Hands-On Learning in Cybersecurity

IT Instructor Guido Santella Speaks to Holidaysburg Junior High School
February 25, 2025
From Sheetz to Service: South Hills IT Students Refurbish Laptop for Local Toastmasters Club
April 7, 2025
IT Instructor Guido Santella Speaks to Holidaysburg Junior High School
February 25, 2025
From Sheetz to Service: South Hills IT Students Refurbish Laptop for Local Toastmasters Club
April 7, 2025

Cybersecurity Presentations

Future Cyber Defenders: IT Students Present Cybersecurity Plans

At South Hills School of Business & Technology, our Information Technology students don’t just study cybersecurity—they put their knowledge into action! As the spring term wrapped up, students in our Introduction to Cybersecuritycourse showcased their skills through engaging and insightful group presentations, applying what they’ve learned in a real-world scenario.

Hands-On Learning in Cybersecurity

The Introduction to Cybersecurity course provides students with a strong foundation in essential cybersecurity principles, threats, and best practices. Throughout the term, students explored:

  • Cybersecurity basics and key principles

  • Types of cyber threats and attack strategies

  • Security measures and best practices

  • Network and system security

  • Ethical hacking and penetration testing

  • Cybersecurity laws and ethics

  • Incident response and risk management

  • Careers in cybersecurity

Each of these topics played a crucial role in the students’ final projects, where they demonstrated their ability to develop and present professional cybersecurity strategies.

The Final Project: Cybersecurity in Action

For their final assignment, students formed teams and assumed the role of Security as a Service providers. Their challenge? To design and present a comprehensive cybersecurity plan for a business, detailing how they would protect and maintain the organization’s digital infrastructure. Each team addressed critical elements of cybersecurity planning, including:

  • Conducting risk assessments to identify vulnerabilities

  • Setting security goals aligned with business needs

  • Selecting and implementing an appropriate security framework

  • Reviewing and enforcing security policies

  • Developing a risk management plan

  • Educating and training employees on cybersecurity awareness

  • Implementing a proactive security strategy

  • Maintaining and monitoring systems to prevent future threats

Showcasing Cybersecurity Expertise

During their presentations, students walked their audience through realistic security plans, demonstrating their understanding of risk mitigation, policy enforcement, and proactive cybersecurity strategies. Each team tailored their approach to meet the unique challenges of their assigned business scenario, showcasing creativity and critical thinking.

Through this hands-on experience, our IT students gained valuable insight into the practical applications of cybersecurity and how essential proactive security measures are in today’s digital world.

Preparing for the Future

Cybersecurity is a growing field with high demand for skilled professionals. By engaging in projects like these, South Hills students gain the experience and confidence needed to enter the workforce with a strong understanding of cybersecurity principles. The knowledge and skills developed in this course lay the foundation for future success in IT security, ethical hacking, risk management, and beyond.

Join the Next Generation of Cybersecurity Professionals

At South Hills, we believe in providing students with real-world learning experiences that prepare them for the challenges of tomorrow. If you’re interested in a career in Information Technology and Cybersecurity, explore our programs and take the first step toward a rewarding and in-demand profession!

📷 Check out some snapshots from our students’ cybersecurity presentations below!

Comments are closed.

Hands-On Learning in Cybersecurity
This website uses cookies to improve your experience. By using this website you agree to our Data Protection Policy.
Read more