{"id":12527,"date":"2019-11-26T14:40:39","date_gmt":"2019-11-26T19:40:39","guid":{"rendered":"https:\/\/web.uri.edu\/cs\/?page_id=12527"},"modified":"2021-08-02T16:15:59","modified_gmt":"2021-08-02T20:15:59","slug":"experiential-learning","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/experiential-learning\/","title":{"rendered":"Experiential Learning"},"content":{"rendered":"<h1>Professional Science Masters Degree in Cyber Security<\/h1>\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"psm\" data-show-title=\"0\"><ul id=\"menu-psm\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-10252\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-10252\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/\">Overview<\/a><\/li>\n<li id=\"menu-item-10249\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-10249\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/professional-masters-cybersecurity\/curriculum\/\">Curriculum<\/a><\/li>\n<li id=\"menu-item-17000\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-17000\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/current-cybersecurity-graduates\/\">Active Students<\/a><\/li>\n<li id=\"menu-item-16559\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-16559\"><a href=\"https:\/\/web.uri.edu\/cs\/academics\/cybersecurity-scholarships\/\">Scholarships<\/a><\/li>\n<\/ul><\/nav><\/section>\n<h2>Graduate Cybersecurity Internships (CSF 590)<\/h2>\n<p>As part of the internship process, students will develop an internship proposal with a set of objectives and a statement of work acceptable to the student, the industrial sponsor, and the university faculty advisor. Students may seek to obtain or foster cybersecurity internships with any organization, including their current employer.<\/p>\n<h3>Internship Proposal Requirements and Description<\/h3>\n<div class=\"cl-wrapper cl-card-wrapper\"><a class=\"cl-card   right\" href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSeZ_zRh0MIJ1jB7ELYDl78ASFYrQFVr7tC0tO3ZGuKvSpMnFA\/viewform\" title=\"\"><div class=\"cl-card-container text\"><div class=\"cl-card-text\"><h2>Experiential Registration<\/h2><p>Students should complete this online form at least one semester before they expect to register for CSF 590 internship.<\/p><\/div><\/div><div class=\"cl-card-container button\">Register<\/div><\/a><\/div>\n<p>Using the project description as a basis, the student will develop a set of objectives and a statement of work acceptable to the student, the business sponsor, and the university faculty advisor. The proposal will serve as the standard agreement between the parties. A project proposal must be completed and approved before a student can register for CSF 590.<\/p>\n<h3>Proposal Requirements and Description<\/h3>\n<ul>\n<li>Sponsoring Organization<\/li>\n<li>Project Description<\/li>\n<li>Statement of Work<\/li>\n<li>Schedule<\/li>\n<li>Skills Required<\/li>\n<li>Skills to be Learned<\/li>\n<\/ul>\n<p>&nbsp;Possible Projects:<\/p>\n<ul>\n<li>Developing cybersecurity and information assurance policies for employees<\/li>\n<li>Security audits of devices and systems in the company<\/li>\n<li>Incident Response to cyber attacks<\/li>\n<li>Firewall configuration or monitor<\/li>\n<li>Equipment procurement (with respect to security aspects)<\/li>\n<li>Software Development (secure coding practices)<\/li>\n<li>Digital Forensics Investigations<\/li>\n<li>Litigation support of digital evidence<\/li>\n<li>Monitoring IDS\/IPS systems<\/li>\n<li>Physical Security and IT Assets<\/li>\n<li>IT Support and Business Analysis<\/li>\n<li>Malware mitigation and analysis<\/li>\n<\/ul>\n<p>Department Contact: Michael Conti &#8211; <a href=\"mailto:michaelconti@uri.edu\">michaelconti@uri.edu<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professional Science Masters Degree in Cyber Security Graduate Cybersecurity Internships (CSF 590) As part of the internship process, students will develop an internship proposal with a set of objectives and a statement of work acceptable to the student, the industrial sponsor, and the university faculty advisor. Students may seek to obtain or foster cybersecurity internships [&hellip;]<\/p>\n","protected":false},"author":1322,"featured_media":0,"parent":10228,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-12527","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/users\/1322"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/comments?post=12527"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12527\/revisions"}],"predecessor-version":[{"id":15668,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12527\/revisions\/15668"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/10228"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/media?parent=12527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}