Cybersecurity Program 2024 - Project Orientation
Cybersecurity Program 2024 - Project Orientation
Orientation
Rules and Regulations
1)Three students form a group for a project.
2)Each student in the project group should work on their
project and divide their responsibilities equally.
3)Each team should discuss among themselves and come up
with their Project title from Common Pool.
4)If any of the team members are unable to choose or select
titles, we will assist and advise them in finding one that
matches their interests.
5)Students can develop the project themselves using any
programming language.
Rules and Regulations
6)Students can utilize any relevant cybersecurity tools to complete
their project.
7)The project must be original; the student may not use the same
input test cases/use cases as other students.
8)The student must attend two project review to attend the viva.
9)The trainer will provide the report format for project
submissions.
10)After submitting the project report, students must attend a viva-
voce.
Rules and Regulations
The viva panel consists of the following members;
a)Cybersecurity Expert from industry.
b)Trainers.
c)College Team.
d)CareerTiQ Team.
Project Review 1
● Project Synopsis
○ Title of the project
○ Team Name
○ Team Members
○ Aim and Objectives
○ Methodology
➔ Tools to be used.
➔ A valid Github repository [ for each member of the team]
Project Review 2
● Title of the Project
● Team Name
● Team Members
● Status of the project (What are all completed. What else to be
completed)
● Any challenges? (Explain in detail)
● Updations in Github repository
● Percentage of overall completion of the project
● GitHub links
Cybersecurity Project Phases
1.Planning & Scoping: Define goals, objectives, and boundaries for the
assessment.
2.Information Gathering: Collect relevant data about the target system
or network.
3.Vulnerability Assessment: Identify potential vulnerabilities through
scanning and analysis.
4.Penetration Testing: Simulate cyber-attacks to exploit identified
vulnerabilities.
5.Reporting & Remediation: Document findings and recommend fixes.
6.Rescan and Certificate Issuance: Verify remediation efforts and issue
a certificate.
Roles in Cybersecurity Project
1.Project Manager: Oversees the project, ensuring it meets its objectives
within the constraints of budget, time, and scope.
2.Cybersecurity Analyst: Identifies and analyzes potential threats and
vulnerabilities.
3.Security Architect: Designs a secure system architecture.
Network Engineer: Implements and maintains network security
measures.
4.Software Developer/Engineer: Writes secure code and develops
security software solutions.
5.Penetration Tester: Simulates cyber attacks to test the system’s
defenses.
6.Compliance Officer: Ensures the project adheres to relevant laws,
AGILE Process