Website Penetration Testing Placements

Timeline
-
November 23, 2020Experience start
-
January 22, 2021Experience end
Experience scope
Categories
Information technology Data analysis Product or service launchSkills
business consulting business strategy digital marketing sales & marketing marketing strategyThis work placement allows students to put their theoretical skills into practice within your company. It constitutes a structured period of work-based learning which has been shown to help undergraduate students develop a wide range of technical work-related skills such as website Penetration testing, system analysis, providing cyber security solutions and Cyber Security reporting. In addition, students are given the opportunity to develop their professional competence in a working environment, benefiting from mentoring and support from experienced professionals.
Students are available for up to 110 hours starting November till the end of January 2021. This is an unpaid for-credit experience.
Learners
The final deliverable will vary depending on the scope of the project. Students need to complete 110 hours by the end of January 2021.
Project timeline
-
November 23, 2020Experience start
-
January 22, 2021Experience end
Project Examples
Requirements
Web application and infrastructure level penetration knowledge according to modules taken within the university. However the main tasks students will accomplish is as follows:
1) Agreement phase - mutual agreement between the client and you
2) Planning and reconnaissance – You will gather as much information about the target as possible. The information can be IP addresses, domain details, mail servers, network topology, etc.
3) Scanning – You will interact with the target with an aim to identify the vulnerabilities. Furthermore, you will send probes to the target and records the response of the target to various inputs. This phase includes- scanning the network with various scanning tools, identification of open share drives, open FTP portals, services that are running, and much more.
4) Gaining Access - Once the vulnerabilities have been identified, the next step is to exploit the vulnerabilities with an aim to gain access to the target. The target can be a system, firewall, secured zone or server.
5) Maintaining access - The next step is to ensure that the access is maintained; i.e., persistence. This is required to ensure that the access is maintained even if the system is rebooted, reset or modified.
6) Exploitation – You will try to get the data, compromise the system, launch dos attacks, etc. Usually, this phase is controlled in penetration testing so as to ensure that the issues caused on the network is limited.
7) Evidence collection and report generation -The final aim is to collect the evidence of the exploited vulnerabilities and report it to the executive management for review and action.
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Timeline
-
November 23, 2020Experience start
-
January 22, 2021Experience end