{"id":295,"date":"2018-03-13T09:42:41","date_gmt":"2018-03-13T15:42:41","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=295"},"modified":"2021-08-30T13:08:20","modified_gmt":"2021-08-30T19:08:20","slug":"applying-for-an-internship","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2018\/03\/13\/applying-for-an-internship\/","title":{"rendered":"Applying for an Internship"},"content":{"rendered":"<p>I&#8217;m often approached by students who are wondering what they need to do to become more marketable for an internship.\u00a0 First, pursuing an internship is a great way to build practical experience and also a way to show your skills to a prospective employer.\u00a0 These are competitive positions however and there are a few things you should keep in mind on your journey to secure a position.<\/p>\n<p>Generally an internship is going to be most beneficial after you have completed the first year of your program.\u00a0 That means by starting to consider an internship early you still have time to make yourself more marketable.\u00a0 Employers are going to be looking for someone they can benefit from with the potential of hiring in the future, that means you need to be competitive with others.\u00a0 You should assume that everyone applying for the internship will be enrolled in a similar college program to you, so your grades need to be competitive.\u00a0\u00a0This is where most students stop, &#8220;I have good grades, hire me.&#8221;\u00a0 Unfortunately,\u00a0that is often not enough.\u00a0 Here are some other actions you can take to become more likely to likely to secure that coveted position.<\/p>\n<ul>\n<li>Any IT work you can do is valuable to put on a resume.\u00a0 That may mean working a help desk but that is a starting position.\u00a0 Some organizations are also looking for volunteers to help with setting up networks or administering systems.\u00a0 A good place to find these opportunities in your area are professional groups \u2013 see next bullet.<\/li>\n<li>Become a student member of ISACA, ISC2, OWASP, ACM, IEEE, or any other cybersecurity focused professional group in your area.\u00a0 Find a group that has a local chapter (google for those organizations in your area).\u00a0 They have speakers that provide great info and you make good connections for potential internships\/jobs<\/li>\n<li>Practice learning skills in a home lab. Start by downloading VM-Ware or Virtual box.\u00a0 Both have free versions.\u00a0 These allow you to set up a virtual machine on your computer.\u00a0 Then load a linux version such as Ubuntu or Fedora.\u00a0 Use your access to BU\u2019s Microsoft Imagine site and download Windows Server \u2013 practice working through them.\u00a0 You can set up a virtual network and share files between the machines to see how that works.\u00a0 Our library has several good resources on those topics<\/li>\n<li>Talk with our career center &#8211; <a href=\"http:\/\/www.bellevue.edu\/student-support\/career-services\/career-services\">http:\/\/www.bellevue.edu\/student-support\/career-services\/career-services<\/a>, they can help with info as well, especially with preparing for interviews, building a resume, etc.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m often approached by students who are wondering what they need to do to become more marketable for an internship.\u00a0 First, pursuing an internship is a great way to build practical experience and also a way to show your skills to a prospective employer.\u00a0 These are competitive positions however and there are a few things [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[34],"tags":[],"class_list":["post-295","post","type-post","status-publish","format-standard","hentry","category-careers"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}