Skip to content Skip to main nav
  • Log in
  • Sign up
  • Guests
USF LOGO
Center for Career & Professional Development
PART OF STUDENT SUCCESS
Access Handshake
Need Assistance?
  • Info for:
    • Audience
      • Undergraduate Students
      • Graduate Students
      • Prospective Students
      • Alumni
      • Faculty/Staff
      • Parents/Families
      • Employers & Industry Connections
    • Specialized Advice
      • Transfer Students
      • Veterans
  • Learn About:
    • Exploring Careers & Interests
    • Student Employment/FWS
    • Resumes, CVs, & Cover Letters
    • ePortfolios
    • Internships, Co-ops, & Jobs
    • Career Fair Prep
    • Interviewing
    • Networking & Informational Interviews
    • Negotiating an Offer
    • Preparing for Graduate or Professional School
    • ExCeL: USF’s New QEP
      • Infuse ExCeL into Experiences
  • Career Pathways
    • Exploring Options
    • Arts, Entertainment, & Media
    • Business, Consulting, & Entrepreneurship
    • Communication & Marketing
    • Education, Academia, & Non-profits
    • Engineering & Technology
    • Environment, Energy, & Sustainability
    • Law, International Relations, & Public Service
    • Health & Medical Professions
    • Life Sciences, Biotech, & Pharma
    • Manufacturing, Logistics, & Transportation
  • OneUSF
    • Tampa
    • St. Petersburg Campus
    • Sarasota-Manatee
  • Recruit at USF
  • Meet the Teams

Cyber Security Operations

Location: United States
Experience Type: Project Based Experience
  • Share This: Share Cyber Security Operations on FacebookShare Cyber Security Operations on LinkedInShare Cyber Security Operations on X

Investigate a cyberattack and conduct a comprehensive risk assessment with Datacom

Focus Designed for beginners; this immersive program simulates the fast-paced world of cybersecurity operations. It offers hands-on experience with real-world tasks that cybersecurity professionals handle daily, providing a solid foundation for those with little or no prior knowledge.

 

Step into the shoes of a cybersecurity team member with the Datacom Cybersecurity Simulation; an interactive journey that brings the challenges and responsibilities of the cybersecurity frontline to life. Through scenario-based exercises, you will build essential skills including risk assessment, threat research, data analysis, and crafting actionable recommendations. These core competencies form the backbone of effective cybersecurity teams and will boost your confidence while deepening your understanding of security best practices.

What Does It Mean to Be in Cyber?

 

When we talk about ‘Cyber’ or ‘Cybersecurity’, we’re referring to the practice of protecting computers, networks, programs, and data from unauthorized access, damage or theft. Every day, millions of people use technology – such as computers, smartphones, and the internet – and cyber threats can come from hackers, malware (harmful software), and even accidents or mistakes. Cybersecurity is all about keeping information safe and ensuring digital systems operate smoothly and securely.

 

What is Cybersecurity? The Big Picture

 

Cybersecurity involves many different “streams” or areas of focus. These streams each contribute toward protecting information and technology in unique ways, and together, they form the comprehensive cybersecurity landscape:

 

1. Governance, Risk and Compliance (GRC): This area focuses on how organizations create policies and measures to reduce their cybersecurity risks. It involves understanding which risks are most threatening, how to manage them, and making sure the company follows laws and rules about security. Think of it as the planning, rules, and oversight side of cybersecurity.

2. Threat Intelligence and Analysis: In this stream, cybersecurity teams study the behaviour of hackers and malicious software. They research new threats, analyse attacks, and try to predict what might happen next. This helps organizations prepare and defend themselves effectively.

3. Security Operations:

This is the “hands-on” part where teams monitor systems for attacks, respond to security incidents, and fix problems as they occur. It’s about keeping an eye on the network 24/7 to spot trouble early.

4. Technical Security Controls:

These include firewalls, antivirus software, encryption, and tools that actually stop or slow attacks.

 

How Do These Streams Relate to Your Tasks?

 

In this program, your assigned tasks focus mainly on Risk and Compliance and Threat Analysis – important areas for understanding how companies protect themselves from cyber-attacks at a strategic and operational level.
 

· In Task One: Security Breach Impact Analysis, you will act like a cybersecurity consultant investigating what went wrong after a cyber attack. You’ll analyze the damage, identify weaknesses that were exploited, and assess how the attack affects the organization’s business, legal standing, and reputation. This task builds your skills in responding to threats and making clear business-focused recommendations – key in threat analysis and incident management.

 

· In Task Two: Cybersecurity Risk Assessment, you will practice identifying what parts of a company’s technology and data are most valuable (the assets), what threats put those assets at risk, and how likely those risks are to happen. You will then prioritize these risks and compile a report of your findings.  This approach helps organizations manage risks before they turn into real problems.

 

By working through these tasks, you’ll learn how cybersecurity professionals assess threats, measure risks, and propose actionable steps to strengthen security policies and controls – all essential skills for a successful career in cybersecurity operations.

This program is self-paced. It takes approximately 3-4 hours to complete.

Skills Learned:

  • Introduction to Cyber Security

    • Information Security
    • Research
    • Analytical Skills
    • Open Source Intelligence
    • Communication
  • Cybersecurity risk assessment
    Conduct a comprehensive risk assessment

    • Risk Assessment
    • Risk Management
    • Security Analysis
  • Finish Line

Experience Information

Sponsor
Datacom
Learn More
Addye Buckley-Burnell, Ph.D.Forage logo
Forage Showcase your skills. Find your career fit.
facebookinstagramlinkedintiktoktwitter

Contact & Location

Phone
813-974-2171
Address

4202 E. Fowler Avenue, SVC 2088
Tampa, FL 33620

Career Service Hours

M Monday 8:00 a.m. - 5:00 p.m.
T Tuesday 8:00 a.m. - 5:00 p.m.
W Wednesday 8:00 a.m. - 5:00 p.m.
TH Thursday 8:00 a.m. - 5:00 p.m.
F Friday 8:00 a.m. - 5:00 p.m.

Meet the Team

Abbey Leier-Murphy Meet Abbey
Addye Buckley-Burnell, Ph.D. Meet Addye
Adelia Douglas Meet Adelia
Alex Perna Meet Alex
Alexa Abourizk Meet Alexandra
Alexandra Kulawsky Meet Alexandra
Amanda Marshall Meet Amanda
Carmen Goldsmith, Ph.D. Meet Carmen
Chad Wallace Meet Chad
Christa Kondraciuk Meet Christa
CJ Clyde Meet CJ
Diane Mellon Meet Diane
Donna Milakovic Meet Donna
Edson O'Neale Meet Edson
Heidi Phillips Meet Heidi
Ivan Montero Meet Ivan
Kaitlyn Ganner Meet Kaitlyn
Kim Steele Meet Kim
Nathaniel Barnes Jr. Meet Nathaniel
Nicolas Bloom Meet Nicolas
Sarah Pattison Meet Sarah
Selin Yaylali Meet Selin
Taylor Snipes Meet Taylor
Shruti Dhuri Meet Shruti
Phone
813-974-2171
Address

4202 E. Fowler Avenue, SVC 2088
Tampa, FL 33620

Blog Facebook Instagram LinkedIn YouTube
  • Accessibility
  • Popular Resources
  • How-to Use Popular Resources
  • Request a Presentation
  • Sign Up for Customized Newsletter
  • Blog
  • USF Career Events
  • Workshops On-Demand
  • Student Guide & Tip Sheets
  • Jobs, Internships, & Co-ops
  • Experiences
  • Meet the Team
Privacy Policy | Terms of Service
Copyright © 2026 University of South Florida
Powered by uConnect