The document outlines a virtual internship program offered by Palo Alto Networks, focusing on hands-on training in cybersecurity over a ten-week period. It covers various modules including network security, cybersecurity fundamentals, cloud security, and security operations, equipping interns with essential skills and knowledge. The internship aims to prepare participants for the evolving challenges in the cybersecurity landscape while fostering professional development.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
6 views12 pages
Presentation1 1
The document outlines a virtual internship program offered by Palo Alto Networks, focusing on hands-on training in cybersecurity over a ten-week period. It covers various modules including network security, cybersecurity fundamentals, cloud security, and security operations, equipping interns with essential skills and knowledge. The internship aims to prepare participants for the evolving challenges in the cybersecurity landscape while fostering professional development.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12
Under The Esteemed Guidance of, By
Subramanyeswara Rao Ramya Chappidi
216W1A0557 CONTENTS • INTRODUCTION OF INTERNSHIP • OVERVIEW OF THE ITERNSHIP • MODULES • SKILLS AND KNOWLEDGE GAINED • CONCLUSION INTRODUCTION OF INTERNSHIP The Palo Alto Cyber security Virtual Internship provided hands-on training in threat detection, network security, and firewall management using Palo Alto Networks technologies. Cybersecurity is a field that continuously evolves to counteract the ever-present and growing threat of cyberattacks. To foster the development of the next generation of cybersecurity professionals, companies like Palo Alto Networks offer virtual internship programs. These initiatives provide valuable opportunities for aspiring individuals to gain hands-on experience and insights into the world of cybersecurity. OVERVIEW OF THE INTERNSHIP The Palo Alto Cybersecurity Virtual Internship provides an immersive experience over a ten-week period. Designed for self-placed learning, it utilizes the Palo Alto Beacon platform to facilitate skill development. Conducted virtually, the internship spans 10 weeks, utilizing self-placed learning modules on the Palo Alto Beacon platform. This format encourages flexibility while allowing in-depth exploration of cybersecurity topics. MODULE 1 etwork Security N Fundamentals This course network security fundamentals, includes connected devices, routing, area networks, and protocols. They also introduce IP addressing, subnetting, TCP/IP and OSI models, packet lifecycle, and encapsulation. The courses teach endpoint security prevention for threats like malware, viruses, ransomware, and phishing attacks. They delve into network security fundamentals for home networks and critical infrastructure, and present Palo Alto Networks network-security solutions. MODULE 2 Cybersecurity Fundamentals This course offers a comprehensive understanding of the modern cybersecurity landscape and today’s cyberthreats. You’ll learn about current attack methods, defense strategies, public Wi-Fi risks, and protection measures. You will also learn about modern security models, focusing on perimeter-based and Zero Trust models. The course concludes with an overview of Palo Alto Networks’ prevention architecture and the key capabilities required for preventing successful cyberattacks. MODULE 3 Cloud Security Fundamentals This course cover the core technologies used in cloud computing, such as virtual machines and containers, development operations teams, and the CI/CD pipeline. They provide an overview of cloud computing models, shared responsibility, best practices, and hybrid cloud computing. The courses discuss the models and processes organizations use for cloud technologies, common software development models, and the supporting teams. They explain how cloud-native application protection platforms (CNAPP) offer comprehensive protection with integrated security and compliance capabilities for cloud-native applications in MODULE 4 Security Operations Fundamentals This course cover the daily life of a SecOps analyst, the six elements of security operations, and how SOAR technology simplifies cybersecurity response and prevention. They introduce endpoint protection with the Cortex XDR agent, which combines behavioral protection and AI-based analysis to stop advanced attacks. The courses provide a high-level overview of Cortex XSOAR Threat Intelligence Management (TIM), a security solution for automating and streamlining threat intelligence processes, including native threat intelligence, data sources, incident enrichment, and threat intel reports. Finally, the courses introduce the products in the Palo Alto Networks Cortex platform: Cortex XSOAR, Cortex XDR, Cortex XSOAR TIM, and Cortex XSIAM. SKILLS AND KNOWLEDGE GAINEDProficiency: Improved skills in using cybersecurity Technical tools and technologies, such as firewalls, intrusion detection systems (IDS), and security information and event management systems. Problem-Solving Abilities: Enhanced ability to analyze complex security problems and develop effective solutions. Gained experience in troubleshooting and debugging security issues. Industry Insights: Acquired a deeper understanding of current cybersecurity threats, attack vectors, and defense strategies. Gained insights into the latest trends and advancements in the field. Professional Development: Developed soft skills including communication, teamwork, and project management. CONCLUSION In conclusion, this internship has been a transformative journey, equipping me within valuable knowledge and practical skills in the dynamic realm of cybersecurity. The exploration of fundamental concepts across key modules, namely Fundamentals of Cybersecurity, Fundamentals of Cloud Security, and Fundamentals of Network Security, has been instrumental in shaping my understanding of the intricate layers that safeguard digital landscapes. The module on Fundamentals of Cybersecurity laid the groundwork for comprehending the overarching principles that underpin secure computing environments. I gained a holistic view of how organizations fortify THANK YOU
Secure Edge Computing for IoT: Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies to Innovate Solutions for Edge Computing in IoT (English Edition)
Secure Edge Computing for IoT: Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies to Innovate Solutions for Edge Computing in IoT (English Edition)