CISCO - Cyber Security Virtual Internship Program 2021: J Giftson Jeba Selva Raja - Urk19Cs1097
CISCO - Cyber Security Virtual Internship Program 2021: J Giftson Jeba Selva Raja - Urk19Cs1097
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING
August 2021
1|3Page Internship2021-2022
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BONAFIDE CERTIFICATE
This is to certify that the report entitled, “Cyber Security Virtual Internship Program”
is a bonafide record of Internship work done at CISCO Networking Academy during the
academic year 2021-2022 by
in partial fulfillment of the requirements for the award of the degree of Bachelor of Technology
in Computer Science and Engineering of Karunya Institute of Technology and Sciences.
Guide Signature
Associate Professor
2|3Page Internship2021-2022
ACKNOWLEDGEMENT
First and foremost, I praise and thank ALMIGTHY GOD whose blessings have
I am grateful to our beloved founders Late. Dr. D.G.S. Dhinakaran, C.A.I.I.B, Ph.D
and Dr. Paul Dhinakaran, M.B.A, Ph.D, for their love and always remembering us in their
prayers.
I extend my thanks to our Vice Chancellor Dr. P. Mannar Jawahar, Ph.D and our
Registrar Dr. Elijah Blessing, M.E., Ph.D, for giving me this opportunity to do the internship.
I would like to thank Dr. Prince Arulraj, M.E., Ph.D., Dean, School of Engineering
and Technology for his direction and invaluable support to complete the same.
I would like to place my heart-felt thanks and gratitude to Dr. J. Immanuel John Raja,
M.E., Ph.D., Head of the Department, Computer Science and Engineering for his
I feel it a pleasure to be indebted to, Mr. J. Andrew, M.E, (Ph.D.), Assistant Professor,
Department of Computer Sciences Technology, Dr. G. Jaspher W. Kathrine and Dr. Getzi
I also thank all the staff members of the Department for extending their helping hands
I would also like to thank all my friends and my parents who have prayed and helped
3|3Page Internship2021-2022
J GIFTSON JEBA SELVA RAJA
Karunya Institute Of Technology and Sciences
STU608a53d60422d1619678166
Corporate
Social Cisco Networking Academy
Responsibility
Certificate of Course Completion
Introduction to Cybersecurity
For completing the Cisco Networking Academy® Introduction to Cybersecurity course, and demonstrating the ability to explain the
following:
Global implications of cyber threats Cisco’s approach to threat detection and defense
Ways in which networks are vulnerable to attack Why cybersecurity is a growing profession
Impact of cyber-attacks on industries Opportunities available for pursuing network security certifications
Student
Academy Name
Location Date
Cybersecurity Essentials
For completing the Cisco Networking Academy® Cybersecurity Essentials course, and demonstrating the following abilities:
Describe the tactics, techniques and procedures used by cyber Explain how cybersecurity professionals use technologies, processes
criminals. and procedures to defend all components of the network.
Describe the principles of confidentiality, integrity, and availability as Explain the purpose of laws related to cybersecurity.
they relate to data states and cybersecurity countermeasures.
Describe technologies, products and procedures used to protect
confidentiality, ensure integrity and provide high availability.
Student
Academy Name
Location Date
Deva Priya I
Student
Academy Name
Location Date
Deva Priya I
1) Insider Attacks.
2) Missed Security Patches.
3) Configuration Mistakes.
4) A Lack of Deep Packet Inspection.
5) DDoS Attacks.
Security threads
1. Lax Password
2. Outdated Firewall Software
3. Failure to Activate Controls
4. Firewall Access May Be Too Lax
5. Lack of Documentation
6. Vulnerability to Insider Attacks
7. Inspection Protocols Are Too Basic
Devices used
Switch
Router
Computer
Laptop
Access point
Smart phone
Printer
Tablet
Devices used
YES
A larger bit hash can provide more security because there are more possible combinations.
Remember that one of the important functions of a cryptographic hashing algorithm is that is
produces unique hashes
Lab 2.1.1.2 deploying devices
Lab 2.1.1.2 deploying and cabling devices
Packet tracer activities: