Pinned Loading
-
Cybersecurity-Internship-Task-2
Cybersecurity-Internship-Task-2 PublicHands-on phishing email investigation identifying spoofing techniques, deceptive URLs, and credential harvesting indicators.
-
Cybersecurity-Internship-Task-3
Cybersecurity-Internship-Task-3 PublicPractical cybersecurity task demonstrating hands-on threat discovery and vulnerability analysis using standard tools to identify open services, port exposure, and basic security weaknesses.
-
Cybersecurity-Internship-Task-4
Cybersecurity-Internship-Task-4 PublicHands-on firewall configuration and testing on Windows to block insecure services and enforce security policies, demonstrating practical understanding of network traffic control and defensive secur…
-
Cybersecurity-Internship-Task-5
Cybersecurity-Internship-Task-5 PublicHands-on network traffic capture and protocol analysis using Wireshark on Kali Linux, demonstrating DNS resolution, TCP handshake, TLS negotiation, and ICMP traffic inspection.
-
Cybersecurity-Internship-Task-6
Cybersecurity-Internship-Task-6 PublicA hands-on cyber security task demonstrating how password complexity affects security through real-time strength evaluation
-
Cybersecurity-Internship-Task-7
Cybersecurity-Internship-Task-7 PublicCybersecurity internship task to identify and remove suspicious browser extensions using Firefox. Includes permission analysis, red flag identification, and security research.
If the problem persists, check the GitHub status page or contact support.