
Vancouver, British Columbia, Canada
Experience
2/3 project matches
Dates set by experience
Preferred companies
Anywhere
Any company type
Any industries
Experience scope
Categories
Security (cybersecurity and IT security) Information technology Machine learning Artificial intelligence HardwareSkills
cyber security strategy intrusion detection systems embedded systems vulnerability assessments technical documentation vulnerability problem solving innovation artificial intelligence data as a service (daas)This experience focuses on equipping learners with fundamental cybersecurity skills and tools, particularly in the context of embedded systems and AI-based solutions. Participants will gain practical knowledge in identifying vulnerabilities, implementing security measures, and developing innovative solutions to protect embedded systems. By applying their classroom knowledge, learners can tackle real-world cybersecurity challenges, enhancing their problem-solving capabilities and technical expertise.
Learners
Learners
Graduate
Intermediate levels
15 learners
Project
20 hours per learner
Educators assign learners to projects
Teams of 5
- Comprehensive vulnerability assessment report for an embedded system
- Prototype of an AI-based intrusion detection system, anomaly detection system
- Implementation of security protocols for a specific embedded device
- Technical documentation outlining cybersecurity solutions
- Presentation of cybersecurity strategies and solutions to stakeholders
Project timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
-
July 19, 2025Experience end
Timeline
-
May 20, 2025Experience start
-
July 15, 2025Project Demo
Project demonstration followed by a technical report will be required to complete the course INCS 810.
-
July 19, 2025Experience end
Project Examples
Requirements
- Developing a security framework for IoT devices used in smart homes
- Creating an AI-driven anomaly detection system for industrial control systems
- Designing a secure communication protocol for automotive embedded systems
- Evaluating and enhancing the security of a wearable health monitoring device
- Implementing encryption techniques for data transmission in embedded systems
- FaaS for IoT edge, fog and cloud computing, serverless functions, and database management
- Conducting a security audit of a consumer electronics product
- Developing a risk management plan for an embedded system in a healthcare setting
- Designing a secure boot process for an embedded operating system
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Q1 - Text short
Q2 - Text short
Q3 - Text short
Q4 - Text short
Q5 - Text short