Penetration Testing Placements

VI
Closed
London Metropolitan University
School of Computing and Digital Media (CDM) London, England, United Kingdom
TE
Employer Engagement Admnistrator
(1)
3
General
  • Post-graduate
  • 25 learners; teams of 5
  • 116 hours per learner
  • Dates set by experience
  • Learners self-assign
Preferred companies
  • 2/10 project matches
  • Anywhere
  • Academic experience
  • Any
  • Any
Categories
General Data analysis Product or service launch Information technology
Skills
digital marketing sales & marketing business consulting business strategy marketing strategy
Project timeline
  • May 31, 2021
    Experience start
  • September 30, 2021
    Experience end
Overview
Details

This work placement allows students to put their theoretical skills into practice within your company. It constitutes a structured period of work-based learning which has been shown to help undergraduate students develop a wide range of technical work-related skills such as website Penetration testing, system analysis, providing cyber security solutions and Cyber Security reporting. In addition, students are given the opportunity to develop their professional competence in a working environment, benefiting from mentoring and support from experienced professionals.

Students are available for up to 110 hours starting May till the end of September 2021. This is an unpaid for-credit experience.

Learner skills
Digital marketing, Sales & marketing, Business consulting, Business strategy, Marketing strategy
Deliverables

The final deliverable will vary depending on the scope of the project. Students need to complete 110 hours by the end of September 2021.

Project Examples

Web application and infrastructure level penetration knowledge according to modules taken within the university. However the main tasks students will accomplish is as follows:

1) Agreement phase - mutual agreement between the client and you

2) Planning and reconnaissance – You will gather as much information about the target as possible. The information can be IP addresses, domain details, mail servers, network topology, etc.

3) Scanning – You will interact with the target with an aim to identify the vulnerabilities. Furthermore, you will send probes to the target and records the response of the target to various inputs. This phase includes- scanning the network with various scanning tools, identification of open share drives, open FTP portals, services that are running, and much more.

4) Gaining Access - Once the vulnerabilities have been identified, the next step is to exploit the vulnerabilities with an aim to gain access to the target. The target can be a system, firewall, secured zone or server.

5) Maintaining access - The next step is to ensure that the access is maintained; i.e., persistence. This is required to ensure that the access is maintained even if the system is rebooted, reset or modified.

6) Exploitation – You will try to get the data, compromise the system, launch dos attacks, etc. Usually, this phase is controlled in penetration testing so as to ensure that the issues caused on the network is limited.

7) Evidence collection and report generation -The final aim is to collect the evidence of the exploited vulnerabilities and report it to the executive management for review and action.

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

Sign a learning agreement form to confirm that they are in a working partnership with London Met students.

Simple evaluation and feedback to each student at the end of the placement period with a short google feedback form.

Be available for a quick video call with the London Met team to initiate your relationship and confirm your scope is an appropriate fit for the course.

Provide a dedicated contact who is available to answer periodic queries over the duration of the project to address student's questions.