Ryha Internship Program · Layer 1
Batch: Starting Soon

Web Application
Penetration Testing with AI.

A structured, performance-driven engineering evaluation by Ryha Technologies. Interns are trained to think like security engineers — not tool operators. Real pentesting workflows. Public vulnerability disclosure.

Apply Now
Performance-driven evaluation system

Mode

Hybrid · Practical

Duration

30 Days

Fee

₹2,499 one-time

Track

Cybersecurity + AI

Program Structure

Three layers. One engineering pathway.

LAYER / 01Active

Foundation Internship

Learning & Evaluation

Entry layer. Every applicant begins here unless eligible for direct evaluation. Structured learning, daily roadmap, three project submissions.

LAYER / 02Locked

Advanced Internship

Merit-Based · No Cost

Unlocked upon Layer 1 completion. Zero fee. Deeper technical modules, open-source contributions, public research.

LAYER / 03Locked

Core Project Internship

Stipend-Based

Paid engagement on Ryha production projects. Real clients. Real code. Real responsibility.

Methodology

Production-oriented security analysis workflow.

01

Reconnaissance

02

Enumeration

03

Testing

04

Reporting

05

Disclosure

Daily Structured Roadmap

30 days of deliberate practice. Plus a self-paced capstone.

Day 0

Program Orientation & Ethics

Professional boundaries, legal authorization, and ethics declaration.

Days 1–5

Foundations (Web & Network)

HTTP/S, Cookies/Sessions, API fundamentals, Linux basics, TCP/IP, DNS behavior.

Days 6–12

Reconnaissance & Enumeration

Target profiling, Subdomain enumeration, Attack surface mapping, Service discovery. Tools: Nmap, Subfinder, Amass, HTTPX, FFUF.

Project 1 · Day 13

Guided Security AnalysisDeliverable

Vulnerability fundamentals, Input validation, and Auth flow analysis.

Days 14–20

Manual Vulnerability Testing

OWASP Top 10, XSS, SQL Injection, CSRF, Session Management.

Project 2 · Day 21

AI-Assisted PentestingDeliverable

IDOR, Business Logic, AI-Integrated workflow, Automation introduction.

Days 22–30

Automation & Bug Bounty

Python/Bash scripting, Custom automation, Bug bounty platforms (HackerOne, Bugcrowd).

Final Project · Self-Paced

Real-World PentestDeliverable

Independent pentest case study and mandatory public vulnerability disclosure. Interns take their own time — ship when it is production-ready.

System Requirements

A capable workstation is non-negotiable.

Processor

Minimumi5 (8th gen+) / Ryzen 5 (3000+)
Recommendedi7 / Ryzen 7

RAM

Minimum8 GB
Recommended16 GB

Storage

Minimum256 GB SSD
Recommended512 GB NVMe SSD

OS

MinimumWin 10/11, Kali, or Ubuntu
RecommendedKali Linux Native

Internet

Minimum10 Mbps stable
Recommended20 Mbps or higher

Mandatory Tooling

Industry-standard, open-source, methodically taught.

01 / Operating Environment
  • Kali Linux
  • VirtualBox / VMware
02 / Reconnaissance
  • Nmap
  • Subfinder / Amass
  • HTTPX
  • Wayback URLs
03 / Enumeration
  • FFUF
  • Dirsearch
04 / Testing
  • Burp Suite (Comm/Pro)
  • OWASP ZAP
  • Nikto
05 / Automation & Scripting
  • Python
  • Bash
  • SQLMap (Controlled)
06 / AI Tools
  • AI Assistance (Payloads, Reports, Logic)

Compliance Rules

Only in-scope testing
No unauthorized scanning
No illegal exploitation
Strict disclosure policies
Professional conduct at all times

Violation results in immediate removal.

Certification Requirements

All 3 Project repositories verified on GitHub
Public vulnerability report submitted (HackerOne/Bugcrowd/Open)
Documentation & ethics compliance verified

Certificate Title

Layer 1 — Web Application Penetration Testing with AI

Ready to join Layer 1?

Apply for Internship

Note: System requirements are mandatory for enrollment.