Cybersecurity Compliance
Timeline
-
February 7, 2022Experience start
-
February 8, 2022Project Scope Meeting
-
March 6, 2022Experience end
Timeline
-
February 7, 2022Experience start
-
February 8, 2022Project Scope Meeting
Meeting between students and company to confirm: project scope, communication styles, and important dates.
-
March 6, 2022Experience end
Experience scope
Categories
Security (cybersecurity and IT security) Information technology Artificial intelligence DatabasesSkills
online communication cyber security network security risk management researchLooking to elevate your organization, and bring it to the next level? Bring on students from Regent University to be your student-consultants, in a project-based experience. Students will work on one main project over the course of the semester, connecting with you as needed with virtual communication tools.
Students in this program will be provided an introduction to the essential principles of network security and risk management and the means currently in use to ensure competency among the cybersecurity workforces.
Learners
Deliverables are negotiable, and will seek to align the needs of the students and the organization.
Some final project deliverables might include:
- A 10-15 minute presentation on key findings and recommendations
- A detailed report including their research, analysis, insights and recommendations
Project timeline
-
February 7, 2022Experience start
-
February 8, 2022Project Scope Meeting
-
March 6, 2022Experience end
Timeline
-
February 7, 2022Experience start
-
February 8, 2022Project Scope Meeting
Meeting between students and company to confirm: project scope, communication styles, and important dates.
-
March 6, 2022Experience end
Project Examples
Requirements
Students in groups of 3 will work with your company to identify your needs and provide actionable recommendations, based on their in-depth research and analysis.
Project activities that students can complete may include, but are not limited to:
- Analyzing cybersecurity threats, trends, and strategies.
- Evaluating computer networks and systems in light of best practices in cybersecurity.
- Building organizational and technological structures to protect digital assets.
- Developing disaster recovery and business continuation plans.
- Assessing ethical security practices consistent with a Christian worldview and industry best practices.
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Be available for a quick phone/virtual call with the instructor to initiate your relationship and confirm your scope is an appropriate fit for the course.
Provide a dedicated contact person who is available for weekly/bi-weekly drop-ins to address students’ questions as well as periodic messages over the duration of the project.
Provide an opportunity for students to present their work and receive feedback.
Provide relevant information/data as needed for the project.
Timeline
-
February 7, 2022Experience start
-
February 8, 2022Project Scope Meeting
-
March 6, 2022Experience end
Timeline
-
February 7, 2022Experience start
-
February 8, 2022Project Scope Meeting
Meeting between students and company to confirm: project scope, communication styles, and important dates.
-
March 6, 2022Experience end