Individual Reflection

                                                                                            What Went Right          This project allowed me to apply what I would learned in the classroom to a real-world issue. Working with a small business customer allowed me to learn how cybersecurity practices affect real people and organizations. Our team was able to collaborate successfully. When we were assigned defined duties, our communication and progress improved dramatically. As the research and technical lead, I was able to evaluate the client’s cybersecurity issues and translate them into actionable solutions. We successfully executed a comprehensive risk assessment, developed a clear and visually appealing presentation, and created supplementary documents such as a streamlined Incident Response Plan. I was extremely content with how we took the effort to personalize our offerings to the demands and scale of the firm.                                                                                         What Went Wrong           Several issues impacted the project’s pace and structure. Early in the semester, we had problems obtaining continuous contact from our client. This delayed some of our preparation and prompted us to proceed based on our knowledge, followed by faculty validation. In addition to communication obstacles, formatting challenges led to delays. Our slides had to be changed several times to match the required visual standards, which added time and pressure near the conclusion of the project. Another challenge was the distribution of labor within the team. Initially, it was unclear who would undertake specific responsibilities, resulting in duplication in some areas. Fortunately, we responded fast and established a more disciplined workflow to stay on schedule.                                                                                         Lessons Learned          From this event, I learned the value of adaptability and proactive communication. Noteverything will go as planned in a real-world project, thus it is critical to adapt to the reality. I also learned to take the initiative in research, especially when the client provided limited information. If I could start over on this project, I would schedule a virtual meeting with the customer right away and set up a shared tracking system for the team to track progress. I would also spend more attention on presentation design early in the process to avoid last-minute changes. Overall, I learned how to strike a balance between technical material and user-friendly language, which is useful when working with clients that may lack technical expertise. 

                                                          Learning Objectives from the Memorandum of Agreement1. Practical application of classroom knowledge.          The objective was completely met. I used my knowledge of risk assessment frameworks, threat identification, and incident response planning in a practical situation. Concepts from past cybersecurity courses were directly applied to our investigation and deliverables.2. Collaboration and communication in a team environment          This goal was successfully accomplished. Our three-person team met on a regular basis, communicated updates, and worked together to revise our work. We helped each other produce content, prepare scripts, and reply to client requests.3. Exposure to cyber threat intelligence.          This goal was partially achieved. While we did not interact with live threat feeds or real-time security data, I did research on threat trends affecting small businesses and used resources such as IC3.gov to support our risk assessment. This nevertheless gave me valuable exposure to basic cybersecurity threats.4. Understanding of Industry Best Practices

          This purpose was definitely achieved. We suggested best practices like multi-factor authentication, data encryption, regular backups, and phishing training. We also mentioned NIST controls and underlined basic yet efficient solutions suitable for small businesses.

5. Research and innovative cybersecurity solutions.          This learning objective was completely met. I looked into low-cost tools and training resources, such as Google’s Phishing Quiz, and developed a one-page Incident Response Plan that the business owner could actually employ. This method needs both technical knowledge and creativity.                                                                    Most Exciting Aspects of the Internship          The most exciting aspect of this internship was seeing our efforts make a tangible impact. The fact that our advice could help a small firm enhance its cybersecurity posture made the endeavor more relevant. I also enjoyed presenting to our professors and classmates since it allowed me to express technical thoughts clearly and effectively. Working with a real client made the experience feel like a job rather than a class project, which was both inspiring and fulfilling.                                                         The most challenging aspects of the internship          The most difficult aspect of this internship was managing time. This assignment took place during a busy period of the semester, and juggling it with other academic obligations necessitated meticulous planning. In addition, we encountered difficulties with presentation design, particularly when it came to combining images and presenting information in a way that made sense to a non-tech client. These challenges motivated me to enhance my communication, time management, and presenting skills.                                                                Recommendations for Future Interns

          I would advise future interns to anticipate deadlines and take initiative. If communication with the client is slow, keep working and use research and instructor guidance to fill in any gaps. It is also critical to learn technologies like Canva and PowerPoint early on, as they are required for developing strong deliverables. I advocate scheduling weekly team meetings and developing a shared document to manage roles, progress, and edits. Finally, do not be reluctant to ask for clarification or feedback—small changes made early on help save bigger difficulties later.                                                                                     Conclusion          This internship has helped me develop professionally and personally. My main conclusion is that cybersecurity consulting necessitates not only technical expertise, but also effective communication and problem-solving abilities. I learnt how to turn technical results into client-ready recommendations, which I will apply to my future job. As I continue my studies at ODU, I intend to use the skills I learned here in my capstone and other team-based projects. This internship increased my confidence in my abilities to engage with genuine clients and fueled my interest in cybersecurity consulting. Professionally, this experience confirmed my desire to work in areas like research, risk analysis, and client interaction. I now have a better idea of how I want to thrive after graduation.                                                                           Course Suggestions          I think this course offers a valuable experience and should absolutely keep the real client component. It pushes students to go beyond the classroom and deal with realistic challenges. I would recommend adding a few templates at the beginning of the semester, such as sample phishing training, simplified IRPs, and design examples. It would also help to have a scheduled faculty check-in halfway through the semester to realign goals and expectations. Overall, this course was an excellent introduction to cybersecurity consulting in a professional setting.

Stay connected.

Welcome to a platform where cybersecurity becomes more than a skill—it's a passion. Let's embark on this transformative journey together. Welcome aboard, Cyber Defender!

Copyright © 2026 Wilondja Jacob