Cybersecurity Environment Assessment

Schriever, Louisiana, United States
Timeline
-
April 1, 2025Experience start
-
May 20, 2025Experience end
Experience
1/1 project matches
Dates set by experience
Preferred companies
Louisiana, United States
Any company type
Any industries
Experience scope
Categories
Security (cybersecurity and IT security)Skills
cyber security preparing executive summaries recognizing strengths management problem solving vulnerability business communicationThis experience invites learners to engage in a practical exploration of cybersecurity within a real-world setting. Participants, who are equipped with foundational knowledge in cybersecurity principles, will have the opportunity to apply their skills by assessing the security posture of a company's working environment. The objective is to identify vulnerabilities, recognize strengths, and suggest improvements, thereby bridging the gap between theoretical knowledge and practical application. This experience is designed to enhance learners' analytical and problem-solving skills in a professional context.
Learners
Learners
Undergraduate
Beginner, Intermediate levels
10 learners
Project
15 hours per learner
Educators assign learners to projects
Teams of 2
- A comprehensive report detailing identified cybersecurity vulnerabilities and strengths.
- A prioritized list of recommended security improvements.
- A presentation summarizing key findings and suggestions for management.
- An executive summary highlighting critical vulnerabilities and quick wins.
- A risk assessment matrix categorizing vulnerabilities by severity and impact.
Project timeline
-
April 1, 2025Experience start
-
May 20, 2025Experience end
Project Examples
Requirements
- Assessment of network security protocols and identification of potential breaches.
- Evaluation of physical security measures and their effectiveness in protecting digital assets.
- Review of employee cybersecurity awareness and training programs.
- Analysis of data protection measures and compliance with industry standards.
- Examination of access control systems and user authentication processes.
- Inspection of incident response plans and their readiness for potential threats.
- Audit of software and hardware configurations for security vulnerabilities.
- Evaluation of third-party vendor security practices and their impact on the organization.
Timeline
-
April 1, 2025Experience start
-
May 20, 2025Experience end