

Companies must complete verification in order to match with experience.
Experience scope
Categories
Security (cybersecurity and IT security)Skills
log analysis acceptable use policy information assurance self-motivation comptia network+ security policies professionalism comptia a+ payment card industry (pci) data security standards cyber security assessmentWGU Cybersecurity & IT Project Program – Employer Overview
WGU’s School of Technology, in partnership with Career Services, is offering a co-curricular, project-based learning opportunity for learners in the Cybersecurity and Information Assurance bachelor’s program. This initiative connects US-based employers with highly motivated students eager to apply their technical skills in real-world settings.
About the Learners:
- Enrolled in WGU’s B.S. in Cybersecurity and Information Assurance, a program built on industry needs and hands-on skill development
- Have completed foundational and intermediate coursework, with core competencies in IT, networking, and security
- Hold industry-recognized certifications including CompTIA A+, Network+, and Security+
- Have completed a minimum of two program terms and passed a competitive screening process by WGU Career Services
- Demonstrated strong dedication, professionalism, and readiness to contribute to industry-aligned projects
Project Details:
- Beginner/Entry-level scope
- 40–60 hours per learner, completed over 4–8 weeks
- 1 project per learner
- 5 learners per project, self-assigned on a first-come, first-served basis
- Learners complete the project remotely and independently
- Projects will focus on technology disciplines, including general IT, networking, and cybersecurity
- Designed to build practical skills and workplace readiness
Employers play a key role in guiding projects and providing feedback. This is a valuable opportunity to support emerging tech talent and receive meaningful contributions from skilled learners ready to make an impact.
Visit our help articles for more information about this program:
Getting Started with Posting a Project
Working with WGU - Cyber Learners
Have more questions? Email wgu@riipen.com to get in touch with our team.
Learners
✅ Project Deliverables Examples
Cybersecurity Risk Assessment Report
A professional report identifying key risks, vulnerabilities, and recommendations based on a mock or real organization’s IT setup.
Security Policy or Compliance Checklist
A customized or templated policy (e.g., password policy, acceptable use policy) or a checklist aligned with standards like NIST, HIPAA, or PCI-DSS.
Network Diagram and Security Audit Summary
Visual maps of existing or proposed network setups, along with notes on security gaps and mitigation strategies.
Training or Awareness Materials
Slide decks, short videos, or one-pagers for non-technical audiences—e.g., cybersecurity best practices for employees.
Log Analysis Report
A sample system log or dataset analyzed for suspicious activity, with interpretation and suggested actions.
Secure Configuration Guide
Documentation of how a system (e.g., Linux server or Windows workstation) was configured securely, including screenshots and justifications.
Presentation or Summary Deck
A final presentation outlining project goals, process, and results—aimed at a non-technical stakeholder audience.
Reflection or Learning Report
A short write-up on what the learner did, learned, and how they might approach a similar project in a workplace.
Project timeline
-
June 23, 2025Experience start
-
June 26, 2025Schedule a Kickoff Meeting
-
August 16, 2025Experience end
Timeline
-
June 23, 2025Experience start
-
June 26, 2025Schedule a Kickoff Meeting
Within the first week of your project, you should schedule a virtual kickoff meeting with your employer through the Riipen messaging system. Use this meeting to:
- Introduce yourself
- Clarify project goals, deliverables, and timelines
- Ask any initial questions
- Build a strong working relationship
This meeting sets the stage for a smooth and successful project—don’t skip it!
We’re excited to see what you’ll accomplish—let’s get started!
-
August 16, 2025Experience end
Project Examples
Requirements
Cybersecurity & Risk Management
- Conducting a Basic Cybersecurity Risk Assessment for a Small Business
- Security Policy Review and Recommendations for Compliance (e.g., NIST, ISO)
- Creating a Cybersecurity Awareness Training Plan for Employees
- Developing an Incident Response Playbook for Common Security Threats
- Business Continuity and Disaster Recovery (BCDR) Plan
Networking & Infrastructure
- Network Security Audit and Hardening Recommendations
- Mapping and Evaluating Network Topologies for Security Risks
- Firewall and Access Control Rule Set Review for a Simulated Company Network
- Setting Up and Testing a Virtual Private Network (VPN) in a Lab Environment
System Security
- Operating System Hardening and Vulnerability Mitigation Report (Windows/Linux)
- User Access Control and Role-Based Permissions Analysis
- Secure Configuration of a Client-Server Environment (Using Virtual Machines)
Security Tools & Practices
- Testing and Documenting the Use of an Intrusion Detection System (IDS)
- Log Monitoring and Analysis to Detect Potential Security Incidents
- Encryption Demo and Use-Case Recommendations for Data at Rest vs. In Transit
Compliance & Governance
- Creating a Cybersecurity Compliance Checklist for HIPAA or PCI-DSS
- Audit Readiness Assessment: Preparing for a Security Audit
- Aligning IT Policies with Organizational Security Goal
Additional company criteria
Companies must answer the following questions to submit a match request to this experience: