Networking & IT Security

Timeline
-
September 3, 2024Experience start
-
December 3, 2024Experience end
Experience scope
Categories
Security (cybersecurity and IT security) Information technology Databases Networking CommunicationsSkills
project planning business consulting business strategyComputer networking has become an integral part of today’s business environment. The major in Networking and IT Security prepares graduates with theoretical and hands-on knowledge and skills in planning, designing, installing, operating, managing, and securing information technology infrastructure. In addition to the technical courses, the core curriculum includes mandatory courses in business and management, providing students with the necessary business background and technological skills to make significant contributions in today’s workplace.
Beginning in September 2024, teams of 3-5 students will work with your organization to support you with achieving your key business objectives by developing a recommended plan of action.
* Please note that the course dates are subject to change depending on University scheduling*
Learners
- Project plan and weekly status reports
- Final project report with recommendations and an executive summary
- Presentation of recommendations from top one or two teams (via a virtual webinar format)
Project timeline
-
September 3, 2024Experience start
-
December 3, 2024Experience end
Project Examples
Requirements
Real-Time Data Visualization
- A charting system with basic querying functionality.
- A dashboard to visualize key performance metrics of your organization or tool.
- Outcomes
- The original documentation for the architectural design of the system.
- The source code for the system implemented.
Database Analysis
- Finding an improved data storage solution.
- Decreasing query execution time.
- Improving and normalizing table schema.
- A report detailing the problem, recommended solutions, and concrete action plan including code/sql/scheme to put the solution into place.
- All source code used throughout the project, in the form of an online repository (github, gitlabetc.) or a compressed folder (zip, tar). Please ensure we have sufficient privileges to view any online source code.
IT Security Analysis
- Analyze data from cybersecurity incidents
- Implement/Deploy new cybersecurity applications
- Penetration testing of new applications
- Assist with reviewing and creating cybersecurity policies
- Design & deliver cybersecurity awareness training
- Research & deliver a risk assessment for the organization
- Review technology architecture of an organization and deliver a report on how to improve
- Vulnerability analysis report
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Timeline
-
September 3, 2024Experience start
-
December 3, 2024Experience end