cp1 Project
cp1 Project
SHORT-TERM INTERNSHIP
5 Virtual Internship
Jawaharlal Nehru Technological University Kakinada
Academic Year: 2023-24
An Internship Report on
Cybersecurity Virtual Internship
Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, KAKINADA
BACHELOR OF TECHNOLOGY in
Submitted by
Name: Chinnakotla Pavan Kumar
Under the guidance of
Mr.Bharath Veerla
Assistant Professor
This is to certify that Chinnakotla Pavan Kumar, Reg.No:21541A4531 has completed his/her
Internship in Edu Skills Cohort – 5 Virtual Internship on Cybersecurity under my supervision as
a part of partial fulfillment of the requirement for the Degree of B.Tech Computer Science And
Engineering, SSIET. This is accepted for evaluation.
Endorsements
Faculty Guide
Acknowledgements
First of all, I would like to convey my sincere thanks to the Almighty for the blessings on me to
carry on this internship without any disruption.
I am extremely thankful to Ms. Suchitra , internship Guide who guided me throughout the
internship. I am thankful to her for giving me the most independence and freedom throughout
various phases of the internship.
I am very much grateful to Mr.Bharath Veerla, H.O.D of CSE, Department, for her valuable
guidance which helps me to make our internship successful. Details of the internship. Her matured
and patient guidance paved a way for completing my internship with the sense of satisfaction and
pleasure.
I am very much thankful to our principal Mr K.Sridhar for his kind support and facilities
provided at our campus which helped me to bring out this internship successfully.
I am very much thankful to Eduskills Cohort – 5 Virtual Internship team who guided me throughout
the internship. I am thankful to the team of Eduskills Cohort – 5 Virtual Internship for giving me
the most independence and freedom throughout various phases of the internship.
Finally, I would like to convey my heart full thanks to all technical Staff, for their guidance and
support in every step of this internship. I convey my sincere thanks to all the faculty and friends
who directly or indirectly helped me for the successful completion of this internship
Contents
CHAPTER 1:
EXECUTIVE SUMMARY
CHAPTER 2:
OVERVIEW OF THE ORGANIZATION
CHAPTER 3:
INTERNSHIP PART
CHAPTER 4:
ACTIVITY LOG FOR THE WEEKS
CHAPTER 5:
OUTCOMES AND CONCLUSION
CHAPTER1: EXECUTIVE SUMMARY
In this internship we had learn the new and emerging technologies that are been used in the
industries and its job-oriented. From this internship we are able to get ready for the job and we are
able to know the environment of the industry and how are the requirements of the industry. The
Cybersecurity Internship Course offered by Palo Alto Networks provided a comprehensive and
hands-on exploration of crucial aspects within the realm of cybersecurity. As a participant, I
underwent a structured program that covered fundamental principles, advanced techniques, and
practical applications. The key highlights of this internship course include, Holistic Cybersecurity
Foundation, Network Security Proficiency, Cloud Security Expertise, Security Operations Center
(SOC) Dynamics, Incident Response and Mitigation Strategies Best Practices and Compliance:
Delved into industry-best practices, emphasizing proactive approaches to minimize vulnerabilities.
Explored the landscape of cybersecurity regulations and compliance standards, understanding the
importance of aligning security practices with legal and industry requirements. Practical
Application and Simulation Exercises:
The course incorporated hands-on exercises, simulations, and practical scenarios using Palo Alto
Networks’ cutting-edge technologies, allowing participants to apply theoretical knowledge in
simulated real-world environments. Networking Opportunities
This executive summary encapsulates the diverse and comprehensive nature of the Palo Alto
Networks Cybersecurity Internship Course, providing participants with a robust skill set and a
nuanced understanding of the contemporary cybersecurity landscape.
C. Mission
• We want to completely disrupt the teaching methodologies and ICT based education
system in India.
• We work closely with all the important stakeholders in the ecosystem (Students,
Faculties, Education Institution and Central/State Governments) by bringing them
together through our skilling interventions.
Equipment used:
Day & Date Brief description of the daily Learning Person In charge
activity Outcomes Signature
Detailed Report:
Introduction to Cybersecurity: Cybersecurity is a field dedicated to safeguarding digital
systems, networks, and data from unauthorized access, attacks, and damage. It encompasses a
range of technologies, processes, and practices to protect information and ensure the
confidentiality, integrity, and availability of data.
Current Cybersecurity Landscape: In examining the current cybersecurity landscape, one
explores the ever-evolving challenges and solutions within the digital realm. This includes
advancements in technology, emerging threats, and the strategies employed to mitigate risks.
Cybersecurity Threats: The study of cybersecurity threats involves analyzing potential risks
to information systems. Threats can include malware, phishing attacks, data breaches, and other
malicious activities that can compromise the security of digital assets.
Identifying Cybersecurity Threats: Identification is a crucial step in cybersecurity. It
involves recognizing specific threats that could target systems, networks, or data. This process
enables proactive measures to be taken to prevent or mitigate potential damage.
07
Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature
07
WEEKLY REPORT WEEK–2 (From 01-10-2023 to: 08-10-2023)
Detailed Report:
Studied Cyber Attacks:
Explored various types of cyber attacks, understanding their methods and impact on systems.
Examined the effectiveness of different cyber attack mitigation strategies and their implications
for cybersecurity.
Investigated Advanced Persistent Threats (APTs) and their connection to system vulnerabilities,
focusing on targeted and persistent cyber threats.
Analyzed vulnerabilities specific to Wi-Fi networks, delving into common attacks and the
potential threat of advanced persistent threats targeting wireless infrastructures.
08
ACTIVITY LOG FOR THE THIRD WEEK
Day Person
& Brief description of the daily activity Learning Outcome InCharge
Date Signature
Learnt about
Studied about packet encapsulation packet encapsulation based
Day – 3 based on the Open Systems on the Open Systems
Interconnection (OSI) model Interconnection (OSI)
model
Learnt about network
Studied about network security
Day – 4 security technologies
technologies such as packet filtering
such as packet filtering
11
Detailed Report:
Network Security Fundamentals Report:
IP Addressing and Subnetting:
Understanding IP addressing and Subnetting is crucial for network security. It involves
assigning unique addresses to devices and dividing networks into subnetworks to improve
performance and security.
Packet Filtering:
Packet filtering is a fundamental network security technology. It involves examining data
packets and allowing or blocking them based on predefined criteria. This enhances network
security by controlling the flow of data.
Application Firewalls:
Application firewalls monitor, filter, and block data packets at the application layer. They
provide an additional layer of security by scrutinizing specific applications’ behavior and
traffic. IDS (Intrusion Detection System) and IPS (Intrusion Prevention System):
IDS identifies potential security incidents by analyzing network traffic. IPS goes a step further
by actively preventing or blocking detected threats. Both play vital roles in safeguarding networks
against unauthorized access and malicious activities.
Web-Content Filters:
Web-content filters restrict or allow access to web content based on predefined policies. They are
essential for managing internet usage within an organization, preventing access to malicious
sites, and ensuring compliance with security policies.
11
ACTIVITY LOG FOR THE FOURTH WEEK
11
WEEKLY REPORT
Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature
13
WEEKLY REPORT
Detailed Report:
Cloud Computing Models:
Cloud computing encompasses various models, including Infrastructure as a Service (IaaS),
Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtualized
computing resources, PaaS offers a platform for application development, and SaaS delivers
software applications over the internet.
Virtualization and Hypervisors:
Virtualization enables multiple virtual machines to run on a single physical machine.
Hypervisors, also known as Virtual Machine Monitors (VMM), manage these virtual machines,
facilitating resource allocation and isolation.
Public Cloud Service Providers:
Major public cloud providers include Amazon Web Services (AWS), Microsoft Azure, and
Google Cloud Platform (GCP). These platforms offer a range of services, from computing
power to storage and databases, accessible over the internet.
Private Deployment Options:
Private cloud deployment involves dedicated infrastructure for a single organization. This can be
on-premises or hosted by a third party, offering increased control and security.
DevOps Strategy:
DevOps is a collaborative approach that integrates development and operations teams. It aims to
streamline the software development lifecycle, emphasizing automation, continuous integration,
and continuous delivery to enhance efficiency and collaboration.
Reducing Time to Market:
DevOps accelerates the software development process by automating testing, deployment, and
monitoring. This results in quicker releases, reduced manual errors, and faster adaptation to
market demands.
Evolution of Data Centers:
Data centers have evolved from traditional, hardware-centric models to mixed environments
incorporating both on-premises and cloud-based solutions. This hybrid approach allows
organizations to balance performance, cost, and flexibility.
In summary, cloud computing models offer scalable solutions through IaaS, PaaS, and SaaS.
Virtualization and hypervisors enable efficient resource management, while public cloud
providers like AWS, Azure, and GCP offer diverse services. Private deployment options provide
dedicated infrastructure for enhance.The evolution of data centers embraces mixed
environments, combining traditional and cloud-based solutions for optimal performance and
flexibility.
15
Day Person
& Brief description of the daily activity Learning Outcome Incharge
Date Signature
15
WEEKLY REPORT
Detailed Report:
Cloud Computing Technologies:
Cloud computing involves the delivery of computing services, including storage, processing
power, and applications, over the internet. This technology enables users to access and use
resources without the need for physical infrastructure. It encompasses Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Secure Access Service Edge (SASE) Solutions:
SASE is a comprehensive security framework that combines network security functions with
WAN capabilities to support the dynamic and secure access needs of organizations. It integrates
cloudnative security services with wide-area networking to provide secure access for users,
regardless of their location. This approach enhances security by consolidating networking and
security services in the cloud, reducing complexity and improving performance.
Cloud and Mobility Concepts:
Cloud and mobility are interconnected concepts that redefine the way organizations operate. Cloud
computing facilitates flexible and scalable resources, while mobility enables access to these
resources from anywhere. Together, they empower employees to work remotely, enhance
collaboration, and optimize resource utilization.
SaaS Solutions for Data Classification and Sharing:
SaaS solutions play a crucial role in data management by offering centralized platforms for
collaboration and communication. These solutions often include features for data classification,
ensuring sensitive information is appropriately labeled and protected. They also enable secure data
sharing, promoting efficient collaboration while maintaining data integrity and confidentiality.
Permission Visibility and Threat Detection in Applications:
Ensuring robust security within applications involves monitoring permission visibility and
detecting potential threats. By implementing access controls and regularly auditing permissions,
organizations can enhance visibility into who has access to what data. Threat detection
mechanisms, such as anomaly detection and behavior analysis, further strengthen the security
posture by identifying and mitigating potential security incidents.
In conclusion, the integration of cloud computing, SASE solutions, and SaaS platforms
revolutionizes the way organizations operate in the digital age. This synergy not only enhances
efficiency and flexibility but also addresses critical aspects of security, data management, and
threat detection, contributing to a more resilient and adaptive business environment.
16
ACTIVITY LOG FOR THE SEVENTH WEEK
Day Person
& Brief description of the daily activity Learning Outcome Incharge
Date Signature
Day – 1
16
WEEKLY REPORT WEEK–7 (From 19-11-22 to 26-11-22)
Detailed Report:
Overview of Security Operations Concepts and Frameworks
Introduction:
Security Operations (SecOps) is a comprehensive approach to information security that
integrates security and operations teams to effectively identify, respond to, and mitigate security
threats. It encompasses various aspects, including frameworks, people, processes, and
technology, to safeguard an organization’s digital assets. Security Operations Framework:
Studying the Security Operations framework involves a structured approach to managing
security incidents and threats. This framework typically includes defining roles and
responsibilities, establishing incident response processes, and implementing technologies to
monitor and analyze security events.
People and Processes:
An integral part of SecOps is understanding the role of people and processes. Effective
communication and collaboration between security and operations teams are crucial.
Establishing well-defined processes for incident detection, analysis, and response ensures a
coordinated and efficient approach to security.
Technology Aspects:
The technology aspects of SecOps involve implementing tools and solutions to support business
security needs. This includes endpoint protection systems like Cortex XDR, which utilizes a
combination of behavioral protection and AI-based analysis to proactively identify and halt
advanced cyber threats.
Endpoint Protection with Cortex XDR:
Studying the Cortex XDR agent provides insights into advanced endpoint protection. This
solution goes beyond traditional antivirus measures, incorporating behavioral analysis and
artificial intelligence to detect and prevent sophisticated attacks. It enhances the organization’s
overall security posture by providing real-time threat intelligence.
16
ACTIVITY LOG FOR THE EIGHT WEEK
Person
Incharge
Signature
Day
&
Date Brief description of the daily activity Learning Outcome
Learnt about
technology required to
Studied about technology required to support and defend the
Day – 1 support and defend the business business
Day – 2 Learnt about the interfaces
needed with other
Day –6
Detailed Report:
In my studies on technology supporting business defense, I delved into the critical role of
Security
Operations Centers (SOCs) and their interfaces with external organizations. Specifically,
I explored Palo Alto Networks’ Cortex XSOAR, a comprehensive security orchestration,
automation, and response platform, recognizing its efficacy in streamlining incident
response workflows.
Additionally, I examined Cortex XDR, Palo Alto Networks’ extended detection and
response solution, understanding its capacity to provide advanced threat detection and
response across multiple security layers.
In the context of Cortex XSOAR, I explored the Tactical Incident Manager (TIM) and
Security Information and Event Management (SIEM) Accelerated Model (XSIAM). TIM
enhances incident response by coordinating actions, while XSIAM enhances SIEM
capabilities, ensuring a robust security infrastructure.
The world of cybersecurity is constantly evolving, and staying ahead of the curve is essential
for protecting sensitive information and preventing cyberattacks. With new technologies
emerging all the time, it can be challenging to keep up with the latest trends and
developments. Some of the Latest Cybersecurity Technologies Include:
Artificial Intelligence (AI) and Machine Learning (ML)
Behavioral Biometrics
Zero Trust Architecture
Blockchain
Quantum Computing
Cloud Security
Internet of Things (IoT) Security
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
12 Time Management 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5
Please note that your evaluation shall be done independent of the Student’s self evaluation
Rating Scale: 1 is lowest and 5 is highest rank
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5
Pag
PHOTOS&VIDEO LINKS
20
2
MARKS STATEMENT
(To be used by the Examiners)
1. Activity Log 25
2. Internship Evaluation 50
3. Oral Presentation 25
Certified by
Certified by