0% found this document useful (0 votes)
34 views17 pages

Cybersecurity Report

The document is a summary report of a Cybersecurity Virtual Internship undertaken by Kishan Tiwari as part of his Bachelor of Technology degree in Computer Science and Engineering. The internship, supported by Palo Alto Networks, focused on practical skills in cybersecurity, covering topics such as network security, threat detection, and incident response over a 10-week period. The report outlines the objectives, courses undertaken, tools used, key learnings, and applications of the knowledge gained during the internship.

Uploaded by

Kishan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views17 pages

Cybersecurity Report

The document is a summary report of a Cybersecurity Virtual Internship undertaken by Kishan Tiwari as part of his Bachelor of Technology degree in Computer Science and Engineering. The internship, supported by Palo Alto Networks, focused on practical skills in cybersecurity, covering topics such as network security, threat detection, and incident response over a 10-week period. The report outlines the objectives, courses undertaken, tools used, key learnings, and applications of the knowledge gained during the internship.

Uploaded by

Kishan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

A SUMMARY REPORT

ON
AICTE EDUSKILLS VIRTUAL INTERNSHIP

For the partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY

In

COMPUTER SCIENCE AND ENGINEERING

Submitted By

Kishan Tiwari (2101920100158)


B. Tech. CSE, 4th year

Under the Supervision of


Dr. Amit Wadhawa

(Assistant Professor)
Department of CSE

G.L. BAJAJ INSTITUTE OF TECHNOLOGY MANAGEMENT, GREATER NOIDA

Affiliated to
DR. APJ ABDUL KALAM TECHNICAL UNIVERSITY,
LUCKNOW
2024-25

1
G.L. BAJAJ INSTITUTE OF TECHNOLOGY & MANAGEMENT

GREATER NOIDA

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE
This is to certify that Kishan Tiwari (2101920100158) is completing the
“Internship Report” entitled “Cyber security Virtual Internship” in partial
fulfilment of the requirements for the award of the degree of BACHELOR OF
TECHNOLOGY in COMPUTER SCIENCE AND ENGINEERING for the
academic session 2024-2025. He has completed his Summer Training/Internship
at Eduskills.

Dr. Praveen Kr Rai

Internship Coordinator

2
Declaration

I hereby declare that the work presented in this report entitled


‘AICTE EDUSKILLS VIRTUAL INTERNSHIP’, in partial
fulfilment of the requirement for the award of the degree of
Bachelor of Technology in Computer Science & Engineering,
submitted to A.P.J. Abdul Kalam Technical University, Lucknow, is
based on my learning carried out at the Department of Computer
Science & Engineering, G.L. Bajaj Institute of Technology &
Management, Greater Noida. The documentation contained in the
report is original and I have not submitted this report for the award
of any other degree or diploma.

Signature:
Name: Kishan Tiwari
Roll No.: 2101920100158

Date:
Place: Greater Noida

3
Certificate

4
TABLE OF CONTENT

1. Declaration………………………………………………………………………03

2. Certificate………………………………………………………………………..04

3. Table of Content…………………………………………………………………05

4. Chapter 1. Introduction………………………………………………………….06

5. Chapter 2. Virtual Internship……………………………………………………07

6. Chapter 3. Objectives……………………………………………………………08

7. Chapter 4. Courses Undertaken………………………………………………….09

8. Chapter 5. Tools & Technologies………………………………………………..12

9. Chapter 6. Learnings…………………………………………………………….14

10. Chapter 7. Applications & Conclusion………………………………………….16

5
Chapter 1
INTRODUCTION

In today’s digital age, where technology drives almost every aspect of human
activity, cybersecurity has become an indispensable field. Protecting data,
systems, and networks from the ever-evolving landscape of cyber threats is not
only a challenge but also a necessity for individuals, businesses, and governments
alike. Recognizing the importance of cybersecurity and the need to develop
practical expertise in this domain, I undertook a Cybersecurity Virtual
Internship supported by Palo Alto Networks.
This internship offered a comprehensive overview of the cybersecurity landscape,
covering key areas such as network security, threat prevention, and incident
response. The program was designed to bridge the gap between theoretical
knowledge and practical application, enabling participants to understand real-
world challenges and solutions in cybersecurity. It emphasized hands-on
experience through interactive modules and case studies, allowing me to gain
insights into industry-standard tools and techniques used for ensuring robust
security.
During the course of the internship, I had the opportunity to work on scenarios
simulating actual cyber incidents, where I analyzed threats, implemented
countermeasures, and devised strategies to safeguard critical systems.
Additionally, I explored the role of artificial intelligence and machine learning in
enhancing cybersecurity measures, reflecting the future-oriented approach of Palo
Alto Networks.

6
Chapter 2
VIRTUAL INTERNSHIP

In this virtual internship experience facilitated by AICTE's internship portal,


the focus was on the cyber security domain, particularly the certification
offered by Paloalto network. The internship served as a crucialbridge between
theoretical knowledge and practical application, aligning with the evolving
perspective of work as a commitment and responsibility. The AICTE
internship portal, Eduskills, played a pivotal role in connecting aspiring
interns with companies efficiently.

The Paloalto network certification, centred on network security fundamentals


and advancements in cybersecurity concepts, provided a structured
curriculum. This virtual internship offered hands-on experience, allowing the
application of theoretical cybersecurity knowledge in a practical setting. The
AICTE portal streamlined the internship process through automated matching
systems and validation, ensuring a seamless connection between companies
and interns.

This virtual internship was 10 weeks long in duration and started from 10 th July
2024 to go on till September 2024. The faculty in-charge of this program was Dr.
Praveen kumar Sir. In summary, the virtual internship journey into cybersecurity
was transformative, demonstrating the effectiveness of the AICTE internship
portal in bridging the gap between academia and practical application. The focus
on the Paltalto network certification enriched the experience, offering valuable
insights into the complexities of theprocess mining landscape.

7
Chapter 3
OBJECTIVES

The primary objective of the Cybersecurity Virtual Internship supported by


Palo Alto Networks was to provide participants with a practical understanding of
cybersecurity concepts and techniques while equipping them with the skills
required to address modern-day cyber threats effectively.
Key objectives of the internship included:
1. Skill Development: To enable participants to develop hands-on expertise in
cybersecurity tools, technologies, and methodologies.
2. Understanding Threat Landscapes: To familiarize participants with
various types of cyber threats, vulnerabilities, and attack vectors.
3. Application of Knowledge: To provide opportunities to apply theoretical
cybersecurity concepts to real-world scenarios through simulations and labs.
4. Incident Response and Management: To train participants in identifying,
responding to, and mitigating security incidents while minimizing potential
damage.
5. Promoting Ethical Practices: To emphasize the importance of ethical
hacking, compliance, and adherence to legal frameworks in cybersecurity
operations.
6. Awareness of Advanced Technologies: To introduce participants to
emerging trends in cybersecurity, including the use of AI, machine learning,
and automation in threat detection and prevention.
7. Industry Readiness: To prepare participants for professional roles in
cybersecurity by bridging the gap between academic learning and industry
expectations.
8
Chapter 4
COURSES UNDERTAKEN

In the virtual internship focused on Cybersecurity and the Paloalto


certification, a series of comprehensive courses were undertaken to provide a
nuanced understanding of network security, cybersecurity fundamentals,
cloud security, security operations, and modern network security essentials.
Each course aimed to equip the intern with practical skills and theoretical
knowledge essential for navigating the intricacies of the cybersecurity
landscape.

1. Network Security Fundamentals:

Objective: Lay the groundwork by covering essential network security


principles.
Topics Covered: Connected devices, routing, area networks, IP addressing,
subnetting, TCP/IP and OSI models, packet lifecycle, encapsulation.
Duration and Rating: 1.8 hours with a rating of 4.0.

2. Cybersecurity Fundamentals:

Objective: Provide a comprehensive understanding of the modern


cybersecurity landscape.
Topics Covered: SaaS challenges, security regulations, standards, threats,
attacker profiles, cyberattack lifecycle steps, malware, ransomware.

9
Duration and Rating: 1.8 hours with a rating of 4.4.

3. Cloud Security Fundamentals:

Objective: Explore core technologies used in cloud computing.


Topics Covered: Virtual machines, containers, development operations teams,
CI/CD pipeline, cloud computing models, shared responsibility, best
practices.
Duration and Rating: 1.4 hours with a rating of 4.3.

4. Security Operations Fundamentals:

Objective: Dive into the daily life of a SecOps analyst and understand security
operations.
Topics Covered: The six elements of security operations, SOAR technology,
endpoint protection with the Cortex XDR agent, behavioral analysis.
Duration and Rating: 1.3 hours with a rating of 4.4.

5. SASE Fundamentals:

Objective: Cover essentials of modern network security, including SASE,


ZTNA, and SD-WAN.
Topics Covered: SASE solutions, Zero Trust Network Access (ZTNA),
software-defined wide area network (SD-WAN).
Duration and Rating: Content details not specified.

Each course provided a unique perspective and skill set, collectively


contributing to a holistic understanding of cybersecurity concepts and

10
practices. The emphasis on both theoretical knowledge and practical
applications, coupled with the reputable PCCET certification focus, ensured
that the intern was well-prepared to tackle real-world cybersecurity challenges
and contribute effectively to the field. The diverse range of topics covered also
showcased the comprehensive nature of the internship, preparing the intern for
a multifaceted career in the cybersecurity domain.

11
Chapter 5
TOOLS & TECHNOLOGIES

The cybersecurity internship, centered on the Palo Alto Networks PCCET


certification, involved the utilization of a diverse set of tools and technologies
to enhance practical skills and theoretical understanding. Each module
incorporated specific tools relevant to its focus, contributing to a
comprehensive and hands-on learning experience.

1. Network Security Fundamentals:

Tools: Firewalls, Intrusion Detection Systems (IDS), Routing Protocols.


Technologies: TCP/IP and OSI Models, IP Addressing, Subnetting.

2. Cybersecurity Fundamentals:

Tools: Threat Intelligence Platforms, SIEM Systems, Malware Analysis


Tools.
Technologies: SaaS Security, Cyberattack Lifecycle Steps.

3. Cloud Security Fundamentals:

Tools: Virtualization Platforms, Containerization Tools, CI/CD Pipeline

12
Tools.
Technologies: Cloud Computing Models, Shared Responsibility Model.

4. Security Operations Fundamentals:

Tools: SOAR Platforms, Cortex XDR Agent.


Technologies: Endpoint Protection, Behavioral Analysis.

5. SASE Fundamentals:

Tools: SASE Solutions, Zero Trust Network Access (ZTNA) Platforms, SD-
WAN Technologies.
Technologies: Device, User, Application Security.

These tools and technologies were strategically chosen to align with the
specific focus of each module, providing interns with practical exposure to
industry-relevant instruments. The integration of hands-on experiences with
these tools not only enhanced technical proficiency but also prepared interns
for the dynamic and evolving challenges in the cybersecurity landscape. This
amalgamation of theoretical knowledge and practical application equipped
interns with a well-rounded skill set, positioning them as adept contributors to
the field of cybersecurity.

13
Chapter 6
LEARNINGS

The Cybersecurity Virtual Internship provided a comprehensive learning


experience, blending theoretical knowledge with practical applications. The
program offered valuable insights into the field of cybersecurity, enabling me to
develop skills and competencies that are essential for tackling modern cyber
challenges.
Key Learnings from the Internship:

1. Foundational Understanding of Cybersecurity


• Gained an in-depth understanding of cybersecurity concepts, including
confidentiality, integrity, and availability (CIA triad).
• Learned the importance of proactive and layered defense mechanisms to
secure digital assets.

2. Threat Detection and Analysis


• Developed the ability to identify various types of cyber threats such as
malware, phishing, ransomware, and Denial of Service (DoS) attacks.
• Learned to analyze threat patterns and recognize vulnerabilities in systems
and networks.

3. Hands-On Experience with Security Tools


• Practiced using industry-standard tools such as firewalls, intrusion
detection/prevention systems (IDS/IPS), and vulnerability scanners.
• Worked with Palo Alto’s Next-Generation Firewall and Prisma Cloud to
secure networks and applications.

4. Incident Response and Recovery


• Acquired skills in responding to simulated cybersecurity incidents,
including containment, eradication, and recovery.
• Learned to document incidents and create detailed reports for future
prevention and improvement.

5. Network Security
• Understood the fundamentals of securing networks by configuring firewalls,
monitoring traffic, and implementing access control.
14
• Explored best practices for setting up secure communication channels and
managing data flow.

6. Role of AI and Machine Learning in Cybersecurity


• Gained exposure to the use of artificial intelligence and machine learning
for predictive analysis and automated threat detection.
• Learned about emerging trends and their impact on improving cybersecurity
strategies.

7. Soft Skills Development


• Improved analytical thinking and problem-solving skills through
challenging case studies.
• Enhanced collaboration and communication skills by participating in group
discussions and presenting findings.

8. Ethical and Legal Practices


• Gained awareness of ethical hacking principles and the importance of
compliance with cybersecurity laws and regulations.
• Understood the significance of maintaining privacy and protecting sensitive
data.

Conclusion:
The internship provided a well-rounded learning experience, helping me to not
only understand cybersecurity challenges but also apply practical solutions
effectively. It has prepared me to address real-world cybersecurity issues with
confidence and precision.

15
Chapter 7
APPLICATIONS

The comprehensive learnings from the cybersecurity internship, with a


dedicated focus on the Palo Alto Networks PCCET certification, hold
significant applications across various facets of the cybersecurity landscape:

1. Practical Implementation in Real-world Scenarios:

Application: The hands-on experience gained in network security, cloud


security, and security operations provides a robust foundation for applying
theoretical knowledge to real-world cybersecurity scenarios. Interns are now
equipped to navigate complex security challenges with practical insights.

2. Contribution to Cloud Security:

Application: Understanding cloud computing models, virtualization, and


CI/CD pipelines empowers interns to contribute to the secure deployment and
management of cloud infrastructures, a critical skill in today's cloud-centric
computing environments.

3. Proactive Threat Identification and Prevention:

Application: Proficiency in SOAR technology, behavioral analysis, and the


use of the Cortex XDR Agent positions interns to proactively identify and
respond to cybersecurity threats, contributing to a robust security posture.

4. Modern Network Security Implementation:

Application: The knowledge gained in SASE, ZTNA, and SD-WAN


technologies enables interns to implement modern network security essentials,
ensuring secure access at the device, user, and application levels.

5. Seamless Integration into the Cybersecurity Workforce:

Application: Networking opportunities and validation of skills provided by the

16
AICTE internship portal enhance interns' prospects for seamless integration
into the professional cybersecurity workforce.

Conclusion:

In conclusion, the cybersecurity internship, centered on the Palo Alto


Networks PCCET certification, has proven to be transformative. The bridging
of theoretical knowledge with practical application across diverse
cybersecurity domains has not only expanded the interns' technical proficiency
but has also positioned them as well-rounded professionals ready to contribute
meaningfully to the cybersecurity landscape.

The emphasis on cloud security, security operations, and modern network


security essentials aligns with the current trends and demands in the
cybersecurity industry. The applications of these learnings extend beyond the
theoretical realm, empowering interns to make tangible contributions in
securing digital infrastructures and responding effectively to evolving cyber
threats.

As the interns move forward, they carry with them not just a certification but
a wealth of experiential knowledge that transcends traditional academic
boundaries. This cybersecurity internship, with its holistic approach, has not
only prepared interns for the challenges of the cybersecurity workforce but has
also instilled in them a sense of responsibility, commitment, and ownership in
the dynamic world of cybersecurity.

17

You might also like