0% found this document useful (0 votes)
6 views12 pages

Presentation1 1

The document outlines a virtual internship program offered by Palo Alto Networks, focusing on hands-on training in cybersecurity over a ten-week period. It covers various modules including network security, cybersecurity fundamentals, cloud security, and security operations, equipping interns with essential skills and knowledge. The internship aims to prepare participants for the evolving challenges in the cybersecurity landscape while fostering professional development.

Uploaded by

poojithaanusha2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views12 pages

Presentation1 1

The document outlines a virtual internship program offered by Palo Alto Networks, focusing on hands-on training in cybersecurity over a ten-week period. It covers various modules including network security, cybersecurity fundamentals, cloud security, and security operations, equipping interns with essential skills and knowledge. The internship aims to prepare participants for the evolving challenges in the cybersecurity landscape while fostering professional development.

Uploaded by

poojithaanusha2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Under The Esteemed Guidance of, By

Subramanyeswara Rao Ramya Chappidi


216W1A0557
CONTENTS
• INTRODUCTION OF INTERNSHIP
• OVERVIEW OF THE ITERNSHIP
• MODULES
• SKILLS AND KNOWLEDGE GAINED
• CONCLUSION
INTRODUCTION OF
INTERNSHIP
The Palo Alto Cyber security Virtual Internship
provided hands-on training in threat detection,
network security, and firewall management using
Palo Alto Networks technologies.
Cybersecurity is a field that continuously evolves to
counteract the ever-present and growing threat of
cyberattacks. To foster the development of the next
generation of cybersecurity professionals,
companies like Palo Alto Networks offer virtual
internship programs. These initiatives provide
valuable opportunities for aspiring individuals to
gain hands-on experience and insights into the
world of cybersecurity.
OVERVIEW OF THE
INTERNSHIP
The Palo Alto Cybersecurity Virtual Internship
provides an immersive experience over a ten-week
period. Designed for self-placed learning, it utilizes
the Palo Alto Beacon platform to facilitate skill
development.
Conducted virtually, the internship spans 10 weeks,
utilizing self-placed learning modules on the Palo
Alto Beacon platform. This format encourages
flexibility while allowing in-depth exploration of
cybersecurity topics.
MODULE
1 etwork Security
N
Fundamentals
This course network security fundamentals,
includes connected devices, routing, area
networks, and protocols. They also introduce IP
addressing, subnetting, TCP/IP and OSI models,
packet lifecycle, and encapsulation. The courses
teach endpoint security prevention for threats like
malware, viruses, ransomware, and phishing
attacks. They delve into network security
fundamentals for home networks and critical
infrastructure, and present Palo Alto Networks
network-security solutions.
MODULE 2
Cybersecurity
Fundamentals
This course offers a comprehensive understanding of
the modern cybersecurity landscape and today’s
cyberthreats. You’ll learn about current attack
methods, defense strategies, public Wi-Fi risks, and
protection measures. You will also learn about modern
security models, focusing on perimeter-based and
Zero Trust models.
The course concludes with an overview of Palo Alto
Networks’ prevention architecture and the key
capabilities required for preventing successful
cyberattacks.
MODULE 3
Cloud Security
Fundamentals
This course cover the core technologies used in cloud
computing, such as virtual machines and containers,
development operations teams, and the CI/CD pipeline.
They provide an overview of cloud computing models,
shared responsibility, best practices, and hybrid cloud
computing. The courses discuss the models and
processes organizations use for cloud technologies,
common software development models, and the
supporting teams. They explain how cloud-native
application protection platforms (CNAPP) offer
comprehensive protection with integrated security and
compliance capabilities for cloud-native applications in
MODULE 4
Security Operations
Fundamentals
This course cover the daily life of a SecOps analyst, the six
elements of security operations, and how SOAR technology
simplifies cybersecurity response and prevention. They
introduce endpoint protection with the Cortex XDR agent,
which combines behavioral protection and AI-based
analysis to stop advanced attacks. The courses provide a
high-level overview of Cortex XSOAR Threat Intelligence
Management (TIM), a security solution for automating and
streamlining threat intelligence processes, including native
threat intelligence, data sources, incident enrichment, and
threat intel reports. Finally, the courses introduce the
products in the Palo Alto Networks Cortex platform: Cortex
XSOAR, Cortex XDR, Cortex XSOAR TIM, and Cortex XSIAM.
SKILLS AND KNOWLEDGE
GAINEDProficiency: Improved skills in using cybersecurity
Technical
tools and technologies, such as firewalls, intrusion detection
systems (IDS), and security information and event
management systems.
Problem-Solving Abilities: Enhanced ability to analyze
complex security problems and develop effective solutions.
Gained experience in troubleshooting and debugging security
issues.
Industry Insights: Acquired a deeper understanding of
current cybersecurity threats, attack vectors, and defense
strategies. Gained insights into the latest trends and
advancements in the field.
Professional Development: Developed soft skills including
communication, teamwork, and project management.
CONCLUSION
In conclusion, this internship has been a transformative
journey, equipping me within valuable knowledge and
practical skills in the dynamic realm of cybersecurity.
The exploration of fundamental concepts across key
modules, namely Fundamentals of Cybersecurity,
Fundamentals of Cloud Security, and Fundamentals of
Network Security, has been instrumental in shaping my
understanding of the intricate layers that safeguard
digital landscapes.
The module on Fundamentals of Cybersecurity laid the
groundwork for comprehending the overarching
principles that underpin secure computing
environments.
I gained a holistic view of how organizations fortify
THANK
YOU

You might also like