0% found this document useful (0 votes)
20 views15 pages

BNS Internship Tasks

Uploaded by

bensonzila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views15 pages

BNS Internship Tasks

Uploaded by

bensonzila
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

BNS

CYBERLAB
Internship Tasks
TIMELINE

02 04

Submission Certificate of Completion


Certificates are processed
After 12-15 days,
after the end date
Submission Form is
mailed
01 03
Start End
After joining the program
Final Day to Submit your
tasks
INSTRUCTIONS

Start Explore Certificate Preference Support


You should only start You are free to select To be eligible for the You are free to choose Interns can contact
your tasks after your your own learning Completion Certificate, any programming [email protected]
internship begins. resources to study and it is mandatory for you language or framework
complete the tasks to complete at least 1 to complete your tasks
tasks. in your internship track
GENERATIVE AI

Text Generation Image Generation Text Generation Neural


with GPT-2 with Pre-trained with Markov Style Transfer
Models Chains
Train a model to generate Apply the artistic style of one
Utilize pre-trained generative Implement a simple text
coherent, contextually relevant image (e.g., a famous painting) to
models like DALL-E-mini or Stable generation algorithm using
text from a given prompt. Using the content of another image
Diffusion to create images from Markov chains. This task involves
GPT-2, an OpenAI transformer using neural style transfer.
text promptsU creating a statistical model that
model, you'll fine-tune it on a
predicts the probability of a
custom dataset to produce text
character or word based on the
that mirrors the style and
previous one(s).
structure of the training data.
WEB DEVELOPMENT

Responsive Personal Portfolio E-commerce Interactive Quiz App


Landing Page Website Product Page
Create an interactive, fixed- Create a personal portfolio Create a product page using Build an interactive quiz app
position navigation menu that website to showcase your web HTML, CSS and JavaScript for an using HTML, CSS, JavaScript, that
changes color or style when development skills, projects, and e-commerce website with allows users to take quizzes, view
scrolled or when hovering over achievements. Design an eye- product details, pricing, and a correct answers, and track their
menu items. Use HTML for catching layout with a home page shopping cart system. scores.
structure, CSS for styling, and featuring a compelling headline, a
JavaScript for interactivity, such professional photo, and a
as altering the background or font summary of your skills. Include an
color during scroll or hover. "About Me" section with details
about your background,
education, and professional
experience.
GOVERNANCE, RISK, AND
COMPLIANCE (GRC)
Risk Assessment Policy and Procedure Business Continuity Internal Audit Risk
Framework Development Plan (BCP) Mapping Tool
Development Development
Develop a risk assessment framework Create or revise organizational
Assist in developing a Develop a tool to assist in risk
for evaluating organizational risks based policies and procedures related to
comprehensive Business mapping for internal audits,
on likelihood and impact, and create a governance, risk management, or
Continuity Plan (BCP) that allowing auditors to quickly
scoring system to prioritize them compliance.
addresses risks to critical business identify areas of high risk.
operations.
Technologies: Excel, Google Sheets, or
Risk Management software (e.g., Technologies: Microsoft Word,
Technologies: Microsoft Word, Technologies: Excel, Power BI, or
RiskWatch, Resolver).. Google Docs, or Policy
Excel, or BCP software (e.g., a customized audit management
Management Software.
Continuity Logic, Fusion tool.
Framework).
CYBER SECURITY

Network Packet Password Simple Pixel Manipulation for


Analyzer Complexity Keylogger Image Encryption
Checker
Develop a simple image
Develop a packet sniffer tool that Create a tool that evaluates create a basic keylogger program
encryption tool using pixel
captures and analyzes network password strength based on that records and logs keystrokes.
manipulation. You can perform
packets, displaying key criteria like length, uppercase and Focus on logging the keys
operations like swapping pixel
information like source and lowercase letters, numbers, and pressed and saving them to a file.
values or applying a basic
destination IP addresses, special characters. Provide users
mathematical operation to each
protocols, and payload data. with feedback on the strength of
pixel.
Ensure the tool is used ethically, their password.
solely for educational purposes.
DIGITAL FORENSICS

Hard Drive Data File Signature Memory Mobile Forensics: App


Recovery Tool Analysis Tool Forensics Data Extraction
Toolkit
Build a tool that can recover deleted Develop a tool that scans files for
Create a toolkit for analyzing a Build a tool to extract data from
files from a hard drive, analyzing file known signatures to identify
computer’s RAM to uncover mobile devices, including apps,
systems and reconstructing lost data. potentially malicious files, based
evidence of malicious activity, messages, photos, and
on their structure, metadata, or
such as active processes or geolocation data.
Technologies: Python, Forensic Toolkit contents.
encryption keys.
(FTK), or EnCase.
Technologies: Android/iOS
Technologies: Python libraries
Technologies: Volatility, Python, forensics tools (e.g., Autopsy,
(pytsk3, libmagic).
Windows/Linux memory dumps. MOBILedit), Python, SQLite.
PYTHON PROGRAMMING

Web Scraping and Data Weather Forecasting Chatbot with NLP Sentiment Analysis
Analysis Tool App Tool

Build a web scraper to collect data from Develop a weather forecasting Create a chatbot that can answer Build a sentiment analysis tool
websites and analyze the information application that fetches weather basic user queries by leveraging that analyzes user-generated
for trends or patterns (e.g., scraping data from an API (e.g., Natural Language Processing content (e.g., product reviews,
product prices, news, or job listings). OpenWeatherMap) and displays (NLP) techniques using libraries tweets) to determine whether the
the forecast to users. like nltk or spaCy. sentiment is positive, neutral, or
negative.
Skills: Skills: Skills:
Python (BeautifulSoup, Requests, ython (Requests) Python (nltk, spaCy) Skills:
Selenium) APIs (OpenWeatherMap or Basic NLP concepts Python (nltk, TextBlob, or
Pandas for data analysis similar) Optionally, Flask or Django for transformers)
Matplotlib or Seaborn for Tkinter for GUI or Flask for web deployment Sentiment analysis
visualizations app Pandas for data manipulation
ADDITIONAL PROJECTS
CYBERSECURITY
Vulnerability Assessment and Penetration Testing: Conduct a vulnerability scan of a website or network and perform
penetration testing to identify and fix security weaknesses.

Developing a Security Awareness Program: Create a comprehensive security awareness training module for employees,
covering topics like phishing, password policies, and social engineering.

Firewall Configuration and Management: Set up, configure, and test firewalls for a network, ensuring robust defense
against unauthorized access.

Incident Response Plan Development: Develop and test an incident response plan for handling potential security
breaches, ensuring proper steps for containment, eradication, and recovery.

www.bnscyberlab.com
ADDITIONAL PROJECTS

DIGITAL FORENSICS AND DATA RECOVERY PROJECTS


Digital Evidence Collection: Recover and analyze digital evidence from a compromised device, such as hard drives,
smartphones, or cloud storage.

File System Forensics: Perform file system analysis to recover deleted files and analyze metadata, identifying important
traces in a criminal investigation.

Email Forensics: Investigate and analyze suspicious email headers to trace the origin and identify potential phishing or
spam campaigns.

Data Recovery from Corrupted Media: Work with specialized tools to recover data from corrupted or damaged drives,
helping clients restore lost data.

www.bnscyberlab.com
ADDITIONAL PROJECTS

GOVERNANCE, RISK, AND COMPLIANCE (GRC) PROJECTS


Risk Assessment and Management Plan: Conduct a risk assessment for a fictional organization and create a risk
management plan to mitigate identified risks.

Compliance Audit for a Business: Perform a compliance audit for a company, ensuring that they meet industry
standards like GDPR, HIPAA, or ISO 27001.

Policy Development for Data Protection: Develop a comprehensive data protection policy that covers data
classification, encryption, access control, and retention.

Third-Party Risk Assessment: Assess the cybersecurity practices of third-party vendors and recommend improvements
to ensure compliance with security standards.

www.bnscyberlab.com
ADDITIONAL PROJECTS

GENERATIVE AI PROJECTS
AI-Based Content Generation: Develop an AI tool that generates text or images using models like GPT-3 or GANs
(Generative Adversarial Networks) for creative or marketing purposes.

AI-Powered Chatbot: Build a conversational AI chatbot using machine learning techniques to handle customer service
queries or support functions.

Machine Learning Model for Prediction: Develop a machine learning model that predicts outcomes based on historical
data, such as sales forecasting or stock market prediction.

Generative Art with Neural Networks: Create generative art projects using deep learning techniques like neural style
transfer or GANs to produce creative visual pieces.

www.bnscyberlab.com
WHAT NEXT?

Review the tasks you completed during your internship. Include your internship in your resume, highlighting the
What skills did you improve? What areas could you specific tasks you worked on, the technologies you used,
enhance further? Reflect on the challenges you faced and and the outcomes of your projects. Focus on measurable
how you overcame them. achievements, such as efficiency improvements or project
successes.
FOLLOW US ON SOCIAL
MEDIA

Visit Our Website Follow Us on Follow Us on Send Us a Mail


www.bnscyberla.com Linkedin Instagram

You might also like