Cybersecurity & Privacy in Business Practice
Main contact

Timeline
-
September 8, 2025Experience start
-
October 28, 2025Mid-term check-in with employer
-
December 13, 2025Experience end
Timeline
-
September 8, 2025Experience start
-
October 28, 2025Mid-term check-in with employer
-
December 13, 2025Experience end
Experience scope
Categories
Security (cybersecurity and IT security)Skills
privacy impact assessments identity and access management incident response business process design elements and principles data protection strategy cyber security risk management quality auditing cyber riskThis experience is designed to bridge the gap between theoretical knowledge and practical application in the field of cybersecurity and privacy. Learners will gain a comprehensive understanding of cybersecurity threats, risk management, governance, and compliance, as well as privacy by design principles and data protection strategies. By applying these concepts, learners can assist companies in enhancing their cybersecurity posture and ensuring compliance with relevant regulations. The program equips learners with the skills to conduct privacy impact assessments, manage identity and access, and respond effectively to cyber incidents, making them valuable assets for industry projects.
Learners
- Conduct a Privacy Impact Assessment (PIA) for a specific business process.
- Develop a cybersecurity risk management plan tailored to a company's needs.
- Create a compliance audit checklist based on relevant privacy and security regulations.
- Design an incident response plan for a simulated cyber attack scenario.
Project timeline
-
September 8, 2025Experience start
-
October 28, 2025Mid-term check-in with employer
-
December 13, 2025Experience end
Timeline
-
September 8, 2025Experience start
-
October 28, 2025Mid-term check-in with employer
-
December 13, 2025Experience end
Project examples
- Analyze and improve the cybersecurity posture of a small to medium-sized enterprise (SME).
- Develop a vendor risk management framework for a company using cloud services.
- Conduct a tabletop exercise to test a company's incident response capabilities.
- Create a data classification and lifecycle management strategy for a business.
- Evaluate the effectiveness of a company's current cybersecurity policies and suggest enhancements.
- Design a training module on phishing and social engineering awareness for employees.
- Analyze a recent Canadian data breach and propose a response strategy for a similar incident.
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Main contact

Timeline
-
September 8, 2025Experience start
-
October 28, 2025Mid-term check-in with employer
-
December 13, 2025Experience end
Timeline
-
September 8, 2025Experience start
-
October 28, 2025Mid-term check-in with employer
-
December 13, 2025Experience end