Delivering Cybersecurity Solutions : Feb-Apr, '25

CSCO1070
Open Closing on February 26, 2025
York University
Toronto, Ontario, Canada
Educator
(15)
5
Timeline
  • February 26, 2025
    Experience start
  • April 16, 2025
    Experience end
Experience
4/14 project matches
Dates set by experience
Preferred companies
Anywhere
Startup, Large enterprise, Non profit, Small to medium enterprise, Social Enterprise
Energy, It & computing, Science, Technology, Telecommunications

Experience scope

Categories
Security (cybersecurity and IT security) Information technology Software development Machine learning Artificial intelligence
Skills
cyber operations certification structure oversight committee (csoc) progress reporting cyber security project planning event management communication project schedules online communication requirements elicitation
Learner goals and capabilities

Are you seeking innovative solutions to real-world cybersecurity challenges while supporting the development of emerging talent? Collaborate with students from York University’s Cybersecurity program on a project-based experience tailored to your organizational needs.


Project Overview

Students will work on a customized cybersecurity project designed to address a specific challenge or opportunity within your organization. Possible project topics include, but are not limited to:

  • Developing a Cyber Security Operations Center (CSOC).
  • Cyber risk assessment and mitigation strategies.
  • Incident response and disaster recovery planning.
  • Threat intelligence and vulnerability analysis.
  • Security architecture and system hardening.
  • Governance, risk, and compliance (GRC) frameworks.


Students will engage with your organization virtually using communication tools of your choice. They are available to contribute up to 39 hours from February 25th to April 8th, ensuring a focused and efficient collaboration.

Learners

Learners
Continuing Education
Beginner, Intermediate, Advanced levels
44 learners
Project
39 hours per learner
Learners self-assign
Teams of 5
Expected outcomes and deliverables

To achieve the project goals, students will complete the following tasks:


  1. Initial Engagement and Project Setup


  • Students will submit the selected engagement for the course, group information, a brief project description, and a high-level project schedule.
  • The project schedule and engagement details will require acknowledgment by the client (via email confirmation).


2.Bi-Weekly Progress Reporting


  • Students will submit a progress report every two weeks to both the client and the course instructor.
  • Reports will include:
  • Progress to date.
  • Key milestones achieved.
  • Identified risks and issues during the reporting period.
  • Potential issues (if applicable).


3.Final Project Report and Recommendations


  • At the end of the project, students will submit a detailed report summarizing:
  • The success of the engagement.
  • Challenges faced and solutions implemented.
  • Key learnings from the project.
  • Recommended next steps for the client to enhance and build upon the deliverables.


Deliverables


At the conclusion of the project, you will receive a comprehensive deliverable tailored to your selected cybersecurity focus. This could include:

  • Technology Design: A detailed blueprint of system or architecture design.
  • People Requirements: Recommendations for organizational structure, management roles, and training needs.
  • Processes: Frameworks for event management, change management, incident response, and threat management, among others.


Client Support Requirements

To ensure the success of this collaboration, the client will:


  • Assign a Single Point of Contact (SPOC) responsible for communication between the organization and the student group.
  • The SPOC will join weekly meetings with the project team and provide ongoing feedback.
  • Review and Approve Deliverables: Deliverables should be reviewed within two business days to maintain project timelines.
  • Acknowledge Progress Reports: Progress reports will require client acknowledgment to confirm alignment and continued progress.
  • This structured approach ensures a productive and meaningful partnership while delivering valuable outcomes for your organization.
Project timeline
  • February 26, 2025
    Experience start
  • April 16, 2025
    Experience end

Project Examples

Requirements
  • Penetration Testing: Conduct vulnerability assessments, web app security tests, or phishing simulations.
  • Policy Development: Create security policies, compliance frameworks, or BYOD guidelines.
  • Cybersecurity Operations: Design SOC frameworks, incident response plans, or SIEM monitoring workflows.
  • Machine Learning: Develop ML models for phishing detection, network anomaly detection, or malware classification.
  • Cloud Security: Assess cloud configurations, design secure architectures, or implement cloud access controls.
  • Threat Intelligence: Analyze threat feeds, create industry threat reports, or integrate intelligence into SIEM platforms.

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

Are you able provide 2-4 hours speaking with students for 6 weeks?