Cybersecurity for Winter 2025

ISEC3999
Ouvert Clôture le janvier 8, 2025 / 2 places restantes
Bow Valley College
Calgary, Alberta, Canada
Instructor
(3)
4
Chronologie
  • janvier 10, 2025
    Début de expérience
  • avril 30, 2025
    Fin de expérience
Expérience
3/5 match de projet
Dates fixées par le expérience
Entreprises privilégiées
N'importe où
Tout type de entreprise
N'importe qu'elle industrie
Catégories
Sécurité (cybersécurité et sécurité informatique) Technologie de l'information
Compétences
network security policy analysis risk management information security cybersecurity ethical hacking penetration testing
Objectifs et capacités de apprenant.es

Is your organization looking to analyze or test new cybersecurity applications?

In this course, students in the Bow Valley Cybersecurity Post-Diploma Certificate will work with your organization to solve a problem or opportunity of your choosing related to cybersecurity. While cybersecurity projects are preferred, projects from all areas of Information Technology will be considered.

Apprenant.es
Diplôme
Niveau Débutant, Intermédiaire
25 apprenant.es dans le programme
Projet
100 heures par apprenant.e
Les Professeur.euses affectent les apprenant.es à des projets
Équipes de 5
Résultats et livrables attendus

The final project deliverable will vary depending on the nature of the project and the problem to be solved.

Please see project examples for a general overview of the types of deliverables our students will be able to produce for your firm.

Chronologie du projet
  • janvier 10, 2025
    Début de expérience
  • avril 30, 2025
    Fin de expérience
Exemples de projets

Project examples could include, but are not limited to:

  • Assist with reviewing and creating cybersecurity policies.
  • Design & deliver cybersecurity awareness training.
  • Developing cybersecurity incident response plans.
  • Developing detailed incident response playbooks.
  • Answering questions related to a cybersecurity incident scenario.
  • Leveraging tools and technologies related to handling and responding to cybersecurity incidents.
  • Execute intrusion, detection, and recovery measures.
  • Develop and present security risk assessments and business plans.
  • Adapt network design to address potential security threats.
  • Configure a network to meet security requirements.
  • Incorporate cryptographic algorithms into network communication to meet organizational security needs.
  • Deploy and maintain endpoint devices.
  • Analyze data from cybersecurity incidents.
  • Perform Penetration testing.


This is not an exhaustive list of projects our students could work. Any other cybersecurity project is welcome, subject to approval by the educator.

Les entreprises doivent répondre aux questions suivantes pour soumettre une demande de jumelage pour cette expérience:

Will you be able to provide a dedicated contact person who is available for sessions to address students' questions and respond to periodic messages throughout the project?