Cybersecurity Compliance

CYBR 660
Closed
Regent University
Virginia Beach, Virginia, United States
Professor
1
Timeline
  • February 7, 2022
    Experience start
  • February 8, 2022
    Project Scope Meeting
  • March 6, 2022
    Experience end
Experience
1/1 project matches
Dates set by experience
Preferred companies
Anywhere
Any
Any industries

Experience scope

Categories
Security (cybersecurity and IT security) Information technology Artificial intelligence Databases
Skills
online communication cyber security network security risk management research
Learner goals and capabilities

Looking to elevate your organization, and bring it to the next level? Bring on students from Regent University to be your student-consultants, in a project-based experience. Students will work on one main project over the course of the semester, connecting with you as needed with virtual communication tools.

Students in this program will be provided an introduction to the essential principles of network security and risk management and the means currently in use to ensure competency among the cybersecurity workforces.

Learners

Learners
Graduate
Any level
9 learners
Project
10 hours per learner
Learners self-assign
Teams of 3
Expected outcomes and deliverables

Deliverables are negotiable, and will seek to align the needs of the students and the organization.

Some final project deliverables might include:

  1. A 10-15 minute presentation on key findings and recommendations
  2. A detailed report including their research, analysis, insights and recommendations
Project timeline
  • February 7, 2022
    Experience start
  • February 8, 2022
    Project Scope Meeting
  • March 6, 2022
    Experience end

Project Examples

Requirements

Students in groups of 3 will work with your company to identify your needs and provide actionable recommendations, based on their in-depth research and analysis.

Project activities that students can complete may include, but are not limited to:

  • Analyzing cybersecurity threats, trends, and strategies.
  • Evaluating computer networks and systems in light of best practices in cybersecurity.
  • Building organizational and technological structures to protect digital assets.
  • Developing disaster recovery and business continuation plans.
  • Assessing ethical security practices consistent with a Christian worldview and industry best practices.

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:
  • question

    Be available for a quick phone/virtual call with the instructor to initiate your relationship and confirm your scope is an appropriate fit for the course.

  • question

    Provide a dedicated contact person who is available for weekly/bi-weekly drop-ins to address students’ questions as well as periodic messages over the duration of the project.

  • question

    Provide an opportunity for students to present their work and receive feedback.

  • question

    Provide relevant information/data as needed for the project.