. Learners will work on one main project over the experience of the semester, connecting with you as needed with virtual communication tools.
Learners will work individually or in small groups of 2-4 students, based on the number of students enrolled at the time. Students will only be able to take on 1 project.
*Project start date is flexible, but project applications must be submitted by June 15, and projects must be finished before June 30, 2025.*
Learners in this program/experience explore the concepts and skills necessary to transition into information security-based careers. In this course, learners will progress through the program by mastering competencies in the fundamental principles and topics of information security and risk management at the organizational level including hardware, software, processes, communications, applications, and policies and procedures with respect to organizational cybersecurity and risk management.
Participants
Deliverables are negotiable, and will seek to align the needs of the learners and the organization.
The final breakdown of the project is as follows:
- Networking - Compare and contrast TCP/UDP ports, network protocols, common networking devices, wireless networking protocols.
- Virtualization and Cloud Computing - Compare and contrast cloud computing concepts, and configure client-side virtualization.
- Security - Summarize physical measures, explain logical security concepts, and compare and contrast wireless security protocols/authentication methods.
- Operational Procedures - Understand best practice for documentation and basic change management. Implement basic disaster prevention/recovery.
Project timeline
-
April 17, 2025Experience start
-
June 17, 2025Applications due date
-
July 1, 2025Experience end
Project Examples
Requirements
Learners will work individually or in small groups, of 2-4 students, based on the number of students enrolled at the time.
*Project start date is flexible, but project applications must be submitted by June 15, and projects must be finished before June 30, 2025.*
Project activities that learners can complete may include, but are not limited to:
- Analyzing a wide variety of technical issues in Information Security from networking, operating systems, mobile devices to various technical systems.
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Timeline
-
April 17, 2025Experience start
-
June 17, 2025Applications due date
-
July 1, 2025Experience end