Ethical Hacking & CyberSecurity - Internship Program
(Developed & delivered in collaboration with industry professionals,
IIT Faculties & Techible Team)
Ethical Hacking & CyberSecurity - Internship Program
Duration: 4 - 6 Weeks
(Registration on First Come, First Serve Basis)
Limited Seats

Objective
The Ethical Hacking & CyberSecurity Program is designed to build a robust foundation in the principles and practices of digital security. You’ll learn to protect critical systems, analyze threats, and implement effective countermeasures, ensuring you can secure networks, applications, and data in today’s interconnected world.
Benefits & Learning Outcomes
Understand Cyber Threats:
Identify common vulnerabilities, threat vectors, and attack methodologies used by cyber adversaries.
Implement Security Measures:
Apply best practices in network and system security to protect digital infrastructures against attacks.
Conduct Ethical Hacking & Penetration Testing:
Simulate real-world cyber-attacks to assess vulnerabilities and reinforce security postures.
Utilize Cryptography:
Understand encryption methods and secure communication protocols that ensure data confidentiality and integrity.
Develop Incident Response Strategies:
Prepare for and manage security incidents, from detection and analysis to mitigation and recovery.

Internship Program Includes
- Live Interaction Sessions
- Project-based Learning
- Hands-On Projects
- Career Support Resources
- Comprehensive Project Portfolio
- Guidance and Mentorship by Founders
- Hackathons & Competitions
- Final Reports & Presentations
- Internship Certificate
Complementary Training Sessions for Registered students
- Learn 15+ Generative AI Tools & Prompt Engineering
- Special Sessions on entrepreneurship
- CV building training and Job guidance
- Optimising LinkedIn Profile for branding and professional growth
- Communication Skills & Personality Development
Have Any Question?
In case of any query, please reach out.
- summerschool@iitjammu.ac.in
- +91-7056954541
Program Modules
Overview:
- Establish a strong foundation in cybersecurity concepts, threat landscapes, and risk management strategies.
Key Topics: - Cybersecurity fundamentals, history, and evolving threat scenarios.
- Overview of industry frameworks and compliance requirements.
- Establish a strong foundation in cybersecurity concepts, threat landscapes, and risk management strategies.
Overview:
- Dive into the principles of securing network infrastructures, focusing on protecting data in transit.
Key Topics: - Firewall configurations, intrusion detection and prevention systems, VPNs, and secure network architecture design.
- Dive into the principles of securing network infrastructures, focusing on protecting data in transit.
Overview:
- Gain hands-on experience in simulating cyber-attacks to uncover vulnerabilities and strengthen defenses.
Key Topics: - Vulnerability assessment, penetration testing methodologies, and tools such as Metasploit and Wireshark.
- Legal, ethical, and compliance aspects of ethical hacking.
- Gain hands-on experience in simulating cyber-attacks to uncover vulnerabilities and strengthen defenses.
Overview:
- Learn the core principles of cryptography and the role of encryption in safeguarding information.
Key Topics: - Symmetric and asymmetric encryption techniques, digital signatures, cryptographic protocols, and secure key management.
- Learn the core principles of cryptography and the role of encryption in safeguarding information.
Overview:
- Develop the skills to monitor, detect, and respond to security incidents effectively.
Key Topics: - Incident response planning, digital forensics, security information and event management (SIEM), and continuous security monitoring.
- Develop the skills to monitor, detect, and respond to security incidents effectively.
Overview:
- Integrate your knowledge through a comprehensive project that simulates real-world cybersecurity challenges.
Key Topics: - Conducting a full-scale security assessment, developing an incident response strategy, and implementing corrective measures to secure a hypothetical organization's IT infrastructure.
- Integrate your knowledge through a comprehensive project that simulates real-world cybersecurity challenges.
Registration Process
(To register, follow the steps mentioned below)
Note: Some updates are being made at the backend so manual enrolments are being done.
Registration Charges:
Offline Mode: Rs 5899 (Rs. 4999 + 18% gst)
Online Mode: Rs 4999 (Rs. 4235 + 18% gst)
|| Please note: These are the only charges you need to pay—there are no additional fees for the program. ||
For accommodation/stay, check FAQs.
1. Make the Payment [Rs. 5899 (offline mode) or Rs. 4999 (online mode) ] by scanning the QR Code, or to UPI
Or directly transfer to the following Account:
Account type: Savings Account
2. Fill the “Registration Form” by clicking on the button below, attach payment screenshot and mention all the details correctly.
3. You will receive a confirmation email from IIT Jammu upon successful registration.
(Please note: This email may take some time.)
Frequently Asked Questions (FAQs)
Common Questions
Yes, the program is open to all students. Those opting for offline mode can avail hostel accommodation, but seats are limited and will be allotted on a first-come, first-served basis. Students will have to bear their own accommodation and food expenses.
- Hostel charges: INR 250 per day for double sharing and INR 375 per day for single sharing.
- Mess charges: INR 150 per day.
These charges are not included in the program fee and will be paid by students on a per-day basis during the program.
Yes, upon successful completion of the program, students will receive an internship certificate from IIT Jammu along with I3C, and Techible logos.
No, there is no direct placement support. However, dedicated sessions and networking opportunities will be provided for career guidance and future prospects.
Yes, students from all academic backgrounds who are willing to learn can apply. The programs are designed to provide exposure and networking opportunities to all.
No, the program is open to all students who register. There is no selection or interview process. After the payment you will be registered in the program (If seats are left).
The internship duration is 4-6 weeks, starting from the second week of June. The exact schedule and session timings will be shared by May 30.
- Students may apply for a refund in the first week of the program.
- After the first week, no refund requests will be entertained.
- A 20% deduction will be applied to all refunds.
No, students must arrange their own travel to and from the program location.
No, there are no scholarships or financial assistance options. The program fee is structured to ensure accessibility.
After completing the registration and payment process, students can expect a confirmation email or offer letter within a week.
If you do not receive a confirmation email within a week, please contact the support team at summerschool@iitjammu.ac.in.
The detailed schedule, including session timings, will be shared by May 30.
We can facilitate that with more number of projects/assignments. You can request this over email.
All necessary software tools will be provided during the sessions, and assistance for installation will be given. However, a laptop/PC with internet facility is required.
Yes, basic facilities such as Wi-Fi will be available for students availing for accommodation.
Students who put in effort and perform well during the program will be eligible for a letter of recommendation.
Yes, the program includes a variety of hands-on projects to enhance practical understanding of the concepts taught.
Yes, apart from technical learning, students will benefit from:
- Networking with IIT faculty and industry professionals.
- Career guidance sessions.
- Exposure to real-world applications and project-based learning.
For any further queries, please write to summerschool@iitjammu.ac.in with your concerns mentioned in detail.
Yes, the seats are filling fast. We'll update on the website when the seats are full.