InternBoot | Internship Portal

Internship Program

Cybersecurity Internship

Master ethical hacking, vulnerability assessment, penetration testing, and security operations with hands-on labs and real-world simulations.

Linux Networking VAPT OWASP Metasploit SIEM
Program Overview

Our Cybersecurity Internship provides hands-on exposure to ethical hacking, vulnerability assessment, penetration testing, and security operations. Participants will learn to identify threats, exploit vulnerabilities, secure networks, and respond to incidents using industry-standard tools and methodologies across 15 comprehensive modules.

Curriculum Modules
Module 01
Introduction to Cybersecurity & Internship Overview
  • What is Cybersecurity?
  • The CIA Triad
  • Threat Landscape in 2025
  • Ethical Hacking Overview
  • Phases of the Cyber Kill Chain
Module 02
Networking & Network Security
  • Networking Basics
  • OSI Model and TCP/IP
  • IP Addressing, Ports, and Protocols
  • Network Security Overview
Module 03
Linux Essentials for VAPT
  • Why Linux for Cybersecurity?
  • Linux File Structure
  • Basic to Intermediate Commands
  • File Permissions
Module 04
Footprinting and Reconnaissance
  • What is Reconnaissance?
  • Passive Reconnaissance
  • Active Reconnaissance
  • Recon Tools Overview
Module 05
Scanning & Enumeration
  • What are Scanning and Enumeration?
  • Scanning Tools and Techniques
  • Enumeration Techniques
Module 06
Web Application Security — OWASP Top 10 (Part 1)
  • What is OWASP Top 10?
  • A01–A05 Vulnerabilities
  • Mitigation Strategies
Module 07
Web Application Security — OWASP Top 10 (Part 2)
  • A06–A10 Vulnerabilities
  • Mitigation Strategies
  • Case Study: Facebook's IDOR Bug Bounty
Module 08
Vulnerability Assessment
  • What is Vulnerability Assessment?
  • Types of Vulnerabilities
  • Vulnerability Scanners
  • Case Study: Analyzing CVE Entries
Module 09
Penetration Testing Process
  • What is Penetration Testing?
  • VAPT Lifecycle
  • Rules of Engagement and Reporting
  • Case Study: VAPT Report Walkthrough
Module 10
Exploitation Techniques
  • What is Exploitation?
  • Buffer Overflow Basics
  • Metasploit and Privilege Escalation
  • Case Study: EternalBlue (MS17-010)
Module 11
Wireless & Mobile Security
  • Wireless Security Overview
  • WiFi Attacks (WEP/WPA)
  • Android Security
Module 12
Malware & Reverse Engineering Basics
  • What is Malware?
  • Types of Malware
  • Static and Dynamic Analysis
Module 13
Security Operations and SIEM
  • What is Security Operations?
  • SIEM and Log Analysis
  • Incident Response Basics
Module 14
Reporting & Communication
  • Importance of Reporting
  • Writing a VAPT Report
  • Presenting to Stakeholders
Module 15
Capstone Simulation
  • Capstone Overview
  • Simulation Guidelines
  • Team-Based VAPT Simulation
  • Presentations and Feedback

Program Outcome

By the end of the internship, participants will have hands-on experience with ethical hacking, vulnerability assessment, penetration testing, and security operations — equipped with the foundational skills to pursue a career in cybersecurity.

CIA Triad Networking Linux Reconnaissance OWASP Top 10 VAPT Exploitation Metasploit Wireless Security Malware Analysis SIEM Reporting