A TECHNICAL REPORT
ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) TRAINING
PROGRAMME
HELD AT
BLUESCRIPTS IT INSTITUTE, SECOND FLOOR, OPPOSITE TEACHERS HOUSE,
OLUYOLE ESTATE, IBADAN OYO STATE.
BY
JOHNSON JOEL OLAOLUWA
MATRIC NO: CSC/20/053
SUBMITTED
TO
THE DEPARTMENT OF COMPUTER SCIENCES, OLUSEGUN AGAGU
UNIVERSITY OF SCIENCE AND TECHNOLOGY, OKITIPUPA, ONDO STATE
IN PARTIAL FULFILMENT OF THE REQUIRMENTS FOR THE AWARD OF
BACHELOR OF SCIENCE (B.SC) IN COMPUTER SCIENCE.
NOVEMBER, 2024
DECLARATION
I, JOHNSON JOEL OLAOLUWA hereby declare that this report was written by me and is a
record of all activity carried out during the SIWES period. All sources of information are clearly
acknowledged by means of references.
Signature of Student ………………...
Date ………………………………...
i
CERTIFICATION
This is to certify that the activities reported in this SIWES report were carried out by JOHNSON
JOEL OLAOLUWA and submitted to the Department of Computer Sciences, Computer
Science, Olusegun Agagu University of Science and Technology, Okitipupa, Ondo State, having
met the standards as required by the institution and approved as to contents and style:
Dr. Orogbemi ----------------------------------
SIWES Supervisor signature/Date
Engr. Modupe Agagu ----------------------------------
Departmental SIWES Coordinator signature/Date
Prof. A.O. Adetunmbi ----------------------------------
H.O.D Computer Science signature/Date
ii
DEDICATION
I am grateful to God Almighty for His generosity, protection, guidance, and good health, as well
as for His ongoing supervision of me during the period of industrial training. He was on my side
all along.
This technical report is dedicated to my parents and siblings, who have consistently supported
and motivated me throughout my academic and professional pursuits. I couldn't have finished
this industrial training without their loving assistance.
iii
TABLE OF CONTENT
DECLARATION................................................................................................................................ 2
CERTIFICATION.............................................................................................................................. 3
DEDICATION...................................................................................................................................4
ACKNOWLEDGEMENT....................................................................................................................6
2.2 VISION.............................................................................................................................12
2.3 ORGANOGRAM OF THE INSTITUTE.....................................................................................12
CHAPTER THREE...........................................................................................................................13
3.0 EXPERIENCE GAINED/KNOWLEDGE ACQUIRED..................................................................13
3.1 INTRODUCTION TO CYBERSECURITY...............................................................................13
3.1.2 FUNDAMENTALS OF CYBER SECURITY.............................................................................13
3.1.3 KEY SECURITY TERMS USED IN CYBERSECURITY..............................................................13
3.1.4 ELEMENTS OF SECURITY..............................................................................................14
3.1.5 METHODS OF IDENTITY THEFT.....................................................................................14
3.1.6 BASIC SECURITY GUIDELINES.......................................................................................14
3.2 NETWORKING.....................................................................................................................15
3.2.1 KEY NETWORK COMPONENTS.........................................................................................15
3.2.2 TYPES OF NETWORKS......................................................................................................16
iv
3.2.3 NETWORK MEDIA............................................................................................................17
3.3 CONVERSION OF PETROL ENGINES TO COMPRESSED NATURAL GAS................................18
3.3.1 TOOLS FOR CNG CONVERSION........................................................................................18
3.3.2 CONVERSION PROCESS OF PETROL TO COMPRESSED NATURAL GAS (CNG)...................20
3.3.3 BENEFITS OF CONVERTING TO CNG................................................................................20
3.3.4 CHALLENGES OF CNG CONVERSION................................................................................20
CHAPTER FOUR............................................................................................................................ 22
4.0 CHALLENGES ENCOUNTERED.............................................................................................22
4.1 CONCLUSION......................................................................................................................22
REFERENCES.................................................................................................................................23
v
ACKNOWLEDGEMENT
First and foremost, I want express my gratitude to God Almighty for the successful completion of
my Industrial training, for seeing me through those months and also making it a success.
I would like to sincerely appreciate my industrious supervisor Mr. Oyinloye Moses Adedeji for his
valuable advice, guidance, and encouragement during the course of this work.
I would like to sincerely appreciate my visiting supervisor, for her warm and kind relation and
attitude during her visitation for supervision.
I want to express my heartfelt appreciation to my SIWES Supervisor, Dr. Orogbemi for
dedicating her time to meticulously review and provide thoughtful corrections to my report.
My profound gratitude goes to the Head of Department, Dr. Mrs. Gbadamosi and all the staff
(academic and non-academic) of the Department of Computer Sciences for your restless effort in
ensuring you give your best in teaching and tutoring.
And lastly, I must also express my heartfelt gratitude to my parent, Mr. and Mrs. Johnson and my
siblings for their endless efforts in all ramifications by ensuring I become very hardworking in
the society and for their incomparable support, care, assistance and blessing during the course of
this work. Thank you and God bless you all.
vi
ABSTRACT
This report provides a comprehensive overview of my seven weeks industrial training experience
at Bluescripts Infotech Institute, located on the 2nd floor opposite Teacher's House, Oluyole
Estate, Ibadan. The training spanned from April 29, 2024, to June 14, 2024, and focused
primarily on cybersecurity and Python for data science.
This report further expatiates on the aspects of cybersecurity, networking, Ethical Hacking and
Python for data science. The first chapter provides a comprehensive introduction to cyber
security, covering the fundamental concepts and principles of this critical field. It defines key
security terms and elements, such as confidentiality, integrity, and availability, and discusses the
various methods of identity theft, including phishing, social engineering, and malware attacks.
The chapter also provides basic security guidelines to follow, including password management,
software updates, and network security best practices.
vii
viii
CHAPTER ONE
1.0 INTRODUCTION TO SIWES
The Student Industrial Work Experience Scheme (SIWES) is an initiative in Nigeria designed to
bridge the gap between theoretical knowledge acquired in academic institutions and practical,
real-world experience. Established by the Industrial Training Fund (ITF) in 1973, SIWES
provides students in engineering, sciences, technology, and various applied fields with
opportunities to gain hands-on experience in relevant industries before they graduate.
SIWES is a mandatory program for undergraduates in Nigerian higher institutions, especia7lly
those studying science and technology-related courses, and typically lasts 3 to 6 months. It is a
collaborative effort between the Federal Government of Nigeria, the Industrial Training Fund
(ITF), universities, and the industries involved, all working together to ensure students acquire
practical skills necessary to excel in their chosen professions.
1.1 OBJECTIVES OF SIWES
1. Skill Acquisition: SIWES aims to help students acquire practical skills and training that
will prepare them for their future careers.
2. Linking Theory with Practice: It provides students with the opportunity to apply
theoretical knowledge gained in the classroom to real-world situations.
3. Industrial Exposure: Students gain exposure to industry-specific tools, technologies, and
methodologies, allowing them to become familiar with professional work environments.
4. Enhanced Employability: By equipping students with relevant skills and experience,
SIWES helps to increase their employability and job readiness post-graduation.
1
5. Encouragement of Self-Confidence and Independence: Through SIWES, students
develop independence, teamwork, and problem-solving skills, which are essential in any
professional setting
2
CHAPTER TWO
2.0 DESCRIPTION OF BLUESCRIPTS IT INSTITUTE
Bluescripts IT Institute is renowned for its expertise in IT training, offering a wide range of
courses designed to equip students with practical and relevant skills. The institute is located on
the 2nd floor opposite Teacher's House, Oluyole Estate, Ibadan.
Bluescripts IT Institute is a leading information technology training institution focused on
providing practical and professional IT education. Established with the goal of addressing the
growing demand for tech skills, Bluescripts offers a variety of courses designed to equip students
with the necessary expertise to thrive in the digital economy.
The institute provides comprehensive training in areas such as web development, software
engineering, digital marketing, cybersecurity, and data analysis. Bluescripts prides itself on its
hands-on learning approach, allowing students to gain real-world experience through projects,
internships, and practical sessions.
Over the years, the institute has grown into a reputable center for IT education, recognized for its
strong emphasis on quality instruction, industry-standard curriculum, and a commitment to
student success. Its graduates are well-prepared to enter various sectors of the tech industry, both
locally and internationally. Through partnerships with organizations and certification bodies,
Bluescripts ensures that its students are competitive in the global job market
2.1 MISSION
The mission of Bluescripts IT Institute is to provide high-quality, industry-relevant education in
information technology, equipping students with the practical skills and knowledge necessary to
3
excel in the ever-evolving tech industry. The institute aims to foster innovation, critical thinking,
and a problem-solving mindset, preparing students to meet global IT demands and contribute
effectively to technological advancements. Bluescripts IT Institute also seeks to bridge the gap
between theoretical learning and real-world application by offering hands-on training,
professional certifications, and career development opportunities in fields such as software
development, cybersecurity, data science, and IT infrastructure.
2.2 VISION
To become a leading institution in providing cutting-edge Information Technology education and
training, equipping students with the skills and knowledge to excel in the global digital economy,
and fostering innovation, creativity, and technological advancement.
2.3 ORGANOGRAM OF THE INSTITUTE
Fig 1. Organogram of Bluescripts Institute
4
CHAPTER THREE
3.0 EXPERIENCE GAINED/KNOWLEDGE ACQUIRED
3.1 INTRODUCTION TO CYBERSECURITY
The importance of cybersecurity was highlighted as critical in today’s digital age for
safeguarding information and systems against cyber threats. Due to the increasing frequency and
sophistication of cyber-attacks, robust security measures are essential. The report covered
cybersecurity basics, emphasizing key terms, security elements, identity theft methods, and
fundamental security guidelines.
3.1.2 FUNDAMENTALS OF CYBER SECURITY
Cybersecurity was described as a combination of practices, technologies, and processes designed
to protect networks, devices, programs, and data from attack, damage, or unauthorized access. It
aims to uphold the integrity, confidentiality, and availability of information.
3.1.3 KEY SECURITY TERMS USED IN CYBERSECURITY
Several terms were outlined as fundamental to cybersecurity:
1. Attack: An attempt to gain unauthorized access to system services, resources, or
information, or to compromise system integrity.
2. Threat: A potential source of harm or unwanted impact to a system or organization.
3. Exploit: Software or data that leverages a system vulnerability to cause unintended
behavior.
4. Vulnerability: A system weakness exploitable by threats for unauthorized access or harm.
5
5. Data Theft: The unauthorized copying or transfer of data from a computer or server.
3.1.4 ELEMENTS OF SECURITY
The report discussed the critical elements needed for effective cybersecurity, including:
1. Confidentiality: Ensuring that only authorized users can access information.
2. Integrity: Protecting information accuracy and processing methods.
3. Availability: Ensuring authorized users have access to information and resources when
needed.
4. Authenticity: Verifying the identity of users, devices, or entities within a system.
5. Non-repudiation: Guaranteeing that a party cannot deny their involvement in a
communication or document.
3.1.5 METHODS OF IDENTITY THEFT
Various identity theft methods commonly used by cybercriminals were explained:
Phishing: Using deceptive emails or websites to steal personal information by pretending
to be trustworthy.
Social Engineering: Manipulating individuals into providing confidential information.
Hacking: Unauthorized access to data within a system.
Personal Data Theft: Illegally accessing sensitive information like social security
numbers or credit card details.
3.1.6 BASIC SECURITY GUIDELINES
Several essential security practices were recommended for both personal and organizational data
protection:
6
1. Use Strong Passwords: Creating complex passwords and using unique ones for different
accounts.
2. Install Antivirus Software: Utilizing reputable antivirus programs to detect and prevent
malware.
3. Enable Encryption: Protecting data during storage and transmission.
4. Regular Backups: Backing up data regularly to guard against potential data loss.
5. Use Firewalls/IDS: Employing firewalls and intrusion detection systems to monitor
network traffic.
6. Exercise Caution with Email Attachments: Avoiding attachments from unknown senders
to prevent malware infection.
7. Update Software Regularly: Keeping software up to date with security patches.
8. Limit Access to Data: Applying the principle of least privilege, providing access only to
those who need it for their roles
3.2 NETWORKING
The basics of networking were explained as the process involving the exchange of information and ideas
between devices, which enables communication and resource sharing. It is essential for connecting
computers, mobile devices, printers, and other peripherals to communicate and share data seamlessly.
3.2.1 KEY NETWORK COMPONENTS
Several components essential to a network were outlined, including end devices like computers, printers,
and mobile phones, which act as sources or destinations for network data. Intermediate devices such as
routers, switches, and hubs help route and manage data traffic between these end devices. Additionally,
7
network media, including cables like coaxial, twisted-pair, fiber optic, and wireless transmission methods
such as Wi-Fi, serve as physical pathways for data transmission.
Fig 2. Basic Network Components
3.2.2 TYPES OF NETWORKS
The primary types of networks were also discussed, each serving specific purposes:
Local Area Network (LAN): Covers a small geographic area like a home or office, with
advantages such as high data transfer rates and low latency.
Personal Area Network (PAN): Has a short range, suitable for connecting personal devices like
smartphones or laptops, usually via Bluetooth or USB, offering convenience for individual data
management.
Metropolitan Area Network (MAN): Spans larger areas like cities, connecting multiple LANs
within a city, which benefits organizations with several branches by enabling seamless data
sharing.
Wide Area Network (WAN): Covers vast areas, including entire countries or continents, by
connecting multiple LANs and MANs over long distances, often using telecommunication lines
or satellite links, which is essential for global communication.
8
3.2.3 NETWORK MEDIA
Network media refers to the communication channels connecting nodes on a network, either wired
(physically) or wireless. Common types of network media include:
Coaxial Cable: Known for its durability and long-distance signal transmission with low interference,
commonly used in satellite communications, though it can be bulky.
Fig 3. Coaxial Cable
Twisted Pair Cables: Widely used in Ethernet and telephone systems, they are affordable and reduce
electromagnetic interference but are susceptible to interference without proper shielding.
Fig 4. Twisted pair cables
Fiber Optic Cable: The most expensive wired medium, it offers high bandwidth and immunity to
electromagnetic interference, ideal for high-speed, long-distance transmissions but requires careful
handling.
9
Fig 5. Fiber optic cable
3.3 CONVERSION OF PETROL ENGINES TO COMPRESSED NATURAL GAS
The conversion of petrol engines to Compressed Natural Gas (CNG) was described as a viable
option for reducing fuel expenses and emissions. It was mentioned that converting a petrol car to
a CNG vehicle allows it to operate on both petrol and CNG, known as bi-fuel capability.
3.3.1 TOOLS FOR CNG CONVERSION
The tools required for this conversion include a CNG conversion kit with key components such
as a CNG cylinder, which stores compressed natural gas at high pressure; a fuel injection system
to regulate CNG flow to the engine; and a CNG reducer/regulator to lower the high pressure
from the cylinder to a manageable level for the engine. Additionally, the CNG ECU (Electronic
Control Unit) was described as controlling the fuel switching between petrol and CNG, while an
injector rail delivers gas to the engine cylinders, a pressure gauge monitors gas levels in the
cylinder, and a fuel changeover switch allows the driver to switch between petrol and CNG
modes.
10
Fig 6. CNG Cylinder
Fig 7. Fuel Injector
Fig 8. Electric control unit
11
3.3.2 CONVERSION PROCESS OF PETROL TO COMPRESSED NATURAL GAS
(CNG)
In the conversion process, a vehicle assessment is first conducted by a mechanic to determine if
the vehicle is suitable for CNG conversion, evaluating the engine, fuel system, and overall
condition. Next, the CNG kit is installed by a trained mechanic, who mounts the CNG cylinder
in the trunk, installs the reducer/regulator and fuel injector near the engine, integrates the CNG
ECU with the existing electronic system, and connects the CNG pipes, injectors, and electrical
systems to the engine.
After installation, the engine is tuned to ensure optimal performance with CNG, allowing it to
run smoothly on both fuels without affecting efficiency or power. Finally, the vehicle undergoes
testing and calibration to verify that the CNG system functions properly. This testing includes
checking for leaks and performance issues and ensuring the seamless operation of the fuel switch
between petrol and CNG.
3.3.3 BENEFITS OF CONVERTING TO CNG
The benefits of CNG conversion include:
Lower fuel costs, as CNG is generally more affordable than petrol, resulting in
substantial savings.
Environmental benefits, with CNG emitting fewer pollutants than petrol, reducing
greenhouse gas emissions.
Extended engine longevity, as CNG burns cleaner than petrol, leading to reduced deposits
and potentially increased engine life.
12
3.3.4 CHALLENGES OF CNG CONVERSION
The challenges associated with CNG conversion were outlined as follows:
Initial conversion cost, given the significant upfront expense of installing a CNG kit,
though fuel cost savings may offset this over time.
Reduced boot space, as the CNG cylinder takes up space in the trunk.
Availability of refueling stations, which may be limited in certain areas.
Potential power reduction, as vehicles running on CNG may experience a slight decrease
in engine power compared to petrol.
3.3.5 MAINTENANCE AFTER CONVERSION
Maintenance post-conversion involves regular inspection of the CNG system for leaks and
proper pressure regulator function. Additionally, dual fuel maintenance is required for both
petrol and CNG systems, potentially resulting in slightly higher maintenance costs.
13
CHAPTER FOUR
4.0 CHALLENGES ENCOUNTERED
1. Financial problem: During the program I encountered financial problem, the students find it
difficult to provide transport fare every day because there were no financial assistances from
anywhere and this made me at times let go off certain things so as to endure that, yet I attend
work every day.
2. Relationship: In the area of relationship with staffs, and other IT student, some challenges
were experienced in that made me to learn how to relate with different people of various kinds
and learning to patiently tolerate people attitude on daily basis.
3. Conveying of information: At the outset of the program, information was not efficiently
flowing from supervisors to students on industrial training attachments, but this was resolved
once their attention was devoted to it.
4.1 CONCLUSION
Throughout the industrial training, a comprehensive understanding of various key topics in
cybersecurity, ethical hacking, network design was achieved. The projects undertaken provided
practical exposure to real-world scenarios, enhancing technical proficiency and problem-solving
abilities. The networking design and implementation project emphasized the importance of
planning and securing small networks. The cybersecurity awareness training effectively
increased organizational awareness of security best practices and also a comprehensive training
of conversion of petrol car to compressed natural gas (CNG) was done.
14
REFERENCES
Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed
Systems. Wiley.
Stallings, W. (2016). Computer Security: Principles and Practice. Pearson.
McClure, S., Scambray, J., & Kurtz, G. (2018). Hacking Exposed: Network Security Secrets and
solutions. McGraw-Hill.
15