Available internships

The Red Team Engineer Internship is an eight-week, in-depth program focused on developing skills essential for red team operations in cybersecurity. Starting with cybersecurity fundamentals and an introduction to red teaming, the program progresses through setting up a lab environment and basic Linux commands. 

Week two delves into Open Source Intelligence (OSINT) techniques, reconnaissance methods, and enumeration. The third week introduces exploitation tools like Metasploit, basic exploitation and post-exploitation techniques, and password attacks. 

The following weeks cover internal network reconnaissance, wireless network exploitation, social engineering basics, and exploit writing. Advanced topics include complex exploitation techniques, client-side attacks, post-exploitation strategies, malware analysis, lateral movement and privilege escalation, domain reconnaissance, and database vulnerability exploitation. 

The program culminates in the seventh week with advanced social engineering, bypassing security controls, attacking Active Directory environments, and custom payload creation. The final week focuses on effective red team reporting, career path guidance, and a comprehensive red team exercise, providing a well-rounded experience in red team engineering.

The Jr. Penetration Tester Internship is an intensive eight-week program structured to provide a comprehensive and practical experience in the field of penetration testing. 

This program is designed to take interns through a progressive journey, starting with the basics of penetration testing, including understanding ethics, setting up a penetration testing lab, and familiarizing themselves with Linux commands and networking concepts. The subsequent weeks delve into reconnaissance techniques, web application basics, and system hacking, where interns learn through practical tasks such as vulnerability scanning, SQL injection, and exploiting known vulnerabilities. 

The program also covers advanced topics like network level attacks, including Man-in-the-Middle attacks, sniffing network traffic, firewall evasion techniques, and VPN tunneling. Advanced penetration techniques such as wireless network penetration testing, scripting for automation, and buffer overflow basics are also integral parts of the training. The final stages of the internship focus on post-exploitation strategies, report writing, and remediation techniques. 

The program culminates in a Capture the Flag challenge and a final project presentation, providing a real-world simulation experience and an opportunity for interns to showcase their learning and skills.

The Purple Team Engineer Internship is an eight-week intensive program designed to equip participants with a deep understanding of both offensive and defensive aspects of cybersecurity.

This comprehensive training covers a range of topics starting from cybersecurity fundamentals, system security, and network security, advancing through application security, and exploring advanced offensive techniques such as social engineering, wireless network exploitation, and exploit development.

The program also emphasizes advanced defensive strategies, including incident response handling, advanced use of Security Information and Event Management (SIEM) systems, digital forensics, and endpoint security solutions. A unique feature of the internship is the practical experience in Purple Team exercises, where participants engage in real-life simulations of cyber attacks and defenses, enhancing their skills in coordinating and executing comprehensive cybersecurity strategies. 

The program concludes with a capstone project that challenges interns to apply all the skills and knowledge acquired in a full-scale Purple Team exercise, preparing them for successful careers in cybersecurity.

The Blue Team Engineer Internship is a comprehensive eight-week program, designed to equip participants with the knowledge and skills required for a career in cybersecurity defense. 

The program begins with an introduction to cybersecurity concepts, including the basics of types of threats and the role of a Blue Team, alongside practical aspects like setting up a secure work environment, basic networking concepts, and an overview of security policies and procedures. Subsequent weeks cover system hardening and secure configurations, security monitoring and log analysis, incident response and basic forensics, advanced network defense, and advanced security monitoring and operations. Interns learn about operating system security, firewall and network security, intrusion detection systems, digital forensics, malware analysis, and the use of SIEM tools. 

The program also includes advanced modules on complex firewall management, network access control, intrusion prevention systems, VPN configuration, threat hunting, security automation, vulnerability management, cloud security fundamentals, mobile security, data protection and privacy, and endpoint detection and response technologies. 

The internship culminates with capstone projects that involve applying the learned skills in a simulated environment and career development guidance, including insights into career paths, resume building, and interview preparation.

The Security Operations Centre (SOC) Analyst Internship is an extensive eight-week program, meticulously designed to prepare interns for the dynamic and challenging environment of a SOC. 

The program commences with an introduction to SOC, including its roles and challenges, an understanding of the current cybersecurity threat landscape, basic networking skills, and an introduction to Syslog. As the program progresses, interns engage in data collection and initial analysis, exploring various methods for data collection, advanced Syslog configurations, basic traffic analysis, and understanding the roles of crucial security devices like firewalls, IDS, and IPS. Advanced data collection techniques are covered in subsequent weeks, including network flows analysis, packet capture, data normalization, and log management. 

The program also delves into security events and incident response, where interns simulate security events, categorize incidents, assess incident severity, and outline basic incident response steps. In-depth analysis and reporting are integral parts of the curriculum, focusing on advanced analysis techniques, threat intelligence gathering, and SIEM tool utilization for data analysis. 

Towards the end, the program covers vulnerability management, compliance standards, advanced incident handling, forensic basics, and SOC efficiency improvements. The internship culminates in a comprehensive capstone project and a final presentation, where interns apply all the skills and knowledge acquired, preparing them for a career as effective SOC analysts.