Cyber Summer Program-Internship

Cyber Security Internship with Hands-on Projects & Live Training

gcv
About the Program SAKEC Cyber Security Department brings to you Cyber Summer Programs 2022 . Take opportunity to enol yourself for EC Council Certification Programs and Cyber Security Internship with Hands-on Projects & Live Training.
Cyber Security Internship with Hands-on Projects & Live Training
  • Mode of Internship : Online and Offline both (As per Candidate’s Availability)
  • Registration Fees : Rs 500 ( includes Training and Internship Certificate +Cyber Security Inplant Training Certificate + Free Industrial exposure certificate + (Achievement certificate for best performers) + Cyber Security Projects)
  • Internship Registration Fees Rs. 500/-  can be deposited to SAKEC CYBER SECURITY DEPARTMENT account details as mentioned : Name of the account holder: SAKEC CYBER SECURITY DEPARTMENT

Bank Account number: 50100495153237

Bank of Name: HDFC Bank

IFSC Code:  HDFC0006432

Account type: Saving

Note : EC Council Enrolled candidates can enrol for Cyber Security Internship with Hands-on Projects & Live Training without any additional cost (i.e. they need not to pay 500 Rs Registration for Internship )
Duration : One and Half Month (First week of June to Second Week of July)
Topics To be covered (But not limited to) : This course covers the basics of Cyber Security tools, usage, and implementation. Our experts believe exposure to various services and edge cases are key for growth in cyber security, hence we have a curated lab schedule and curriculum to expose the students to live hacking environments much like the services offered by TryHackMe and HackTheBox. In practice, students will learn several methodologies to reach a foothold on the target system all while learning web application exploitation in different technology stacks. Alongside this, we also provide written guides to these environments to train students in the art of hacking.

Hacking in live environments and using tools is a necessary skill but it is necessary to keep in mind that using public exploits keeps you at a significant disadvantage and having the power and influence of creating your advanced tools is a weapon any hacker should possess, hence we train our students in python cybersecurity development using strong secure coding principles to create, license and distribute open-source software tools in the community. We will cover python packaging, PyPI, Pytest, Tox, basic CI/CD, git hooks, and the use of the git version control system. Such skills will allow students to write their exploits and understand the underlying infrastructure and libraries current tools are built on.

After learning how to write advanced applications it’s important to understand how real-world applications work especially when interacting beyond the local environment i.e Networking. We will cover TCP/IP, BGP, DNS, IMAP, SSL, TLS, and every other major protocol currently in operation. These protocols are commonly found in organizational networks and decoding such network streams is a necessary skill for any cyber security professional. We will also cover all the basics such as DHCP, HTTP, HTTPS, and the different headers used in such protocols.

Understanding how computers talk to each other without execution or providing any more access or control is a necessary part of any cyber security course, but understanding how such security practices tie into the larger picture of organizational security falls under the purview of IT Security policy and risk assessment. We cover theoretical concepts such as different access control methods, IAAA, CIA Triad, and other key factors in ensuring operational security. This makes any candidate instantly more attractive. Additionally other than generic systems such as web servers and active directories every organization has different needs such as outdated and vulnerable systems, such devices tend to carry a high amount of risk and a Cost-Benefit analysis is necessary to determine the need to upgrade and secure such systems. Our experts believe in promoting realistic practices, not an ideal environment to increase creativity and participation.

Learning Outcomes:
  • The ability to look for flaws with a cursory reading of a cyber security report or pentest, such consulting skills are of key importance in a quickly advancing field.
  • The ability to design and program tools for specific routines and purposes in the cybersecurity domain to maintain business continuity.
  • Understand and explain the threat and risk associated with existing business practices and provide methodical ways to improvise and improve risk management.
  • Articulate and compose necessary business practices documentation such as a Business Continuity Plan, Disaster Recovery Planning and IT Security Policy.
  •  Level with existing cyber security threats by analyzing existing bad actors and generating ways to circumvent the risk associated with certain technology stacks
Who is this Internship for?
  • College and High School  Students  interested in learning more about how the cybersecurity industry works under the hood and start with a strong coding and policy background.
  • Teachers interested in promoting and working on free and open source security software.
  • Professionals: All coding and teaching professionals in the application development domain.
Internship Features
  • 24×7 Access: You can view lectures at your own convenience and pace.
  • Online Lectures: Online lectures with high-quality videos.
  • Updated Quality content: Content is engaging, filmed in high quality and available on demand.
  • Offline Lectures : Will be conducted by Experts
Internship Prerequisites:
  • 10-20 Mbps or greater internet connection with access to Zoom and/or Microsoft Teams.
  • Laptop/ Desktop Computer for execution and Coding.
  • No coding or cyber security knowledge is necessary to participate in this course.
Test & Evaluation
  • During the Internship, the participants will have to take all the assignments given to them for better learning.
  • At the end of the Internship, a final assessment will be conducted.
Certification
  • All successful participants will be provided with certificate
  • Students who do not complete the course / leave it midway will not be awarded any certificate.
Registration Link : https://forms.gle/bfX6MeCQbUKiMp8p7

Comments are closed.