โš  Complete a minimum of 2 tasks from the list below.
๐Ÿ” Cybersecurity Tasks
Task 01

Install and Configure Wireshark

Problem Statement: Install Wireshark and capture network traffic on your local machine.

Steps to Complete

  1. Download Wireshark from Wireshark's official website.
  2. Install the application following the prompts.
  3. Open Wireshark and start capturing packets on your network interface.

Tools / Platforms

How to Submit

Task 02

Use Nmap for Network Scanning

Problem Statement: Perform a basic network scan using Nmap to discover devices on your local network.

Steps to Complete

  1. Download and install Nmap from Nmap's official website.
  2. Open a command prompt or terminal.
  3. Run a scan on your local network (e.g., nmap 192.168.1.0/24).

Tools / Platforms

How to Submit

Task 03

Set Up a Virtual Machine for Testing

Problem Statement: Set up a virtual machine using VirtualBox or VMware to create a safe testing environment.

Steps to Complete

  1. Download and install VirtualBox or VMware.
  2. Create a new virtual machine and install a Linux distribution (e.g., Ubuntu).
  3. Ensure the VM is set up for internet access.

Tools / Platforms

How to Submit

Task 04

Use Online Tools for Vulnerability Assessment

Problem Statement: Conduct a basic vulnerability assessment using an online tool.

Steps to Complete

  1. Visit Qualys SSL Labs or Detectify.
  2. Enter a public website URL to scan for vulnerabilities.
  3. Review the assessment report generated.

Tools / Platforms

How to Submit

Task 05

Analyze Logs Using a Text Editor

Problem Statement: Analyze server log files using a text editor to identify potential security incidents.

Steps to Complete

  1. Obtain a sample server log file.
  2. Open in a text editor (e.g., Notepad++, Sublime Text).
  3. Search for indicators of compromise such as failed login attempts.

Tools / Platforms

How to Submit

Task 06

Create a Basic Phishing Email Simulation

Problem Statement: Create a simulated phishing email to understand common attacker tactics.

Steps to Complete

  1. Research common phishing tactics (urgency, spoofed addresses).
  2. Draft an email mimicking a phishing attempt โ€” clearly marked as a simulation.
  3. Share with peers for discussion.

Tools / Platforms

How to Submit

Task 07

Conduct a Risk Assessment

Problem Statement: Perform a basic risk assessment for a fictional organization.

Steps to Complete

  1. Identify potential risks (data breaches, malware attacks).
  2. Assess the likelihood and impact of each risk.
  3. Document your findings and recommendations.

Tools / Platforms

How to Submit

Task 08

Write a Python Script for Log Analysis

Problem Statement: Develop a Python script that analyzes log files for failed login attempts.

Steps to Complete

  1. Set up a Python environment.
  2. Write a script that reads a log file and counts failed login attempts.
  3. Output the results to the console.

Tools / Platforms

How to Submit

Task 09

Develop a Basic Incident Response Plan

Problem Statement: Create an incident response plan for a hypothetical cybersecurity incident.

Steps to Complete

  1. Outline steps for identifying, containing, and recovering from a cyber incident.
  2. Define roles and responsibilities during an incident.
  3. Document your response plan clearly.

Tools / Platforms

How to Submit

Task 10

Create a Cybersecurity Awareness Presentation

Problem Statement: Develop a presentation educating users about cybersecurity best practices.

Steps to Complete

  1. Research common cybersecurity threats and preventive measures.
  2. Create a PowerPoint or Google Slides presentation.
  3. Share with peers for feedback.

Tools / Platforms

How to Submit

๐Ÿ”Ž Digital Forensics Tasks
Task 11

Use FTK Imager to Create a Disk Image

Problem Statement: Create a forensic image of a USB drive using FTK Imager.

Steps to Complete

  1. Download and install FTK Imager from AccessData's official website.
  2. Insert the USB drive and open FTK Imager.
  3. Select the USB drive and create a disk image file.

Tools / Platforms

How to Submit

Task 12

Analyze a Disk Image Using Autopsy

Problem Statement: Analyze the disk image created in Task 11 using Autopsy.

Steps to Complete

  1. Download and install Autopsy from its official website.
  2. Open Autopsy and create a new case.
  3. Import the disk image and analyze its contents.

Tools / Platforms

How to Submit

Task 13

Use Wireshark for Packet Analysis

Problem Statement: Capture and analyze network packets using Wireshark.

Steps to Complete

  1. Start capturing packets on your network interface using Wireshark.
  2. Filter for HTTP packets and examine the details.
  3. Document your findings regarding the traffic observed.

Tools / Platforms

How to Submit

Task 14

Use Volatility for Memory Analysis

Problem Statement: Analyze a memory dump using Volatility to identify suspicious processes.

Steps to Complete

  1. Download and install Volatility from its official GitHub repository.
  2. Obtain a memory dump (sample file available online).
  3. Use Volatility commands to analyze and identify processes.

Tools / Platforms

How to Submit

Task 15

Create a Forensic Report

Problem Statement: Draft a forensic report based on the analysis conducted in Task 12.

Steps to Complete

  1. Document your analysis findings from the disk image analysis.
  2. Include methods used and significant artifacts discovered.
  3. Structure the report professionally.

Tools / Platforms

How to Submit

Conclusion

These tasks are designed to give you real-world experience in cybersecurity and digital forensics while exploring various platforms and tools.

Remember to tag the company and mentor in your submissions.

Good luck, and enjoy your internship journey! ๐ŸŽ‰

Submit Internship Task โ†’