Cybersecurity - Q3 (2025)


Experience scope
Categories
Security (cybersecurity and IT security) Information technology Hardware Networking Cloud technologiesSkills
presentations cloud infrastructure it risk management analytical skills incident response phishing fraud detection attack surface management security recommendations online communicationLooking to elevate your organization, and bring it to the next level? Bring on learners from Calbright College to be your learner-consultants, in a project-based experience. Learners will work on one main project over the experience of the semester, connecting with you as needed with virtual communication tools.
Learners will work individually or in small groups of 2-4 students, based on the number of students enrolled at the time.
*Project start date is flexible, but the self-assignment must be completed by September 15, and projects must be finished before September 30, 2025 ****Please note that your Project might not receive a student***
Learners in this program are developing the technical and analytical skills required to pursue careers in cybersecurity, information security, and IT risk management. Through hands-on projects and applied learning, they explore core security concepts across networking, systems, cloud infrastructure, and policy frameworks.
By the end of the course, learners are able to:
- Analyze security risks at the organizational and system levels
- Identify vulnerabilities across hardware, software, and communications layers
- Recommend and implement best practices in threat prevention and response
- Develop practical cybersecurity policies tailored to real-world business environments
This experience emphasizes both technical depth and strategic thinking, preparing learners to add value in consulting-style projects or internal audits for small businesses, startups, and enterprise systems alike.
Learners
Deliverables are flexible and tailored to meet the unique needs of each organization while aligning with course learning objectives. Learners approach each project using a security-first mindset, providing clear documentation, recommendations, and client-friendly presentations.
Typical project outcomes may include:
- Security Assessments: Technical audits of websites, cloud platforms, or internal systems with an emphasis on identifying vulnerabilities and assessing risk.
- Threat Modeling and Risk Analysis: Visualizing attack surfaces and trust boundaries to evaluate exposure to phishing, brute force, bot attacks, and insider threats.
- Cybersecurity Policy Development: Drafting lightweight, practical policies for small or distributed teams on data access, password hygiene, device security, and incident response.
- Anti-Fraud Strategy: Evaluating and improving fraud detection and prevention mechanisms in web-based payment systems (e.g., CAPTCHA, 3D Secure, IP filtering).
- Security Recommendations and Implementation Plans: Actionable suggestions based on impact, cost, and effort—with optional implementation support when time and scope allow.
Project Examples
Requirements
*Project start date is flexible, but the self-assignment must be completed by September 15, and projects must be finished before September 30, 2025 ****Please note that your Project might not receive a student***
Examples of Past Projects
Here are examples of recent projects completed by learners in this course:
Website Security Hardening & Fraud Prevention
- Assessed and reported on vulnerabilities that enabled card testing attacks
- Recommended improvements in bot protection, HTTPS, and payment security
- Provided an anti-fraud best practices cheat sheet and optional implementation of fixes
Cybersecurity & Data Management Plan for a Remote Business
- Audited the security posture of a remote-first company’s tech stack (Google Workspace, Notion, Slack, etc.)
- Developed lightweight, remote-friendly policies for data handling, access control, and incident response
- Delivered a comprehensive cybersecurity roadmap with prioritized recommendations
Ideal Projects for Learners
Your organization might benefit from a student team if you are looking for support with:
- Website or web application security audits
- Cloud or SaaS platform security reviews
- Risk assessments for remote or hybrid teams
- Policy development for compliance, access control, or data protection
- Security feature configuration reviews (e.g., MFA, encryption, firewall, permissions)
- Research and implementation of anti-fraud tools
Additional company criteria
Companies must answer the following questions to submit a match request to this experience: