
Cybersecurity Internship Program
Build your Cyber Security or IT career at Cyber Train
Strengthen your business security
Interested in Cybersecurity, but not sure where to start? Cyber Train Internship Program might be the one you are looking for.
Cybersecurity is on everyone’s radar at the moment due to tough regulations (such as GDPR) around security and privacy. Any breach can be quite costly for organizations. As a result, a lot of organizations are investing in their security infrastructure and more importantly in the staff training as the attacks are increasingly being originated from within the networks. Get the training you need to safeguard any network against debilitating cyber attacks by enrolling in a range of courses offered by Cyber Train through our internship program and become the highly-skilled security professional in the area of cyber security.
Why Cybersecurity?

A job that never gets boring

Easy to move into this field

Highly demanded area

Highly paid
jobs

Plenty of opportunities

Mathematics is not a concern

Unlimited potential for personal growth

A chance to work with top class organizations
Our Cybersecurity internship program comes with three levels of work-based training
6 Months
Delivery
Face-to-face, online or blended
Pre-requisites
Basic networking and IT skills are desirable
BEGINNER
Key Job Roles (Security+)
Security Administrator
Security Consultant
Security Engineer
Key Job Roles (CySA+)
Security Analyst
Vulnerability Analyst
Cybersecurity Specialist
Threat Intelligence Analyst
Security Engineer
Delivery
Face-to-face, online or blended
Pre-requisites
Beginner level must be completed
INTERMEDIATE
3 Months
Key Job Roles (Pentest+)
Penetration Tester
Vulnerability Tester
Security Analyst (II)
Vulnerability Assessment Analyst
Network Security Operations
Application Security Vulnerability
Key Job Roles (CASP+)
Cybersecurity Manager
Security Architect
Technical Lead Analyst
Application Security Engineer
Security Engineer
Industry Certifications
CompTIA Advanced Security Professional (CASP+)
Pre-requisites
Intermediate level must be completed
3 Months
ADVANCED
Delivery
Face-to-face, online or blended
Professional approach to learn Cybersecurity
Learn to protect your business data from breaches because information security is the immune system in the body of business.
Improve your skills and enhance your credentials
Our Traineeship Program is aimed at producing skilled and trained Cybersecurity Professionals. We are currently seeking partnerships with the industry. If you are an employer and would like to acquire skilled and trained security professionals then Enquire Now.
Target Audience
Anyone switching to Cybersecurity
Technically minded with an investigative approach
To obtain recognized work experience
Start a career as Security Analyst
Start a career as Penetration Tester
Start a career as an Ethical Hacker
Successful program completion comes with:
Course completion certificate
Work experience certificate
Reference letter
Industry exams preparation
Study material
Labs access
Exam vouchers
Mentoring and coaching
Free consultation including career advice, LinkedIn profile, resume, cover letter and interview techniques

Learning Outcomes
Confidently perform day-to-day cybersecurity tasks such as:
Network scanning
Pentesting of web applications, wireless networks, firewalls, end-user devices
Understanding Cyberkill Chain
Chain of Custody
Laws relevant to Cybersecurity
Cyber Hygiene
Cyber Awareness
Windows and Linux command-line basics with hardening techniques
Blue team, Red team, Purple team exercises
Vulnerability Scanning
Capture and Analyze security-related data using tools like Splunk and ELK
Understand the processes and workflows involved in a SOC
Report Writing
Communication Skills
Understanding of Hardware and Software tools required in a SOC
Effectively conducting Cybersecurity data analysis such as Aggregation, Correlation and Normalization of logs
Understanding the configuration of firewalls and proxies
Security Incident Handling
Understanding and using Play books
Maintain and update Cybersecurity-related documentation as required
Work effectively as part of a Cybersecurity team (Security Analyst, Penetration Tester, Vulnerability Scanner, Security Engineer, Threat Intelligence Analyst, Security Consultant, System Administrator and Network Administrator)
Mentoring and assistance to confidently apply for roles in a Security Operations Center