Web Application
Penetration Testing with AI.
A structured, performance-driven engineering evaluation by Ryha Technologies. Interns are trained to think like security engineers — not tool operators. Real pentesting workflows. Public vulnerability disclosure.
Mode
Hybrid · Practical
Duration
30 Days
Fee
₹2,499 one-time
Track
Cybersecurity + AI
Program Structure
Three layers. One engineering pathway.
Foundation Internship
Learning & Evaluation
Entry layer. Every applicant begins here unless eligible for direct evaluation. Structured learning, daily roadmap, three project submissions.
Advanced Internship
Merit-Based · No Cost
Unlocked upon Layer 1 completion. Zero fee. Deeper technical modules, open-source contributions, public research.
Core Project Internship
Stipend-Based
Paid engagement on Ryha production projects. Real clients. Real code. Real responsibility.
Methodology
Production-oriented security analysis workflow.
Reconnaissance
Enumeration
Testing
Reporting
Disclosure
Daily Structured Roadmap
30 days of deliberate practice. Plus a self-paced capstone.
Program Orientation & Ethics
Professional boundaries, legal authorization, and ethics declaration.
Foundations (Web & Network)
HTTP/S, Cookies/Sessions, API fundamentals, Linux basics, TCP/IP, DNS behavior.
Reconnaissance & Enumeration
Target profiling, Subdomain enumeration, Attack surface mapping, Service discovery. Tools: Nmap, Subfinder, Amass, HTTPX, FFUF.
Guided Security AnalysisDeliverable
Vulnerability fundamentals, Input validation, and Auth flow analysis.
Manual Vulnerability Testing
OWASP Top 10, XSS, SQL Injection, CSRF, Session Management.
AI-Assisted PentestingDeliverable
IDOR, Business Logic, AI-Integrated workflow, Automation introduction.
Automation & Bug Bounty
Python/Bash scripting, Custom automation, Bug bounty platforms (HackerOne, Bugcrowd).
Real-World PentestDeliverable
Independent pentest case study and mandatory public vulnerability disclosure. Interns take their own time — ship when it is production-ready.
System Requirements
A capable workstation is non-negotiable.
Processor
RAM
Storage
OS
Internet
Mandatory Tooling
Industry-standard, open-source, methodically taught.
- Kali Linux
- VirtualBox / VMware
- Nmap
- Subfinder / Amass
- HTTPX
- Wayback URLs
- FFUF
- Dirsearch
- Burp Suite (Comm/Pro)
- OWASP ZAP
- Nikto
- Python
- Bash
- SQLMap (Controlled)
- AI Assistance (Payloads, Reports, Logic)
Compliance Rules
Violation results in immediate removal.
Certification Requirements
Certificate Title