Internship Program
Cybersecurity Internship
Master ethical hacking, vulnerability assessment, penetration testing, and security operations with hands-on labs and real-world simulations.
Linux
Networking
VAPT
OWASP
Metasploit
SIEM
Program Overview
Our Cybersecurity Internship provides hands-on exposure to ethical hacking, vulnerability assessment, penetration testing, and security operations. Participants will learn to identify threats, exploit vulnerabilities, secure networks, and respond to incidents using industry-standard tools and methodologies across 15 comprehensive modules.
- What is Cybersecurity?
- The CIA Triad
- Threat Landscape in 2025
- Ethical Hacking Overview
- Phases of the Cyber Kill Chain
- Networking Basics
- OSI Model and TCP/IP
- IP Addressing, Ports, and Protocols
- Network Security Overview
- Why Linux for Cybersecurity?
- Linux File Structure
- Basic to Intermediate Commands
- File Permissions
- What is Reconnaissance?
- Passive Reconnaissance
- Active Reconnaissance
- Recon Tools Overview
- What are Scanning and Enumeration?
- Scanning Tools and Techniques
- Enumeration Techniques
- What is OWASP Top 10?
- A01–A05 Vulnerabilities
- Mitigation Strategies
- A06–A10 Vulnerabilities
- Mitigation Strategies
- Case Study: Facebook's IDOR Bug Bounty
- What is Vulnerability Assessment?
- Types of Vulnerabilities
- Vulnerability Scanners
- Case Study: Analyzing CVE Entries
- What is Penetration Testing?
- VAPT Lifecycle
- Rules of Engagement and Reporting
- Case Study: VAPT Report Walkthrough
- What is Exploitation?
- Buffer Overflow Basics
- Metasploit and Privilege Escalation
- Case Study: EternalBlue (MS17-010)
- Wireless Security Overview
- WiFi Attacks (WEP/WPA)
- Android Security
- What is Malware?
- Types of Malware
- Static and Dynamic Analysis
- What is Security Operations?
- SIEM and Log Analysis
- Incident Response Basics
- Importance of Reporting
- Writing a VAPT Report
- Presenting to Stakeholders
- Capstone Overview
- Simulation Guidelines
- Team-Based VAPT Simulation
- Presentations and Feedback
By the end of the internship, participants will have hands-on experience with ethical hacking, vulnerability assessment, penetration testing, and security operations — equipped with the foundational skills to pursue a career in cybersecurity.
CIA Triad
Networking
Linux
Reconnaissance
OWASP Top 10
VAPT
Exploitation
Metasploit
Wireless Security
Malware Analysis
SIEM
Reporting