Penetration Testing Placements

London Metropolitan University
London, England, United Kingdom
Employer Engagement Admnistrator
(1)
3
Timeline
  • February 23, 2022
    Experience start
  • May 18, 2022
    Experience end
Experience
10 projects wanted
Dates set by experience
Preferred companies
Anywhere
Any
Any industries

Experience scope

Categories
Information technology Data analysis Product or service launch
Skills
digital marketing sales & marketing business consulting business strategy marketing strategy
Learner goals and capabilities

This work placement allows students to put their theoretical skills into practice within your company. It constitutes a structured period of work-based learning which has been shown to help undergraduate students develop a wide range of technical work-related skills such as website Penetration testing, system analysis, providing cyber security solutions and Cyber Security reporting. In addition, students are given the opportunity to develop their professional competence in a working environment, benefiting from mentoring and support from experienced professionals.

Students are available for up to 110 hours starting May till the end of May 2022. This is an unpaid for-credit experience.

Learners

Learners
Undergraduate
Any level
25 learners
Project
116 hours per learner
Learners self-assign
Individual projects
Expected outcomes and deliverables

The final deliverable will vary depending on the scope of the project. Students need to complete 110 hours by the end of May 2022.

Project timeline
  • February 23, 2022
    Experience start
  • May 18, 2022
    Experience end

Project Examples

Requirements

Web application and infrastructure level penetration knowledge according to modules taken within the university. However the main tasks students will accomplish is as follows:

1) Agreement phase - mutual agreement between the client and you

2) Planning and reconnaissance – You will gather as much information about the target as possible. The information can be IP addresses, domain details, mail servers, network topology, etc.

3) Scanning – You will interact with the target with an aim to identify the vulnerabilities. Furthermore, you will send probes to the target and records the response of the target to various inputs. This phase includes- scanning the network with various scanning tools, identification of open share drives, open FTP portals, services that are running, and much more.

4) Gaining Access - Once the vulnerabilities have been identified, the next step is to exploit the vulnerabilities with an aim to gain access to the target. The target can be a system, firewall, secured zone or server.

5) Maintaining access - The next step is to ensure that the access is maintained; i.e., persistence. This is required to ensure that the access is maintained even if the system is rebooted, reset or modified.

6) Exploitation – You will try to get the data, compromise the system, launch dos attacks, etc. Usually, this phase is controlled in penetration testing so as to ensure that the issues caused on the network is limited.

7) Evidence collection and report generation -The final aim is to collect the evidence of the exploited vulnerabilities and report it to the executive management for review and action.

Additional company criteria

Companies must answer the following questions to submit a match request to this experience:

Provide a dedicated contact who is available to answer periodic queries over the duration of the project to address student's questions.

Be available for a quick video call with the London Met team to initiate your relationship and confirm your scope is an appropriate fit for the course.

Simple evaluation and feedback to each student at the end of the placement period with a short google feedback form.

Sign a learning agreement form to confirm that they are in a working partnership with London Met students.