Cybersecurity Environment Assessment

Fletcher Technical Community College
Schriever, Louisiana, United States
Dean of BEAMS
2
Timeline
  • April 1, 2025
    Experience start
  • May 20, 2025
    Experience end
Experience
1/1 project matches
Dates set by experience
Preferred companies
Louisiana, United States
Any company type
Any industries

Experience scope

Categories
Security (cybersecurity and IT security)
Skills
cyber security preparing executive summaries recognizing strengths management problem solving vulnerability business communication
Learner goals and capabilities

This experience invites learners to engage in a practical exploration of cybersecurity within a real-world setting. Participants, who are equipped with foundational knowledge in cybersecurity principles, will have the opportunity to apply their skills by assessing the security posture of a company's working environment. The objective is to identify vulnerabilities, recognize strengths, and suggest improvements, thereby bridging the gap between theoretical knowledge and practical application. This experience is designed to enhance learners' analytical and problem-solving skills in a professional context.

Learners

Learners
Undergraduate
Beginner, Intermediate levels
10 learners
Project
15 hours per learner
Educators assign learners to projects
Teams of 2
Expected outcomes and deliverables
  • A comprehensive report detailing identified cybersecurity vulnerabilities and strengths.
  • A prioritized list of recommended security improvements.
  • A presentation summarizing key findings and suggestions for management.
  • An executive summary highlighting critical vulnerabilities and quick wins.
  • A risk assessment matrix categorizing vulnerabilities by severity and impact.
Project timeline
  • April 1, 2025
    Experience start
  • May 20, 2025
    Experience end

Project Examples

Requirements
  • Assessment of network security protocols and identification of potential breaches.
  • Evaluation of physical security measures and their effectiveness in protecting digital assets.
  • Review of employee cybersecurity awareness and training programs.
  • Analysis of data protection measures and compliance with industry standards.
  • Examination of access control systems and user authentication processes.
  • Inspection of incident response plans and their readiness for potential threats.
  • Audit of software and hardware configurations for security vulnerabilities.
  • Evaluation of third-party vendor security practices and their impact on the organization.