Abigail Louie
Abigail Louie
Learner
(1)
34
Three of Cups - 3oC
Three of Cups - 3oC
Toronto, Ontario, Canada

Digital Marketing Strategy and Content Creation for 3oC

The goal of this project is to assist 3oC in increasing its social media presence and growing its following by communicating the unique value of its digital trust system. Students will help review and develop content, strategize for social media growth, and recommend SEO tactics to enhance online visibility.

Matches 2
Category Digital marketing + 3
Closed
Project: Human City
Project: Human City
Toronto, Ontario, Canada

CityLayer Urban Planning Module Enhancement

Project: Human City is seeking a team of learners to enhance its CityLayer software, aiming to transform it into a comprehensive urban planning tool. The current software provides basic functionalities, but the goal is to expand its capabilities to support a wider range of urban planning tasks. This project involves integrating new features that allow for detailed zoning analysis, infrastructure planning, and environmental impact assessments. The learners will apply their knowledge of software development and urban planning principles to create a user-friendly interface that meets the needs of urban planners. The project will focus on improving data visualization and user interaction to facilitate better decision-making processes. By the end of the project, CityLayer should be a robust tool that urban planners can rely on for efficient and effective planning.

Matches 3
Category Software development + 4
Open
Mechanic On Call
Mechanic On Call
Markham, Ontario, Canada

Security & Penetration Testing of Web Application

A standard practice for web based tools is to conduct what is known as penetration tests at least once a year. This is a white-hat hacking approach in which a firm is given special permission to try and break into, exploit, or otherwise attempt to break a given product via security vulnerabilities. First, we would like students to get familiar with our product. Sign up, play around with it, understand generally how it works. Second, students should spend time conducting research on state of the art pen testing technologies. They should look into common vulnerability lists such as OWASP Top 10, and common security tools such as Nmap, Burp Suitar, Nessus, and Wireshark. Third, students should have a written attack plan and present it to us so we can confirm we understand what the test will do and what might be uncovered. Fourth, students are free to attack our product as per the presented plan

Matches 1
Category Security (cybersecurity and IT security) + 4
Open