Abstract:
Beep Report on Technical Internship experience as a Technical Executive at Backdoor Pvt. Ltd (3 Months) This lengthy report describes the professional knowledge and technical skills I acquired through my three-month internship as a Technical Executive in Backdoor Private Limited which is a leading cybersecurity company in Bangladesh. Vulnerability Assessment and Penetration Testing (VAPT), Digital Forensics, Security OperationsCentrer (SOC) monitoring, etc. were some very sensitive domains of Cybersecurity that I got exposed to during the internship from 16th October 2025 to 16th December 2025. The report systematically details operational experience with the most common cybersecurity tools and techniques. The report summarises hands-on experience with cybersecurity tools and methodologies that are commonly used in industry. Some of the technical aspects covered include network discovery using Nmap and Zenmap, vulnerability scanning with Nessus and OpenVAS, digital forensics with Oxygen Forensic, Autopsy and FTK Imager, security testing using GoPhish and Hydra frameworks. Conducting comprehensive security assessments, forensic data recovery, simulating targeted phishing and assisting with organisational vulnerability management were all significant professional achievements. The internship helped to cultivate important professional skills such as writing technical documents, working in teams to find solution andpractisingg ethical security. While there were operational limitations surrounding the testing of offensive exploitation, this experience imparted significant practical understanding of defensive capabilities and proactive risk reduction actions. This internship effectively connected the dots between theoretical academic learning and real-world demand, providing a sound technical basis to work in cybersecurity while offering a real-world context of present-day security issues. Critical success factors can now be readily defined and realised through the identification, closure and remediation of key vulnerabilities in client infrastructures; effective forensic investigations for incident response requirements; and tangible enhancements to security awareness within the organisation by running simulated phishing campaigns.