Internship
For B.Sc / M.sc - Comps Sc
Company: Hackveda Limited
Industry Type: Software Development, Workforce Development, Research and Development
Position: Cybersecurity Intern
Location: Remote (Work from Home)
We are hiring INTERNS from Computer Science, Information Technology, BCA, MCA and other IT related under-graduation programs with Hands-On knowledge of Cybersecurity
Overall Duration of Self Learning on Hackveda One2One: 4 Week
Register Here to Get Started Free on Hackveda One2One
Internship Selection Interview Date: On the basis of Completion of Self Learning Course
Overall Duration of the Internship: 6 Week to 6 Months
Internship Timings: 10 am - 8 pm (Monday to Saturday) or Flexible Hours as per availability
Probation period without stipend: 6 Week
Minimum Stipend: Rs 5000/- upto 15,000/- per month (after probation period)
Please note: Excellent verbal, written and presentation skills (is a must)
We are hiring interns from Computer Science, Information Technology, BCA, MCA and other IT related under-graduation programs with Hands-On knowledge of the listed concepts below available on Hackveda One2One:
| TOPICS |
|---|
| Basics of Networking and Concepts of Reverse Hacking |
| Concepts of Reverse Shell Hacking using Amazon Web Services |
| Concepts of Reverse Shell Hacking using AWS Part II |
| Create a Virus for Windows Operating System using Metasploit |
| Introduction to Network Mapper and Zenmap |
| Microsoft MTA 98-367 Security Fundamentals |
| Attacks on Data Availability |
| Man in the Middle Attack using ARP Spoofing |
| Hacking Web Application and Exploit Development - Penetration Testing |
| How to hack passwords and important info from SSL Packets |
| Hackers way of understanding how the networks work |
| Design a Virus for Windows Operating System |
| Hacking Mobile Phones - Develop Virus for Mobile Devices |
| How Local Area and Wide Area Network Works & Packet Capturing |
| Hacking websites using SQL Injections |
| Software Cracking - How to Crack any Software |
| How to Hide Confidential Files and Tracking Deleted Files with Forensics |
| Denial of Service Attacks and Maintain Server Security |
| XSS Attacks, Session Hijacking Website Hacking |
| Hackers | A visual Introduction on Types of Hackers |
| Understand attack methods employed by Hackers |
No comments:
Post a Comment