Cybersecurity Internship

Toronto School of Management
Toronto, Ontario, Canada
Irene Lasker
Career Services Manager
(1)
3
Experience
14/30 project matches
Dates set by projects
Preferred companies
Anywhere
Any
Any industries

Experience scope

Categories
Security (cybersecurity and IT security) Information technology Databases Hardware Networking
Skills
research business consulting communication
Learner goals and capabilities

Looking to elevate your business, and bring it to the next level?

Bring on students from the Toronto School of Management' Cybersecurity Specialist program to be your virtual interns, in a project-based experience.

Students in this program explore all areas of the cyber world (Blockchain, Big Data, IoT, etc) and to gain practical experience with tools and technologies used in the industry, and are poised to succeed in the integrated work areas of tools and technologies used in the industry, documentation, and analysis of network traffic, operating systems, attach tools, encryption analysis, passwords, and basic Python programming.

Students are required to complete 240 hours of placement within 12 weeks.

These students are looking for both paid and unpaid internships with a preference for paid experiences. Please indicate in your project submission which you are able to offer.

Due to COVID-19 restrictions, student placements will only occur virtually.

Learners

Learners
Diploma
Any level
30 learners
Project
240 hours per learner
Learners apply to projects
Expected outcomes and deliverables

Deliverables will vary depending on the scope of the internship. However, these deliverables must be discussed and agreed upon prior to the start of the internship.

Project Examples

Requirements

Project examples that students can complete may include, but are not limited to:

  • Practicing to use tools such as Cryptool, Wireshark, Zenmap, nmap, Burp Suite, Snort, TCPdump, OpenVAS and OSSIM
  • Practicing Python programming language, SQL, Hyper-V, mobile simulator/emulators to perform cybersecurity lab experiments
  • Assessing risks to determine how security policies and protocols can be improved by studying computer systems and networks
  • Anticipating information security risks and implement new ways to protect organizations' computer systems and networks
  • Handling computer communication across multiple operation systems
  • Responding to security alerts and uncover and fix flaws in computer systems and networks
  • Utilizing technologies to perform or prevent cyberattacks of various types

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

  • Q - Checkbox
  • Q - Checkbox
  • Q - Checkbox