1. What is the WGU School of Technology x Riipen program?
This initiative connects employers with WGU School of Technology learners for short-term, real-world project experiences conducted remotely through the Riipen platform. Projects are co-curricular (outside of academic credit) and designed to help learners build practical skills while contributing meaningfully to real organizational challenges.
About the Learners:
Enrolled in WGU’s B.S. in Cybersecurity and Information Assurance, a program built on industry needs and hands-on skill development
Have completed foundational and intermediate coursework, with core competencies in IT, networking, and security
Hold industry-recognized certifications including CompTIA A+, Network+, and Security+
Have completed a minimum of two program terms and passed a competitive screening process by WGU Career Services
Demonstrated strong dedication, professionalism, and readiness to contribute to industry-aligned projects
Project Details:
Beginner/Entry-level scope
40–60 hours per learner, completed over 4–8 weeks
1 project per learner
5 learners per project, self-assigned on a first-come, first-served basis
Learners complete the project remotely and independently
Projects will focus on technology disciplines, including general IT, networking, and cybersecurityDesigned to build practical skills and workplace readiness
Projects must start by June 23, 2025 and completed by August 18, 2025.
Employers play a key role in guiding projects and providing feedback. This is a valuable opportunity to support emerging tech talent and receive meaningful contributions from skilled learners ready to make an impact.
2. What types of projects can I post?
You can post projects in areas such as:
Cybersecurity & Risk Management
Conducting a Basic Cybersecurity Risk Assessment for a Small Business
Security Policy Review and Recommendations for Compliance (e.g., NIST, ISO)
Creating a Cybersecurity Awareness Training Plan for Employees
Developing an Incident Response Playbook for Common Security Threats
Business Continuity and Disaster Recovery (BCDR) Plan
Networking & Infrastructure
Network Security Audit and Hardening Recommendations
Mapping and Evaluating Network Topologies for Security Risks
Firewall and Access Control Rule Set Review for a Simulated Company Network
Setting Up and Testing a Virtual Private Network (VPN) in a Lab Environment
System Security
Operating System Hardening and Vulnerability Mitigation Report (Windows/Linux)
User Access Control and Role-Based Permissions Analysis
Secure Configuration of a Client-Server Environment (Using Virtual Machines)
Security Tools & Practices
Testing and Documenting the Use of an Intrusion Detection System (IDS)
Log Monitoring and Analysis to Detect Potential Security Incidents
Encryption Demo and Use-Case Recommendations for Data at Rest vs. In Transit
Compliance & Governance
Creating a Cybersecurity Compliance Checklist for HIPAA or PCI-DSS
Audit Readiness Assessment: Preparing for a Security Audit
Aligning IT Policies with Organizational Security Goal
3. What is the time commitment for employers?
We aim to keep your involvement efficient. Employers should plan for approximately 5 hours across the project to provide initial project details and offer check-ins or feedback if needed.
4. Are there any costs associated with participating?
No. Participation in the WGU + Riipen co-curricular program is free for employers.
5. What kinds of deliverables will learners produce?
Depending on the project type, learners may produce:
Cybersecurity Risk Assessment Report
A professional report identifying key risks, vulnerabilities, and recommendations based on a mock or real organization’s IT setup.
Security Policy or Compliance Checklist
A customized or templated policy (e.g., password policy, acceptable use policy) or a checklist aligned with standards like NIST, HIPAA, or PCI-DSS.
Network Diagram and Security Audit Summary
Visual maps of existing or proposed network setups, along with notes on security gaps and mitigation strategies.
Training or Awareness Materials
Slide decks, short videos, or one-pagers for non-technical audiences—e.g., cybersecurity best practices for employees.
Log Analysis Report
A sample system log or dataset analyzed for suspicious activity, with interpretation and suggested actions.
Secure Configuration Guide
Documentation of how a system (e.g., Linux server or Windows workstation) was configured securely, including screenshots and justifications.
Presentation or Summary Deck
A final presentation outlining project goals, process, and results—aimed at a non-technical stakeholder audience.
These deliverables are designed to offer actionable insights for your organization.
6. What are the Learners capable of?
Learners in this program have developed foundational and intermediate-level competencies across IT and cybersecurity domains. By the time they reach the project stage, they will have:
A solid grounding in core IT concepts, including computer hardware, software, operating systems, and system administration.
Proficiency in network infrastructure and protocols, with the ability to configure and troubleshoot basic network systems and ensure secure connectivity.
Understanding of cybersecurity principles, including threat modeling, risk assessment, and common security threats and mitigation strategies.
Experience with security tools and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), and basic cryptography applications.
Knowledge of ethical and legal considerations in information assurance, as well as compliance frameworks and standards such as NIST and ISO.
Applied skills in systems and network security, including securing client/server environments, access control, and incident response planning.
These learners are prepared to contribute to real-world cybersecurity projects with a practical, solutions-oriented mindset and are developing the skills needed to grow into roles such as junior cybersecurity analysts or IT security specialists.
For more information, you can view the WGU program guide. At a minimum, learners will have completed up to Network and Security - Applications.
6. How are learners selected for projects?
Learners browse available projects on the Riipen platform and self-assign based on their interests and skillset.
7. What support do learners receive?
Learners receive detailed project outlines, support from the Riipen team, and general guidance from WGU. While learners are expected to manage their work independently, employers are expected to provide up to 5 hours of support per learner, which may include clarifying project details or occasional check-ins. Employers are also required to provide feedback upon project completion.
8. What if the learner’s work doesn’t meet expectations?
These experiences are primarily developmental. Learners are learning through application, and final deliverables may vary in polish. However, learners are expected to meet basic professional standards, and Riipen support is available if any major concerns arise.
9. What if my project needs to change or I need help adjusting it?
The Riipen team can assist you in modifying your project if needed. You can also contact Riipen’s support team at any time for help fine-tuning your project scope to better fit a learner experience. Once a project is officially approved and matched, changes cannot be made.
10. How does this differ from a traditional internship?
These are short-term, project-based experiences focused on specific deliverables rather than employment. Learners participate remotely and independently.
11. How do I get started?
Create a Riipen account (if you don’t already have one) and join the WGU School of Technology employer portal. Post your project, review applications, and get matched with motivated learners ready to build real skills while helping your organization. Visit Getting Started with Employers for more information.