Cybersecurity Report
Cybersecurity Report
ON
AICTE EDUSKILLS VIRTUAL INTERNSHIP
BACHELOR OF TECHNOLOGY
In
Submitted By
(Assistant Professor)
Department of CSE
Affiliated to
DR. APJ ABDUL KALAM TECHNICAL UNIVERSITY,
LUCKNOW
2024-25
1
G.L. BAJAJ INSTITUTE OF TECHNOLOGY & MANAGEMENT
GREATER NOIDA
CERTIFICATE
This is to certify that Kishan Tiwari (2101920100158) is completing the
“Internship Report” entitled “Cyber security Virtual Internship” in partial
fulfilment of the requirements for the award of the degree of BACHELOR OF
TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING for the
academic session 2024-2025. He has completed his Summer Training/Internship
at Eduskills.
Internship Coordinator
2
Declaration
Signature:
Name: Kishan Tiwari
Roll No.: 2101920100158
Date:
Place: Greater Noida
3
Certificate
4
TABLE OF CONTENT
1. Declaration………………………………………………………………………03
2. Certificate………………………………………………………………………..04
3. Table of Content…………………………………………………………………05
4. Chapter 1. Introduction………………………………………………………….06
6. Chapter 3. Objectives……………………………………………………………08
9. Chapter 6. Learnings…………………………………………………………….14
5
Chapter 1
INTRODUCTION
In today’s digital age, where technology drives almost every aspect of human
activity, cybersecurity has become an indispensable field. Protecting data,
systems, and networks from the ever-evolving landscape of cyber threats is not
only a challenge but also a necessity for individuals, businesses, and governments
alike. Recognizing the importance of cybersecurity and the need to develop
practical expertise in this domain, I undertook a Cybersecurity Virtual
Internship supported by Palo Alto Networks.
This internship offered a comprehensive overview of the cybersecurity landscape,
covering key areas such as network security, threat prevention, and incident
response. The program was designed to bridge the gap between theoretical
knowledge and practical application, enabling participants to understand real-
world challenges and solutions in cybersecurity. It emphasized hands-on
experience through interactive modules and case studies, allowing me to gain
insights into industry-standard tools and techniques used for ensuring robust
security.
During the course of the internship, I had the opportunity to work on scenarios
simulating actual cyber incidents, where I analyzed threats, implemented
countermeasures, and devised strategies to safeguard critical systems.
Additionally, I explored the role of artificial intelligence and machine learning in
enhancing cybersecurity measures, reflecting the future-oriented approach of Palo
Alto Networks.
6
Chapter 2
VIRTUAL INTERNSHIP
This virtual internship was 10 weeks long in duration and started from 10 th July
2024 to go on till September 2024. The faculty in-charge of this program was Dr.
Praveen kumar Sir. In summary, the virtual internship journey into cybersecurity
was transformative, demonstrating the effectiveness of the AICTE internship
portal in bridging the gap between academia and practical application. The focus
on the Paltalto network certification enriched the experience, offering valuable
insights into the complexities of theprocess mining landscape.
7
Chapter 3
OBJECTIVES
2. Cybersecurity Fundamentals:
9
Duration and Rating: 1.8 hours with a rating of 4.4.
Objective: Dive into the daily life of a SecOps analyst and understand security
operations.
Topics Covered: The six elements of security operations, SOAR technology,
endpoint protection with the Cortex XDR agent, behavioral analysis.
Duration and Rating: 1.3 hours with a rating of 4.4.
5. SASE Fundamentals:
10
practices. The emphasis on both theoretical knowledge and practical
applications, coupled with the reputable PCCET certification focus, ensured
that the intern was well-prepared to tackle real-world cybersecurity challenges
and contribute effectively to the field. The diverse range of topics covered also
showcased the comprehensive nature of the internship, preparing the intern for
a multifaceted career in the cybersecurity domain.
11
Chapter 5
TOOLS & TECHNOLOGIES
2. Cybersecurity Fundamentals:
12
Tools.
Technologies: Cloud Computing Models, Shared Responsibility Model.
5. SASE Fundamentals:
Tools: SASE Solutions, Zero Trust Network Access (ZTNA) Platforms, SD-
WAN Technologies.
Technologies: Device, User, Application Security.
These tools and technologies were strategically chosen to align with the
specific focus of each module, providing interns with practical exposure to
industry-relevant instruments. The integration of hands-on experiences with
these tools not only enhanced technical proficiency but also prepared interns
for the dynamic and evolving challenges in the cybersecurity landscape. This
amalgamation of theoretical knowledge and practical application equipped
interns with a well-rounded skill set, positioning them as adept contributors to
the field of cybersecurity.
13
Chapter 6
LEARNINGS
5. Network Security
• Understood the fundamentals of securing networks by configuring firewalls,
monitoring traffic, and implementing access control.
14
• Explored best practices for setting up secure communication channels and
managing data flow.
Conclusion:
The internship provided a well-rounded learning experience, helping me to not
only understand cybersecurity challenges but also apply practical solutions
effectively. It has prepared me to address real-world cybersecurity issues with
confidence and precision.
15
Chapter 7
APPLICATIONS
16
AICTE internship portal enhance interns' prospects for seamless integration
into the professional cybersecurity workforce.
Conclusion:
As the interns move forward, they carry with them not just a certification but
a wealth of experiential knowledge that transcends traditional academic
boundaries. This cybersecurity internship, with its holistic approach, has not
only prepared interns for the challenges of the cybersecurity workforce but has
also instilled in them a sense of responsibility, commitment, and ownership in
the dynamic world of cybersecurity.
17