Cybersecurity
In the Cybersecurity internship program, you will gain practical skills to identify vulnerabilities, secure systems, and protect digital assets. Through hands-on projects, you’ll explore areas like network scanning, secure coding, VPN setup, and ethical hacking. You’ll also work with industry-standard tools like Nmap, Burp Suite, and OWASP ZAP—preparing
you for real-world cybersecurity practices from basic to advanced levels.
Level 1: Easy Projects
Task 1: Setting Up a Secure Password Manager
Problem Statement:
Learn about password security by setting up and using a password manager.
Steps to Complete:
- Research popular password managers (e.g., LastPass, Bitwarden)
- Install and configure a password manager
- Import/create secure passwords and organize them
- Explore features like password generation and autofill
Task 2: Understanding and Using Two-Factor Authentication (2FA)
Problem Statement:
Enable and test two-factor authentication on common online accounts.
Steps to Complete:
- Enable 2FA on Google, GitHub, or other services
- Use authenticator apps (e.g., Google Authenticator, Authy)
- Log in with and without 2FA to observe differences
- Document benefits and challenges
Task 3: Basic Network Scanning with Nmap
Problem Statement:
Perform a simple network scan to discover devices and open ports on your local
network.
Steps to Complete:
- Install Nmap on your system
- Run basic scans on your home network IP range
- Identify devices and their open ports
- Interpret scan results and potential risks
Level 2: Intermediate Projects
Task 4: Setting Up a Virtual Private Network (VPN)
Problem Statement:
Set up and configure a personal VPN server for secure internet access.
Steps to Complete:
- Choose a VPN solution (e.g., OpenVPN, WireGuard)
- Install and configure the VPN server on a cloud VM or local machine
- Connect a client device to the VPN
- Test secure browsing and document setup process
Task 5: Web Application Vulnerability Testing
Problem Statement:
Identify common vulnerabilities in a sample web application using security
tools.
Steps to Complete:
- Set up a vulnerable web app like DVWA or OWASP Juice Shop
- Use tools like OWASP ZAP or Burp Suite to scan for vulnerabilities
- Analyze results and list identified issues
- Suggest basic remediation steps
Task 6: Implementing Secure Coding Practices
Problem Statement:
Review and improve a simple codebase to eliminate common security flaws.
Steps to Complete:
- Review provided code for issues like SQL injection or XSS
- Refactor code to use parameterized queries and sanitizeinputs
- Test the application to verify vulnerabilities are fixed
- Document the changes made
Level 3: Advanced Projects
Task 7: Penetration Testing on a Virtual Environment
Problem Statement:
Perform a penetration test on a controlled virtual environment to identify and
exploit security flaws.
Steps to Complete:
- Set up a vulnerable VM environment (e.g., Metasploitable)
- Use penetration testing tools (e.g., Metasploit, Nmap, Nikto)
- Identify vulnerabilities and exploit them safely
- Prepare a penetration test report with findings and
recommendations
Task 8: Setting Up a Security Information and Event Management (SIEM) System
Problem Statement:
Deploy and configure a SIEM tool to monitor security logs and detect threats.
Steps to Complete:
- Install an open-source SIEM tool (e.g., Splunk, ELK Stack)
- Configure data sources and log collection
- Create alerts for suspicious activities
- Analyze logs and respond to simulated incidents
Task 9: Building a Secure Cloud Infrastructure
Problem Statement:
Design and implement security controls for a cloud-based infrastructure.
Steps to Complete:
- Set up a cloud environment with compute, storage, andnetworking
- Implement IAM roles and policies for least privilegeaccess
- Configure network security groups and firewalls
- Enable encryption for data at rest and in transit
