16 weeks Cybersecurity Work Placement
- Kickstart your cybersecurity career with real-world experience! Join a European company as a cybersecurity intern, working alongside top industry professionals in a diverse, multidisciplinary team. Gain hands-on skills, collaborate on real projects, and build the expertise employers are looking for. Take the first step towards your future—enrol now!
Why Choose Us?
- Proven Track Record: We’ve successfully helped countless individuals transition into thriving tech careers.
- Flexible Learning: Our program fits various learning styles and schedules to suit your needs.
- Affordable Investment: Access top-quality training and support at a price that won’t break the bank.
- Flexible Payment Options: We offer various payment plans to make it easier for you to invest in your future.
- Job Guarantee or Your Money Back: Get a refund if you don’t land a job within 6 months of completing our work placement.
- Alumni Networking Scheme: Join our vibrant alumni network where past participants support each other in landing great jobs and growing in their careers.
- With our full support, you’ll gain the technical skills, Agile experience, and confidence needed to become employable in IT, Software, and Cloud Solutions.
Take the first step toward your IT career sign up today!

Cybersecurity
What You will Get:
- Practical, hands-on experience working within an IT company, collaborating with teams of engineers while practicing Agile methodologies and Scrum to deliver real projects.
- Essential soft skills development, a key factor that helps bridge the gap for migrants entering the workforce.
- Professional CV and LinkedIn profile reviews, making you stand out to potential employers.
- Mock job interviews led by a former lead talent recruiter from a top global IT firm to help you ace your next interview.
- A work reference and dedicated job search support to help you find a suitable role during and after your placement.
Our Course and Road Map
Projects
Examine to determine Spam, Phishing and Marlicious emails, take or recommend actions.
Simulating phishing, spam and marlicious emails from time to time to check security awareness level of staff and following up with trainings.
Investigating alerts, tracking incidents, and document responses
integrate with various security tools (firewalls endpoint security- Trelix, log source configuration- Microsoft Azure) to enhance overall security posture
Collect and store logs from different sources (servers, firewalls, applications)
Base on inbuilt rules or custom set rules, we detect suspicious activities and known threats and provide real time alerts
Check activity logs using filters to review operational events like resource modifications and access attempts.
In the Azure Active Directory, find user, reset, confirm and send new password securely with user in the Organization
Puts together logs from different security devices and applications, allowing SOC teams to have a comprehensive view of their security posture and simplifying log analysis.
monitor traffic at the endpoint level to identify and block suspicious activity. This includes blocking unauthorized access attempts and malicious traffic.
Identify vulnerabilities, misconfigurations and potential security threats in our network Infrastructure and Application. Generating comprehensive reports for analysis
Network troubleshooting, penetration testing, and building a secure IT infrastructure
Identifying vulnerabilities, misconfigurations, and security issues in web servers
Identifying vulnerabilities and hardening WordPress installations.
| Risk identification and evaluation, conduct regular risk assessment. |
| Create and maintain policies related to governance, risk management, and compliance. |
| Ensure policies are communicated and understood across the organization. |
Project Synopsis
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Week 1 – 2
1st Sprint
Sprint Planning
Daily stand-up
Sprint Review
MVP Delivery to Stakeholders
Sprint Retrospective
Week 2 – 4
2nd Sprint
Sprint Planning
Daily stand-up
Sprint Review
Project Delivery to Stakeholders
Sprint Retrospective
Technologies You Will Learn
Metasploit
IBM Qradar
Virus Total
Trend Micro
Microsoft Defender
URL Scanner
Microsoft Azure
Nmap
Nessus
Nikto
Kali
Trellix





