Objective
Learn fundamental and practical cybersecurity concepts including reconnaissance, vulnerability scanning, network security, SIEM analysis, malware basics, and ethical hacking methodologies. These tasks simulate real-world security workflows.
Features
- Ethical hacking basics & reconnaissance
- Network security scanning & analysis
- Password attacks & security hardening
- SIEM log analysis & incident response basics
- Reporting & documentation
Tools
Beginner Level Tasks
- Install Kali Linux or use a cloud lab environment.
- Perform basic Linux commands & file operations.
- Run an Nmap scan on your local network or a test machine.
- Capture and analyze basic packets using Wireshark.
- Create a simple cybersecurity terminology cheat sheet (15–20 terms).
Note: Out of the 4 main cybersecurity tasks given below, you must complete any 3 tasks.
Tasks (4)
Goal
Perform active reconnaissance and vulnerability scanning on a safe test system.
Requirements
- Use Nmap for port/service enumeration
- Run vulnerability scans using tools like Nikto or OpenVAS
- Document findings and security risks
Deliverables
- Scan results screenshots
- A short vulnerability report
Goal
Identify basic web vulnerabilities on a DVWA or demo test app.
Requirements
- Test for XSS, SQL Injection (safe demo environment only)
- Use Burp Suite to intercept requests
- Propose mitigation techniques
Deliverables
- Screenshots of findings
- Mitigation recommendations
Goal
Capture and analyze network packets to identify protocols and suspicious traffic.
Requirements
- Capture traffic for HTTP, DNS, TCP handshakes
- Analyze packet structure and flags
- Identify unusual or malformed packets
Deliverables
- Wireshark screenshots
- A short analysis report
Goal
Simulate a small cybersecurity incident and perform basic analysis.
Requirements
- Analyze suspicious log activity (Windows logs / SIEM sample logs)
- Identify possible Indicators of Compromise (IOCs)
- Document response steps and containment actions
Deliverables
- Incident report (PDF/DOC)
- List of detected anomalies
How to Submit Your Tasks
-
For each task:
- Create a separate document (DOC, DOCX, or PDF) explaining the task, screenshots, findings and tools used.
-
Upload your documents:
- Upload to Google Drive or GitHub (public link).
- Ensure all evidence files and screenshots are accessible.
-
Submit your links:
- Copy the public links and go to the Task Submission page.
- Paste the links clearly mentioning Task numbers.
Tip: Detailed reporting is crucial in cybersecurity — document every step!