Cybersecurity — Internship Tasks

Objective, Features, Technologies and tasks to learn Cybersecurity fundamentals and practical skills.

Objective

Learn fundamental and practical cybersecurity concepts including reconnaissance, vulnerability scanning, network security, SIEM analysis, malware basics, and ethical hacking methodologies. These tasks simulate real-world security workflows.


Features


Tools

Kali Linux Nmap Wireshark Metasploit Burp Suite Splunk / SIEM

Beginner Level Tasks


Note: Out of the 4 main cybersecurity tasks given below, you must complete any 3 tasks.

Tasks (4)

Goal

Perform active reconnaissance and vulnerability scanning on a safe test system.

Requirements
  • Use Nmap for port/service enumeration
  • Run vulnerability scans using tools like Nikto or OpenVAS
  • Document findings and security risks
Deliverables
  1. Scan results screenshots
  2. A short vulnerability report

Goal

Identify basic web vulnerabilities on a DVWA or demo test app.

Requirements
  • Test for XSS, SQL Injection (safe demo environment only)
  • Use Burp Suite to intercept requests
  • Propose mitigation techniques
Deliverables
  1. Screenshots of findings
  2. Mitigation recommendations

Goal

Capture and analyze network packets to identify protocols and suspicious traffic.

Requirements
  • Capture traffic for HTTP, DNS, TCP handshakes
  • Analyze packet structure and flags
  • Identify unusual or malformed packets
Deliverables
  1. Wireshark screenshots
  2. A short analysis report

Goal

Simulate a small cybersecurity incident and perform basic analysis.

Requirements
  • Analyze suspicious log activity (Windows logs / SIEM sample logs)
  • Identify possible Indicators of Compromise (IOCs)
  • Document response steps and containment actions
Deliverables
  1. Incident report (PDF/DOC)
  2. List of detected anomalies

How to Submit Your Tasks

  1. For each task:
    • Create a separate document (DOC, DOCX, or PDF) explaining the task, screenshots, findings and tools used.
  2. Upload your documents:
    • Upload to Google Drive or GitHub (public link).
    • Ensure all evidence files and screenshots are accessible.
  3. Submit your links:
    • Copy the public links and go to the Task Submission page.
    • Paste the links clearly mentioning Task numbers.

Tip: Detailed reporting is crucial in cybersecurity — document every step!