Applied Offensive Cyber Security: Real-World Penetration Testing and Vulnerability Analysis
Main contact

Timeline
-
October 21, 2025Experience start
-
December 3, 2025Experience end
Experience scope
Categories
Security (cybersecurity and IT security)Skills
vulnerability assessments offensive security security risk cyber security ethical hacking ethical standards and conduct penetration testing common vulnerability scoring system (cvss) operating systems workflow managementStudents in this post-graduate certificate program are advanced students who have undergone intensive training in ethical hacking, vulnerability analysis, and offensive cybersecurity.
They are capable of:
- Conducting professional-grade penetration testing and vulnerability assessments
- Applying the seven phases of penetration testing to identify, document, and remediate real-world security threats
- Analyzing Tactics, Techniques, and Procedures (TTPs) used by malicious actors
- Installing, configuring, and using offensive security tools across web apps and OS environments
- Creating detailed technical reports and security risk ratings with strategic recommendations
- Working in teams to simulate real-world threat scenarios, leveraging professional tools and workflows
Learners
Over the course of this capstone project, student teams will apply their offensive cybersecurity skills in a real-world or simulated setting. They will assess systems, identify vulnerabilities, and produce formal documentation and recommendations based on professional standards.
Deliverables include:
- Penetration Testing Plan – detailing scope, methodology, and goals
- Vulnerability Assessment – findings from testing including identified risks and impacted assets
- Exploit Analysis – demonstration or documentation of successful exploit attempts (in sandbox)
- Remediation Strategy – prioritized recommendations for fixing vulnerabilities
- Risk Rating Report – formalized using an industry-standard scale (e.g., CVSS)
- Capstone Presentation – walkthrough of findings and recommendations
Note: All assessments will respect legal, ethical, and institutional boundaries (no live production systems tested without written approval).
Project timeline
-
October 21, 2025Experience start
-
December 3, 2025Experience end
Project examples
Ideal project partners:
- Have a secure test environment or are open to simulated/sandbox projects
- Are curious about their security posture or want a second opinion
- Can provide scope, access, or sample datasets for a realistic experience
- Are open to giving feedback on final reports or presentations
Project examples
- Performing a controlled penetration test on a test environment or sandbox application
- Assessing a simulated corporate network or web application for known exploits
- Creating a threat model and risk report for a cloud-based system
- Testing access controls and permissions in a role-based access environment
- Building a full vulnerability report for a startup, nonprofit, or SME sandbox system
Projects must be legal, ethically sound, and clearly scoped. Students can work with simulated data, staging environments, or predefined lab scenarios provided by the employer.
Additional company criteria
Companies must answer the following questions to submit a match request to this experience:
Main contact

Timeline
-
October 21, 2025Experience start
-
December 3, 2025Experience end