Summary Report:
APSCHE Internship at Blackbucks (LT 2025)
Cyber Security
Internship Overview
This internship provided an in-depth learning experience in Cybersecurity, equipping
participants with essential security skills and industry knowledge. The program covered
key concepts such as network security, ethical hacking, vulnerability assessment,
penetration testing, and incident response. Interns gained hands-on experience using
cybersecurity tools like Nmap, Nessus, Metasploit, and Wireshark, helping them
understand how to identify, analyze, and mitigate security threats.
Through structured weekly sessions, participants developed analytical, critical thinking,
and problem-solving abilities, applying theoretical knowledge to real-world cybersecurity
challenges. They worked on network scanning, system hacking simulations, vulnerability
assessments, and threat analysis, enhancing their ability to safeguard digital
infrastructures and respond to cyber incidents.
By the end of the internship, participants had a strong foundation in cybersecurity
principles and practices, making them well-prepared for roles in cybersecurity analysis,
ethical hacking, network security management, and incident response. This program
bridged the gap between academic learning and industry demands, enabling interns to
contribute effectively to securing digital environments and combating cyber threats..
About the Blackbucks
Overview
The Blackbucks: Pioneering Campus Success Welcome to The Blackbucks, India’s premier Campus Success
Platform, where we are dedicated to transforming the landscape of education and placement. As a trusted partner
successful placements of students. 𝗢𝘂𝗿 𝗩𝗶𝘀𝗶𝗼𝗻: 𝗘𝗺𝗽𝗼𝘄𝗲𝗿𝗶𝗻𝗴
for top HEIs, we offer a unique and powerful software suite designed for rigorous preparation, practice, and
𝗦𝘁𝘂𝗱𝗲𝗻𝘁𝘀 𝗳𝗼𝗿 𝗮 B𝗿𝗶𝗴𝗵𝘁𝗲𝗿 𝗧𝗼𝗺𝗼𝗿𝗿𝗼𝘄 At Blackbucks, we believe in the power of technology to
Certification Programs, are tailored to provide a comprehensive learning and placement experience. 𝗔
unlock the potential of every student. Our suite of applications, including TaPTaP, BBX Swift, and our University
𝗗𝗲𝗰𝗮𝗱𝗲 𝗼𝗳 𝗘𝘅𝗰𝗲𝗹𝗹𝗲𝗻𝗰𝗲: 𝗖𝗲𝗹𝗲𝗯𝗿𝗮𝘁𝗶𝗻𝗴 𝟭𝟬 𝗬𝗲𝗮𝗿𝘀 𝗼𝗳 𝗦𝗲𝗿𝘃𝗶𝗰𝗲 This year marks a significant
milestone for us as we celebrate a decade of unwavering commitment to undergraduate students. Founded in 2013
technology company recognized for our innovative approach to education and placements. 𝗥𝗲𝗰𝗼𝗴𝗻𝗶𝘇𝗲𝗱
with the simple yet revolutionary idea of “Technology for Students,” we have grown into a world-class
L𝗲𝗮𝗱𝗲𝗿𝘀 𝗶𝗻 𝗣𝗼𝘀𝘁-𝗚𝗿𝗮𝗱𝘂𝗮𝘁𝗶𝗼𝗻 𝗖𝗮𝗿𝗲𝗲𝗿𝘀 Our Post Graduation Program, in collaboration with the
Government of AP initiative, has been consecutively awarded for seven years, reflecting our commitment to
𝗨𝘀: 𝗪𝗵𝗲𝗿𝗲 L𝗲𝗮𝗿𝗻𝗶𝗻𝗴
excellence. We continue to lead the way in providing job-linked our courses with guaranteed placements. J𝗼𝗶𝗻
𝗠𝗲𝗲𝘁𝘀 𝗢𝗽𝗽𝗼𝗿𝘁𝘂𝗻𝗶𝘁𝘆 We invite you to be a part of our journey. Whether you’re a student seeking to
elevate your career prospects or a recruiter looking for top talent, The Blackbucks is your destination for success.
Explore how we can help you achieve your dreams.
Website
https://www.theblackbucks.com
Industry
Technology, Information and Internet
Company size
51-200 employees
143 associated members LinkedIn members who’ve listed Blackbucks Group.,´¸.˙→5-,)´ as their current
workplace on their profile.
Headquarters
Hyderabad, Telangana
Founded
2013
Specialties
IT/Software, Product Development, Engineering, Electronics, Entrepreneurship, MBA, EMERGING
TECHNOLOGY, EDUCATION, Center of Excellence, Artificial Intelligence, Jobs, Careers, Learning, Students,
Colleges, Universities, Machine Learning, Data Science, Post Graduation, Higher Education, and Jobs
Cybersecurity and Gen AI Internship Syllabus
Module 1: Introduction to Cybersecurity & Gen AI in Threat Analysis
Understanding Cybersecurity – Importance, Evolution, and Key Concepts
CIA Triad – Confidentiality, Integrity, and Availability
Types of Cyber Threats and Vulnerabilities
Overview of Cybersecurity Career Paths and Ethical Hacking
Introduction to Gen AI in Cybersecurity – AI in Threat Detection &
Analysis
Use Cases of AI in Threat Intelligence and Predictive Threat Analysis
Module 2: Network Security Fundamentals & AI-Augmented Insights
Networking Basics – TCP/IP Protocols, IP Addressing, and Subnetting
Network Topologies and Devices – Switches, Routers, and Firewalls
Intrusion Detection and Prevention Systems (IDS/IPS)
AI-Powered Network Security – Detecting Anomalies with AI Models
Traffic Pattern Analysis – Using AI for Threat Monitoring
Automated Network Intrusion Detection
Module 3: OS Security & Ethical Hacking with Gen AI
Operating System Security Basics – Windows and Linux Security
User Account Management and File System Permissions
OS Hardening Techniques and Threat Mitigation
Introduction to Ethical Hacking – Stages of an Attack (Recon, Exploit,
Maintain Access)
Gen AI in Ethical Hacking – Automated Vulnerability Detection and
Exploit Generation
AI-Supported Penetration Testing Simulations
Module 4: Web Security, Reconnaissance & Gen AI
Footprinting and Reconnaissance – Techniques for Gathering Information
Identifying Vulnerabilities – Ethical Boundaries and Compliance
Web Application Security – Understanding SQL Injection, XSS, and
CSRF Attacks
AI for Web Security – Automated Vulnerability Scanning and Detection
Best Practices for Securing Web Applications
Gen AI for Real-Time Security Monitoring
Module 5: Incident Response & Course Wrap-Up
Incident Detection and Response – AI in Incident Management
AI-Driven Forensics and Investigation – Collecting and Analyzing
Evidence
Automated Threat Response and Containment
Recap of Key Concepts Covered During the Internship
Exploring Advanced Topics in AI and Cybersecurity
Career Path Guidance in Cybersecurity and Ethical Hacking
Summary Report: APSCHE Internship at Blackbucks (LT 2025) – UI/UX
Internship Overview
This internship provided an in-depth learning experience in Cybersecurity, covering
essential concepts such as network security, ethical hacking, incident response,
vulnerability management, and real-world cyber threats. Through structured weekly
sessions, students gained hands-on experience in identifying vulnerabilities,
analyzing cyberattacks, and implementing defensive strategies using industry tools.
Participants enhanced their problem-solving, analytical thinking, and technical
expertise in areas like firewall management, intrusion detection, ethical hacking
simulations, and threat analysis. By applying theoretical knowledge to practical
scenarios, students became well-prepared for cybersecurity roles, including Security
Analyst, Ethical Hacker
This program successfully bridged the gap between academic learning and real-world
cybersecurity challenges, making interns industry-ready for securing digital
environments and mitigating cyber threats..
Week 01: Understanding the Placement Process
Course Outcomes:
1. Identified strengths and areas for improvement in cybersecurity concepts.
2. Understood the assessment patterns for cybersecurity placement preparation.
3. Learned how to analyze test results and enhance problem-solving
techniques.
4. Gained familiarity with cybersecurity-related questions in aptitude,
technical, and scenario-based tests..
01-02-2025 - Placement Test 01
Assessed students' understanding of cybersecurity concepts, including network
security, ethical hacking, and vulnerability assessment.
Identified gaps in knowledge and provided a roadmap for improvement.
Introduced problem-solving strategies used in cybersecurity job recruitment
exams.
02/02/2025 - Employability Test 01
Evaluated students’ communication, analytical, and technical skills.
Offered insights into corporate hiring processes and industry expectations.
Prepared students for upcoming interviews by analysing key technical and
soft skills.
02/02/2025 - Employability Test 01
Evaluated students’ communication, analytical, and technical skills.
Offered insights into corporate hiring processes and industry expectations.
Prepared students for upcoming interviews by analysing key technical and
soft skills.
03/02/2025 - Session 01: Core Assessments & Introduction to Cybersecurity
First Formal Evaluation in Cybersecurity.
Covered foundational cybersecurity concepts including threats,
vulnerabilities, and key terminologies.
Assessed participants' understanding of network security principles and
their application in real-world scenarios.
Included multiple-choice questions (MCQs) and practical scenarios
related to cybersecurity fundamentals.
Introduction to Cybersecurity Landscape.
Discussed the significance of cybersecurity in today’s digital world.
Explored career paths in cybersecurity including ethical hacking, incident
response, and network security analysis.
Emphasized the importance of a hacker’s mindset in ethical hacking and
cybersecurity defense.
05/02/2025 - Cybersecurity Assessment 01
Introduction to Cybersecurity Landscape.
Discussed the significance of cybersecurity in today’s digital world.
Explored career paths in cybersecurity including ethical hacking, incident
response, and network security analysis.
Emphasized the importance of a hacker’s mindset in ethical hacking and
cybersecurity defense.
05/02/2025 - Session 02: CIA Triad, Information Security & Case Study on
Firewall Implementations
Explored the CIA Triad
In-depth understanding of how confidentiality, integrity, and
availability form the foundation of cybersecurity.
Discussed practical applications of the CIA Triad in protecting
data and systems.
Information Security Principles
Covered essential information security concepts including access
control, encryption, and incident response.
Discussed different types of cyberattacks and real-world case
studies.
Case Study: Firewall Defense Mechanisms
Analyzed how firewalls act as a primary line of defense against
cyber threats.
Explored the role of Intrusion Detection and Prevention Systems
(IDS/IPS) in network security.
Discussed firewall configuration best practices and common
misconfigurations leading to security breaches.
07/02/2025 - Cybersecurity Assessment 02
Conducted a comprehensive assessment to evaluate participants’ understanding
of information security concepts.
Included scenario-based questions focusing on the application of firewall
mechanisms, intrusion detection, and data protection.
Participants demonstrated their knowledge through problem-solving exercises.
07/02/2025 - Session 03: Phases of Ethical Hacking, Network Security & Cloud
Security Overview
Phases of Ethical Hacking
Introduced the five stages of ethical hacking: Reconnaissance, Scanning,
Gaining Access, Maintaining Access, and Covering Tracks.
Discussed how ethical hackers simulate cyberattacks to identify vulnerabilities.
Network Security Overview
Explored network security fundamentals including firewalls, VPNs, and
encryption.
Demonstrated how attackers exploit network vulnerabilities and how defenders
mitigate threats.
07/02/2025 - Cybersecurity Assessment 03
o Conducted a hands-on assessment covering the phases of
ethical hacking.
o Included practical tasks such as network scanning and
vulnerability analysis using simulated environments.
o Evaluated participants’ understanding of offensive and
defensive cybersecurity concepts..
07/02/2025 - Assignment 01
o Participants were assigned a practical exercise on
vulnerability analysis.
o Tasked with identifying weaknesses in a simulated network
and suggesting appropriate security controls.
o Delivered a detailed report outlining potential threats,
impacts, and mitigation strategies.
Week 02
10/02/2025 - Session 04: Types of Pentesting, Infosec Laws & Standards, and
Information Gathering
o Understanding Penetration Testing (Pentesting)
o Discussed different types of penetration testing: Black Box,
White Box, and Grey Box.
o Explained the importance of pentesting in identifying
vulnerabilities before malicious attackers do.
o Covered ethical guidelines and legal considerations in
ethical hacking..
10/02/2025 - Cybersecurity Assessment 04
o The assessment consisted of scenario-based questions
focused on penetration testing methodologies.
o Evaluated participants’ understanding of legal standards and
ethical considerations in cybersecurity operations.
o Included practical case studies for identifying weaknesses
through reconnaissance techniques.
10/02/2025 - 10/02/2025 - Employability Test 03
o Assessed problem-solving and analytical thinking abilities
in cybersecurity.
o Included technical and logical reasoning questions to
evaluate understanding of penetration testing and
information gathering concepts.
o Simulated real-world cybersecurity scenarios to gauge
decision-making under pressure.
12/02/2025 - Session 05: Network Scanning, Nmap Commands &
Countermeasures
Network Scanning Basics
Covered the purpose of network scanning in the cybersecurity kill
chain.
Discussed network scanning types: Port Scanning, Vulnerability
Scanning, and Service Enumeration.
Nmap Scanning Commands
Provided hands-on experience with Nmap, a popular network
scanner.
Explored key Nmap commands for discovering hosts, identifying
services, and detecting vulnerabilities
12/02/2025 - Cybersecurity Assessment 05
Evaluated participants’ proficiency in using Nmap for network
scanning.
Included hands-on exercises simulating port scanning and service
enumeration.
Assessed their understanding of applying appropriate
countermeasures to mitigate scanning attacks.
14/02/2025 - Session 06: Advanced Network Scanning &
Evasion Techniques
Advanced Network Scanning
Explored sophisticated scanning techniques used by hackers to
bypass security defenses.
Demonstrated how attackers manipulate packet data to evade
detection.
IDS/IPS Evasion
Explained the role of IDS and IPS in detecting and blocking
malicious activities.
Discussed real-world scenarios of how attackers evade detection
using fragmented packets.
14/02/2025 - Cybersecurity Assessment 06
Conducted a hands-on assessment involving advanced network
scanning scenarios.
Evaluated participants’ ability to detect and respond to
sophisticated scanning and evasion attempts.
Included exercises in using Nmap and analyzing IDS/IPS alerts.
14/02/2025 - Assignment 02
Participants were tasked with conducting a simulated network
scanning exercise.
Required to apply various scanning techniques to identify
network vulnerabilities.
Provided a detailed report analyzing potential risks and
recommending mitigation strategies
Week 03
17/02/2025 - Session 07: Enumeration - Exploring Network Information.
Understanding Enumeration
Explained the concept of enumeration as a critical step in the ethical hacking
process.
Types of Enumeration
Explored different types of enumeration, including SNMP, DNS, NetBIOS,
and SMB enumeration.
Important Ports for Enumeration
Discussed common ports used for enumeration (e.g., Port 135, 139, 445 for
SMB, Port 161 for SNMP).
Explained how attackers leverage these ports to identify weaknesses in
network services.
Practical Demonstration
Conducted live demonstrations using tools like Nmap, Netcat, and
Enum4linux for enumeration..
17/02/2025 - Cybersecurity Assessment 07
Included multiple-choice and scenario-based questions on enumeration
concepts.
Evaluated participants’ knowledge of various enumeration techniques and how
to mitigate enumeration attempts.
Practical assessment involved identifying open ports and enumerating services
in a simulated lab environment.
19/02/2025 - Session 08: System Hacking and Gaining Accessof brand
Introduction to System Hacking
o Discussed the different phases of system hacking: Gaining
Access, Escalating Privileges, Maintaining Access, and
Clearing Tracks.
Password Cracking Techniques
o Covered common password cracking methods like Brute
Force, Dictionary Attack, and Rainbow Tables.
o Demonstrated the use of tools such as Hydra, John the
Ripper, and Hashcat.
Privilege Escalation
o Explained how attackers escalate privileges to gain
administrative access using kernel exploits and
misconfigurations.
o Discussed defense mechanisms including patch
management and application control.
Maintaining Access
o Covered methods attackers use to maintain persistent access
using rootkits, backdoors, and Trojans.
o Demonstrated how to detect and remove persistence using
endpoint detection tools.
o Style Guide – Importance of a brand style guide in ensuring
uniformity across digital and print media.
19/02/2025 - Cybersecurity Assessment 08
o Conducted a practical assessment on password cracking and
privilege escalation.
o Evaluated participants’ ability to identify compromised
systems and remove persistence.
o Included questions on real-world scenarios involving
maintaining access and clearing tracks.
22/02/2025 - Session 09: Vulnerability Analysis & Risk Assessment
Introduction to Vulnerability Analysis
o Defined vulnerabilities and their impact on system security.
Active vs. Passive Assessment
o Compared active and passive vulnerability assessment
techniques.
o Assessed design thinking, problem-solving skills, and
ability to create cohesive brand experiences.
22/02/2025 - Cybersecurity Assessment 09
Included hands-on tasks where participants used tools like Nessus and OpenVAS
to conduct vulnerability scans.
Evaluated understanding of active and passive assessment techniques
22/02/2025 - Assignment 03
Task: Perform a vulnerability assessment on a simulated network
environment.
Deliverables:
Conduct scans using the appropriate tools.
Identify and prioritize vulnerabilities based on severity.
Provide recommendations to mitigate the discovered
vulnerabilities.
Week 04
24/02/2025 - Session 10: GenAI in Cybersecurity - Offensive &
Defensive Usage
Introduction to GenAI in Cybersecurity
Explained the role of Generative AI (GenAI) in enhancing
cybersecurity capabilities.
Offensive Usage of AI (Ethical Hacking)
Demonstrated how AI-powered tools are used to simulate attacks
for ethical hacking.
Defensive Usage of AI (SOC, SIEM)
Explained how AI is integrated into Security Operations Centers
(SOC) and Security Information and Event Management (SIEM)
systems.
Tools Used for AI in Cybersecurity
Explored popular AI tools like Splunk and Wazuh for real-time
monitoring and analysis
24/02/2025 - Cybersecurity Assessment 10
Included multiple-choice questions and scenario-based problems
on AI applications in cybersecurity.
Evaluated the participants’ understanding of AI’s role in both
offensive and defensive operations.
24/02/2025 - Employability Test 04
Assessed students' understanding of AI concepts in cybersecurity.
Evaluated decision-making skills in handling real-world cyber
threats using AI solutions
26/02/2025 - Session 11: Vulnerability Assessment & System
Hacking Continued
Real-time Vulnerability Scanning Tools
Conducted hands-on demonstrations using Nessus and OpenVAS
for real-time vulnerability scanning.
Exploitation Techniques
Covered practical exploitation techniques using tools like
Metasploit.
Maintaining Access Using Metasploit
Explained how attackers establish and maintain persistent access
using Meterpreter payloads.
26/02/2025 - Cybersecurity Assessment 10
Conducted a vulnerability scanning and exploitation exercise
using Nessus, OpenVAS, and Metasploit.
Evaluated participants' understanding of the entire exploitation
life
26/02/2025 - Employability Test 05
Simulated a real-world scenario where participants acted as
security analysts responding to a cyberattack.
Evaluated decision-making skills in identifying vulnerabilities
and proposing mitigation measures.
Provided experience in applying cybersecurity concepts under
pressure.
28/02/2025 - Session 12: Cloud Security & Incident Response
Introduction to Cloud Service Providers
o Provided an overview of major cloud platforms: AWS,
GCP, and Azure.
VPC (Virtual Private Cloud)
o Discussed how VPC helps in isolating cloud resources for
better security.
Security Groups and WAF
o Explained the role of Security Groups and their impact on
cloud security.
28/02/2025 - Cybersecurity Assessment 12
Assessed participants' understanding of cloud security concepts.
Included tasks on configuring VPCs, setting up security groups,
and managing WAF policies.
Evaluated incident response skills by analyzing simulated cloud
security events.
28/02/2025 - Assignment 04
o Identify misconfigurations and vulnerabilities.
o Provide actionable recommendations for improving cloud
security.
o Create an incident response report for a simulated attack
scenario.
Week 05
04/03/2025 - Project Session 01
Overview of Project Rounds
Introduction to Project Rounds
o Explained the 5-round project evaluation system
consisting of:
Abstract Submission
System Requirements Round
Source Code Submission
Testing and Implementation Round
Documentation Round
Provided a clear understanding of expectations at each stage.
Guidelines for Abstract Submission
Discussed how to write a clear and concise abstract.
Covered key elements to include: Problem Statement, Solution
Approach, and Expected Outcome.
Provided sample abstracts for reference.
05/03/2025 - Project Session 02
Cybersecurity Project Exploration
Overview of Cybersecurity Projects
o Explained 30 different projects covering various
cybersecurity domains like:
Network Security
Ethical Hacking
Incident Response
Cyber Threat Intelligence
Penetration Testing
Discussed the project scope and objectives.
Provided project selection guidelines based on students' interests
and skill levels.
06/03/2025 - Project Session 03
Abstract Submission Process
Detailed Explanation on Abstract Format
o Explained the correct format for abstract submission,
including:
Project Title
Problem Definition
Solution Overview
Tools & Technologies
Expected Outcome
Provided step-by-step guidance on writing and refining project
abstracts.
Emphasized the importance of clarity, feasibility, and innovation
in submissions.
Student Q&A Session
Addressed student queries regarding abstract submission.
Provided personalized feedback on initial project ideas.
Offered tips for strengthening abstract proposals.
07/03/2025 - Project Session 04
Round 2: System Requirements Explanation
Understanding System Requirements
o Explained how to gather and document both functional
and non-functional requirements.
o Demonstrated real-world examples for defining clear and
actionable requirements.
Practical Examples
o Provided a sample cybersecurity project to explain the
requirement gathering process.
o Showed how to draft a System Requirements Specification
(SRS).
Student Query Resolution
Conducted a live Q&A session to clarify doubts regarding
System Requirements.
Offered guidance on identifying and documenting project-specific
requirements.
Provided troubleshooting tips for common challenges faced in
Round 2.
Week 06
11/03/2025 - Project Session 05
Round 2 Explanation & Practical Demonstration
Review of Round 2: System Requirements
o Recap on identifying, documenting, and refining system
requirements.
o Discussed how to verify the completeness and correctness
of requirements.
Metasploit Attack Simulation
o Demonstrated a SMB (Server Message Block)
vulnerability attack using Metasploit.
o Showcased:
Scanning and identifying vulnerable SMB services.
Exploiting the vulnerability using Metasploit
Framework.
Gaining access to a compromised system.
o Provided insights into penetration testing methodologies
and vulnerability exploitation.
Hands-on Practical
o Encouraged students to perform a simulated attack in a
controlled environment using Kali Linux and Metasploit.
o Discussed ethical considerations and legal implications of
penetration testing.
13/03/2025 - Project Session 06
Pending Task Completion
Independent Work Session
o Provided time for students to work on their pending tasks
from previous rounds.
o Addressed any doubts related to:
Abstract Submission
System Requirements Round
Research on Cybersecurity Tools and Techniques
Mentor Support
o Conducted one-on-one support sessions to resolve
challenges faced by students.
o Offered personalized feedback to ensure project progress.
14/03/2025 - Project Session 07
Round 3 Explanation: Source Code Submission
Overview of Source Code Round
o Explained the expectations for submitting project source
code.
o Discussed best practices for clean and well-documented
code.
o Highlighted the importance of providing clear instructions
for execution.
File Zipping and Uploading Guidelines
o Provided a step-by-step demonstration on:
Organizing source code files using standard folder
structures.
Compressing the files using tools like zip or tar.
Ensuring all necessary files, libraries, and
dependencies are included.
Validating file integrity before submission.
Student Query Resolution
o Addressed student questions regarding the source code
submission process.
o Provided troubleshooting tips for common issues faced
during code packaging.
o Shared examples of well-structured and properly submitted
projects
Week 07
18/03/2025 - Project Session 08
Advanced Project Discussion and Best Practices
Progress Review
o Conducted a comprehensive review of students' progress
across all project rounds.
o Addressed challenges faced in abstract submission, system
requirements, and source code development.
Best Practices in Cybersecurity Projects
o Discussed efficient coding practices and secure coding
standards.
o Importance of version control using Git and GitHub.
o Insights into documenting cybersecurity projects
effectively.
Interactive Q&A
o Open platform for students to discuss doubts and technical
challenges.
o Provided mentorship on refining project ideas and
solutions.
19/03/2025 - Project Session 09
Malware and Keylogger Simulation
Understanding Malware
o Explained the types of malware including trojans,
ransomware, worms, and spyware.
o Discussed real-world case studies of malware attacks.
Keylogger Demonstration
o Simulated a basic keylogger to demonstrate how it
captures keystrokes.
o Walkthrough on coding a keylogger using Python.
o Explained how attackers use keyloggers for data theft.
Preventive Measures
o Discussed methods for detecting and mitigating keylogger
attacks using EDR and AV solutions.
o Provided insights into behavioral analysis for malware
detection.
20/03/2025 - Project Session 10
Doubt Clearing Session
One-on-One Doubt Resolution
o Provided personalized assistance to students facing issues
in their cybersecurity projects.
o Debugged technical issues in their source code.
o Guided students on improving their project documentation.
Group Discussion
o Encouraged peer-to-peer learning by sharing experiences
and project challenges.
o Discussed cybersecurity problem-solving strategies.
21/03/2025 - Project Session 11
Wireshark Simulation & Network Analysis
Introduction to Wireshark
o Explained the role of Wireshark in network traffic
analysis.
o Demonstrated how to capture and inspect packets.
o Discussed common network attacks like MITM (Man-In-
The-Middle) and DNS Spoofing.
Wireshark Attack Simulation
o Conducted a simulated attack using Wireshark to monitor
HTTP and DNS packets.
o Analyzed how attackers can extract sensitive data from
network traffic.
Google Maps Simulation
o Simulated a geolocation tracking scenario using Google
Maps API.
o Demonstrated how malicious actors can track user
activities through packet data analysis.
Mitigation Techniques
o Recommended using VPNs, HTTPS, and encrypted
channels for secure communication.
o Showed how Wireshark can be used defensively to detect
anomalies.
22/03/2025 - Project Session 12
Git and GitHub for Cybersecurity Projects
Introduction to Git and GitHub
o Explained the importance of Git for version control and
collaborative coding.
o Overview of GitHub repositories, branches, and pull
requests.
Practical Demonstration
o Step-by-step demo on:
Initializing a Git repository.
Committing and pushing code to GitHub.
Creating branches and resolving merge conflicts.
GitHub for Cybersecurity Projects
o Showed how to manage cybersecurity project
documentation and source code.
o Best practices for using GitHub for team collaboration and
code reviews.
o Explained how to maintain privacy using private
repositories.
Hands-on Activity
o Students practiced uploading their cybersecurity projects to
GitHub.
o Simulated a collaborative coding scenario using pull
requests and code reviews.
Final Internship Outcomes
Overall Learnings from the Internship:
Technical Proficiency
oGained in-depth knowledge of cybersecurity fundamentals including
network security, ethical hacking, and incident response.
oMastered penetration testing techniques such as reconnaissance,
scanning, enumeration, and exploitation.
oDeveloped hands-on experience in cybersecurity tools like Nmap,
Wireshark, Metasploit, Nessus, and OpenVAS.
oUnderstood firewall evasion techniques and learned how to bypass
security controls using stealthy methods.
oExplored GenAI applications in cybersecurity for automated threat
detection, vulnerability assessment, and malware analysis.
oConducted practical reverse shell and keylogger simulations, enhancing
offensive cybersecurity skills.
✅ Industry Readiness
o Understood real-world cyber-attack scenarios and applied defensive
security measures using SOC and SIEM tools like Splunk and Wazuh.
o Gained experience in cloud security by working with platforms like
AWS, Azure, and GCP, focusing on VPC management, WAF
implementation, and cloud incident response.
o Simulated cyberattacks and assessed vulnerabilities using AI-powered
tools, learning how to interpret and mitigate threats effectively.
o Explored the role of GenAI in cybersecurity operations for enhancing
automated incident response and predictive threat analysis.
o Understood the importance of maintaining confidentiality, integrity,
and availability (CIA Triad) through hands-on assignments and
assessments.
✅ Project Execution
o Successfully completed end-to-end cybersecurity projects involving all
stages, including:
o Abstract submission and system requirement analysis.
o Source code development using secure coding practices.
o Vulnerability scanning and penetration testing.
o Incident response and malware analysis using Metasploit.
o Documentation and reporting of findings and mitigation strategies.
o Simulated real-world scenarios such as:
o Metasploit SMB attacks to demonstrate network exploitation.
o Keylogger development to understand malicious data capture.
o Wireshark attack simulations for network traffic analysis.
o Google Maps geolocation tracking to illustrate privacy vulnerabilities.
✅ Career Development
o Developed a strong understanding of cybersecurity roles and the
responsibilities of security analysts, penetration testers, and
incident responders.
o Improved problem-solving skills by applying cybersecurity
concepts in simulated attack and defense scenarios.
o Gained hands-on experience with Git and GitHub for version
control, collaboration, and project management.
o Understood best practices for maintaining cybersecurity hygiene
in enterprise environments.
o Built a comprehensive cybersecurity portfolio showcasing
completed projects, assessments, and certifications, enhancing
employability.
2. Employability Enhancement:
o Strengthened analytical, problem-solving, and decision-making
abilities.
o Enhanced communication, teamwork, and project management skills.
o Understood job market trends and AI/ML career opportunities.
o Gained experience in working on industry-relevant projects
and presenting findings.
Impact of the Internship:
Equipped students with the skills required to secure AI/ML job roles.
Prepared students to contribute effectively to AI-based projects in industries.
Built confidence in handling real-world machine learning problems
and solutions.
Enabled students to create a portfolio of AI/ML projects to showcase
to potential employers.