0% found this document useful (0 votes)
65 views35 pages

cp1 Project

Cyber security

Uploaded by

dhanujay614
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views35 pages

cp1 Project

Cyber security

Uploaded by

dhanujay614
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

PROGRAM BOOK FOR

SHORT-TERM INTERNSHIP

Name of the Student: Chinnakotla Pavan Kumar


Name of the college: Sri Sarathi institute of Engineering
And Technology Collage Nuzvid

Registration Number: 21541A4531 Period of


Internship: 23.09.2023 to 09.12.2023 Name &Address
of the organization: Edu Skills Cohort

5 Virtual Internship
Jawaharlal Nehru Technological University Kakinada
Academic Year: 2023-24

An Internship Report on
Cybersecurity Virtual Internship

Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, KAKINADA

In partial fulfillment of the requirement for the award of the degree of

BACHELOR OF TECHNOLOGY in

COMPTER SCIENCE AND ENGINEERING

Submitted by
Name: Chinnakotla Pavan Kumar
Under the guidance of
Mr.Bharath Veerla
Assistant Professor

SRI SARATHI INTITUTE OF ENGNEERING COLLAGE


Nuzvid 521-201
AndhraPradesh 2023
Student’s Declaration

I, Chinnakotla Pavan Kumar ,student of Cybersecurity Virtual INTERNSHIP Program, Reg.No.-


21541A4531 of the Department of Computer Science Engineering, Sri Sarathi Institute of
Engineering And Technology do hereby declare that I have completed the mandatory internship
from 02.10.2023 to 02.12.2023 in EduSkills Cohort – 5 Virtual Internship under the Faculty
Guide ship of Ms.
Mr..Bharath Veerla,Computer Science Engineering, SSIET

(Signature and Date)


Official Certification

This is to certify that Chinnakotla Pavan Kumar, Reg.No:21541A4531 has completed his/her
Internship in Edu Skills Cohort – 5 Virtual Internship on Cybersecurity under my supervision as
a part of partial fulfillment of the requirement for the Degree of B.Tech Computer Science And
Engineering, SSIET. This is accepted for evaluation.
Endorsements

Principal Head of the Department


K.SRIDHAR

Faculty Guide
Acknowledgements
First of all, I would like to convey my sincere thanks to the Almighty for the blessings on me to
carry on this internship without any disruption.
I am extremely thankful to Ms. Suchitra , internship Guide who guided me throughout the
internship. I am thankful to her for giving me the most independence and freedom throughout
various phases of the internship.
I am very much grateful to Mr.Bharath Veerla, H.O.D of CSE, Department, for her valuable
guidance which helps me to make our internship successful. Details of the internship. Her matured
and patient guidance paved a way for completing my internship with the sense of satisfaction and
pleasure.
I am very much thankful to our principal Mr K.Sridhar for his kind support and facilities
provided at our campus which helped me to bring out this internship successfully.
I am very much thankful to Eduskills Cohort – 5 Virtual Internship team who guided me throughout
the internship. I am thankful to the team of Eduskills Cohort – 5 Virtual Internship for giving me
the most independence and freedom throughout various phases of the internship.
Finally, I would like to convey my heart full thanks to all technical Staff, for their guidance and
support in every step of this internship. I convey my sincere thanks to all the faculty and friends
who directly or indirectly helped me for the successful completion of this internship

Contents

CHAPTER 1:
EXECUTIVE SUMMARY

CHAPTER 2:
OVERVIEW OF THE ORGANIZATION

CHAPTER 3:
INTERNSHIP PART

CHAPTER 4:
ACTIVITY LOG FOR THE WEEKS

CHAPTER 5:
OUTCOMES AND CONCLUSION
CHAPTER1: EXECUTIVE SUMMARY

In this internship we had learn the new and emerging technologies that are been used in the
industries and its job-oriented. From this internship we are able to get ready for the job and we are
able to know the environment of the industry and how are the requirements of the industry. The
Cybersecurity Internship Course offered by Palo Alto Networks provided a comprehensive and
hands-on exploration of crucial aspects within the realm of cybersecurity. As a participant, I
underwent a structured program that covered fundamental principles, advanced techniques, and
practical applications. The key highlights of this internship course include, Holistic Cybersecurity
Foundation, Network Security Proficiency, Cloud Security Expertise, Security Operations Center
(SOC) Dynamics, Incident Response and Mitigation Strategies Best Practices and Compliance:
Delved into industry-best practices, emphasizing proactive approaches to minimize vulnerabilities.
Explored the landscape of cybersecurity regulations and compliance standards, understanding the
importance of aligning security practices with legal and industry requirements. Practical
Application and Simulation Exercises:
The course incorporated hands-on exercises, simulations, and practical scenarios using Palo Alto
Networks’ cutting-edge technologies, allowing participants to apply theoretical knowledge in
simulated real-world environments. Networking Opportunities
This executive summary encapsulates the diverse and comprehensive nature of the Palo Alto
Networks Cybersecurity Internship Course, providing participants with a robust skill set and a
nuanced understanding of the contemporary cybersecurity landscape.

CHAPTER 2: OVERVIEW OF THE ORGANIZATION


A. Introduction of the Organization
Eduskills is a Non-profit organization which enables Industry 4.0 ready digital workforce
in India.
B. Vision
• Our vision is to fill the gap between Academia and Industry by ensuring world class
curriculum access to faculties and students.
• To benefit the education ecosystem by providing 360o degree holistic solutions to all
the stakeholder

C. Mission
• We want to completely disrupt the teaching methodologies and ICT based education
system in India.
• We work closely with all the important stakeholders in the ecosystem (Students,
Faculties, Education Institution and Central/State Governments) by bringing them
together through our skilling interventions.

D. Values of the Organization


• Students will get opportunities to participate in all National Level competitions &
events organized by the corporates.
• As an Academy student gain access to innovative learning tools, a global support
community, and resources to help them to launch their career.
• Mentoring by industry experts and IT leaders

E. Future Plans of the Organization.


To positively impact 1 million beneficiaries by 2025

CHAPTER 3: INTERNSHIP PART


Cybersecurity virtual internship has been announced for college students who are
pursuing their degrees at engineering colleges, polytechnic and degree institutes
which are members of Eduskills. The internship is 8 weeks long. The shortlisted
students will enrolled for the course. First the enrolled students need to inform
their guides that they have received their shortlisted for the course. The student
need to follow the pdf which is given by the Eduskills he/she need to create a Palo
Alto account. After that they need to login through their login ID and password.
The courses will be displayed the student need to select the each course first he/she
need to launch the course after that they need to follow the classes and then finally
they need to take an assessment on that. After completion of the assessment they
will receive the certificate in that course and then need to compete the further
courses too. Then the student need to submit their each digital badge link in the
Eduskills portal then the organization will verify that digital badge link and after
verifying the digital badge link and then the student will get their other submission
course link after submitting all their certificates in the Eduskills portal. The student
will receive the link to download their final certificate link from the Eduskills and
then the student need to enter the mail id and OTP after that he/she can download
their internship certificate.

Equipment used:

1. System/Laptop provided by the organization to complete the internship.


ACTIVITY LOG FOR THE FIRST WEEK

Day & Date Brief description of the daily Learning Person In charge
activity Outcomes Signature

Day-1 Introduction to cybersecurity

Day-2 Studied about introduction of Learnt about


Cybersecurity Landscape Cybersecurity
Landscape.
Day-3 Studied about current cybersecurity Learnt about
landscape current
cybersecurity
landscape

Day-4 Studied about Cybersecurity threats Learnt about


Cybersecurity
threats

Day-5 Identified the Cybersecurity threats Learnt how to find


cybersecurity
threats

Day-6 Evaluating different malware types Learnt about


different malware
types.

WEEKLY REPORT WEEK–1(From:23-09-2023 to: 30-09-2023)

Objective of the Activity Done:

To learn about the Cybersecurity Landscape, cybersecurity


threats, identifying cybersecurity threats and different malware types.

Detailed Report:
Introduction to Cybersecurity: Cybersecurity is a field dedicated to safeguarding digital
systems, networks, and data from unauthorized access, attacks, and damage. It encompasses a
range of technologies, processes, and practices to protect information and ensure the
confidentiality, integrity, and availability of data.
Current Cybersecurity Landscape: In examining the current cybersecurity landscape, one
explores the ever-evolving challenges and solutions within the digital realm. This includes
advancements in technology, emerging threats, and the strategies employed to mitigate risks.
Cybersecurity Threats: The study of cybersecurity threats involves analyzing potential risks
to information systems. Threats can include malware, phishing attacks, data breaches, and other
malicious activities that can compromise the security of digital assets.
Identifying Cybersecurity Threats: Identification is a crucial step in cybersecurity. It
involves recognizing specific threats that could target systems, networks, or data. This process
enables proactive measures to be taken to prevent or mitigate potential damage.

Evaluating Different Malware Types:


Malware, malicious software designed to harm or exploit systems, comes in various forms.
Evaluating different malware types involves understanding their characteristics, functionalities,
and the methods they employ to compromise security. This knowledge is vital for effective
defense and response strategies.

07

ACTIVITY LOG FOR THE SECOND WEEK

Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature

Day – 1 Studied about cyber attacks


Day - 2 Evaluating the cyber attacks Learnt about cyber attacks

Learnt about APT’s and


Day – 3 Studied about APT’s and vulnerabilities
vulnerabilities

Studied about relationship between Learnt about relationship


Day – 4 vulnerabilities and exploits between vulnerabilities and
exploits

Day – 5 Learnt about Wi-Fi


vulnerabilities, attacks and
Studied about Wi-Fi
vulnerabilities, attacks and advanced persistent threats
advanced persistent threats Learnt about

Day –6 Assessment on Introduction of


Cybersecurity

07
WEEKLY REPORT WEEK–2 (From 01-10-2023 to: 08-10-2023)

Objective of the Activity Done:


To learn about cyber attacks, evaluation of cyber attacks, APT’s
vulnerabilities, relationship between vulnerabilities and exploits, Wi-Fi vulnerabilities,
attacks and APT’s.

Detailed Report:
Studied Cyber Attacks:

Explored various types of cyber attacks, understanding their methods and impact on systems.

Evaluating Cyber Attacks:

Examined the effectiveness of different cyber attack mitigation strategies and their implications
for cybersecurity.

Studied APTs and Vulnerabilities:

Investigated Advanced Persistent Threats (APTs) and their connection to system vulnerabilities,
focusing on targeted and persistent cyber threats.

Relationship Between Vulnerabilities and Exploits:

Explored the intricate connection between system vulnerabilities and the


development/exploitation of corresponding exploits.

Wi-Fi Vulnerabilities, Attacks, and APTs:

Analyzed vulnerabilities specific to Wi-Fi networks, delving into common attacks and the
potential threat of advanced persistent threats targeting wireless infrastructures.

08
ACTIVITY LOG FOR THE THIRD WEEK

Day Person
& Brief description of the daily activity Learning Outcome InCharge
Date Signature

The Fundamentals of Network


Day – 1
Security

Studied about IP addressing, Learnt about IP addressing


Day - 2
subnetting and subnetting

Learnt about
Studied about packet encapsulation packet encapsulation based
Day – 3 based on the Open Systems on the Open Systems
Interconnection (OSI) model Interconnection (OSI)
model
Learnt about network
Studied about network security
Day – 4 security technologies
technologies such as packet filtering
such as packet filtering

Learnt about packet


Studied packet encapsulation based on encapsulation based on the
Day – 5 the Open Systems Interconnection Open Systems
(OSI) model Interconnection (OSI)
model

Known about application


Describe application firewalls, and
Day –6 firewalls, and IDS, IPS,
IDS, IPS, and web-content filters
and web-content filters

11

WEEKLY REPORT WEEK–3 (From 10-10-22 to 17-10-22)

Objective of the Activity Done:


To learn about IP addressing and Subnetting, Packet encapsulation and
OSI model, packet filtering, application firewalls, IDS and IPS, web-content filters .

Detailed Report:
Network Security Fundamentals Report:
IP Addressing and Subnetting:
Understanding IP addressing and Subnetting is crucial for network security. It involves
assigning unique addresses to devices and dividing networks into subnetworks to improve
performance and security.

Packet Encapsulation and OSI Model:


Packet encapsulation organizes data for transmission. Studying OSI model layers aids in
comprehending encapsulation processes. This knowledge is foundational for troubleshooting
and securing network communications.

Packet Filtering:
Packet filtering is a fundamental network security technology. It involves examining data
packets and allowing or blocking them based on predefined criteria. This enhances network
security by controlling the flow of data.
Application Firewalls:
Application firewalls monitor, filter, and block data packets at the application layer. They
provide an additional layer of security by scrutinizing specific applications’ behavior and
traffic. IDS (Intrusion Detection System) and IPS (Intrusion Prevention System):
IDS identifies potential security incidents by analyzing network traffic. IPS goes a step further
by actively preventing or blocking detected threats. Both play vital roles in safeguarding networks
against unauthorized access and malicious activities.
Web-Content Filters:
Web-content filters restrict or allow access to web content based on predefined policies. They are
essential for managing internet usage within an organization, preventing access to malicious
sites, and ensuring compliance with security policies.

In summary, mastering these fundamentals provides a solid foundation for implementing


effective network security measures, encompassing IP management, packet control, and the
deployment of advanced technologies like firewalls, IDS, IPS, and web-content filters.

11
ACTIVITY LOG FOR THE FOURTH WEEK

11
WEEKLY REPORT

WEEK–4 (From 21-10-22 to 28-10-22)

Objective of the Activity Done:


To learn about network security technologies, stateful inspection, endpoint
and mobile device security, host based IPS, management features, security enterprise
networks through PAN-OS, migration options DNS security, URL filtering, threat
prevention and wildfire subscription services Detailed Report:
Network Security Technologies: Packet Filtering: Involves examining packets of data and
allowing or blocking them based on predefined rules. It operates at the network layer and filters
traffic based on source and destination addresses, as well as ports.
Stateful Inspection: This technology goes beyond packet filtering by tracking the state of
active connections. It monitors the context of communication, ensuring that only valid and
established connections are allowed.
Endpoint and Mobile Device Security: Personal Firewalls: These provide a barrier between
a device and external threats, controlling incoming and outgoing network traffic. They play a
crucial role in preventing unauthorized access and protecting against malware.
Host-based IPS (Intrusion Prevention System): Offers real-time protection by analyzing
and responding to security threats at the host level. It monitors system and application activities
to detect and prevent malicious activities.
Management Features: Management features encompass tools and functionalities for
overseeing and controlling network security. This includes monitoring, configuring, and
maintaining security policies, as well as handling updates and patches to ensure robust
protection.
Securing Enterprise Networks through PAN-OS: Deployment Templates: PAN-OS
deployment templates streamline the implementation of security policies across the enterprise.
They provide a standardized and efficient way to configure security settings for different
network segments.
Migration Options: PAN-OS offers migration options to facilitate the transition to more
secure configurations. This ensures that organizations can adapt their security measures
without compromising network continuity.
DNS Security: Securing DNS (Domain Name System) is crucial for preventing various cyber
threats. This involves implementing measures to protect against DNS-based attacks, ensuring
the integrity and confidentiality of DNS data.
URL Filtering: Controls access to websites based on predefined categories, helping to prevent
users from accessing malicious or inappropriate content.
Threat Prevention & Wildfire Subscription Services: Involves the identification and
blocking of known and unknown threats, including viruses, malware, and other malicious
activities, to safeguard the network.Provides advanced threat intelligence by analyzing
unknown files in a cloud-based environment. This proactive approach helps identify and
prevent emerging threats before they can impact the network. This comprehensive approach to
network security defense against a variety of cyber threats, covering both emerging attack
vectors.

ACTIVITY LOG FOR THE FIFTH WEEK

Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature

Learnt cloud computing


Describe cloud computing models,
models, virtualization,
Day – 1 virtualization, hypervisors, public
hypervisors, public cloud
cloud service provider options
service provider options

Learnt about private


Day - 2 Describe private deployment options
deployment options

Known the development


operations (DevOps)
Explain the development operations
Day – 3 (DevOps) strategy that unites teams
to discover strategy that unites teams
to discover

Known about remediate


Explain remediate issues, automate
Day – 4 issues, automate
deployment
deployment

Know how it reduce time


Day – 5 Explain how it reduce time market
market

Learnt the evolution of


Day –6
Describe the evolution of data centers data centers through mixed

13
WEEKLY REPORT

through mixed traditional traditional

WEEK–5 (From: 03-11-22 to 09-11-22)

Objective of the Activity Done:


To learn about the cloud computing models, Virtualization and
hypervisors, public cloud service providers , private development options, devOps
strategy, reducing time to market and evolution of data centers.

Detailed Report:
Cloud Computing Models:
Cloud computing encompasses various models, including Infrastructure as a Service (IaaS),
Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides virtualized
computing resources, PaaS offers a platform for application development, and SaaS delivers
software applications over the internet.
Virtualization and Hypervisors:
Virtualization enables multiple virtual machines to run on a single physical machine.
Hypervisors, also known as Virtual Machine Monitors (VMM), manage these virtual machines,
facilitating resource allocation and isolation.
Public Cloud Service Providers:
Major public cloud providers include Amazon Web Services (AWS), Microsoft Azure, and
Google Cloud Platform (GCP). These platforms offer a range of services, from computing
power to storage and databases, accessible over the internet.
Private Deployment Options:
Private cloud deployment involves dedicated infrastructure for a single organization. This can be
on-premises or hosted by a third party, offering increased control and security.
DevOps Strategy:
DevOps is a collaborative approach that integrates development and operations teams. It aims to
streamline the software development lifecycle, emphasizing automation, continuous integration,
and continuous delivery to enhance efficiency and collaboration.
Reducing Time to Market:
DevOps accelerates the software development process by automating testing, deployment, and
monitoring. This results in quicker releases, reduced manual errors, and faster adaptation to
market demands.
Evolution of Data Centers:
Data centers have evolved from traditional, hardware-centric models to mixed environments
incorporating both on-premises and cloud-based solutions. This hybrid approach allows
organizations to balance performance, cost, and flexibility.
In summary, cloud computing models offer scalable solutions through IaaS, PaaS, and SaaS.
Virtualization and hypervisors enable efficient resource management, while public cloud
providers like AWS, Azure, and GCP offer diverse services. Private deployment options provide
dedicated infrastructure for enhance.The evolution of data centers embraces mixed
environments, combining traditional and cloud-based solutions for optimal performance and
flexibility.
15

ACTIVITY LOG FOR THE SIXTH WEEK

Day Person
& Brief description of the daily activity Learning Outcome Incharge
Date Signature

Describe the cloud computing


technologies
Learnt about the cloud
Day – 1
computing technologies

Learnt how secure access


Detail how secure access service edge service edge
Day – 2
(SASE) solutions help organizations (SASE) solutions help
organizations

Embrace the concepts of cloud and Known the concepts of


Day – 3
mobility cloud and mobility

Learnt how SaaS solutions


Describe how SaaS solutions provide
Day – 4 provide data classification
data classification and sharing
and sharing

15
WEEKLY REPORT

Learnt how permission


Describe how permission visibility
visibility and threat
Day – 5 and threat detection within the
detection within the
application
application

Assessment on The Fundamentals of


Day –6
Cloud Security
WEEKLY REPORT

WEEK–6 (From 11-11-22 to 18-11-22)

Objective of the Activity Done:

To learn about cloud computing technologies, SASE solutions, cloud and


mobility concepts, SaaS solutions for data classification and sharing, permission visibility
and theory detection in applications and identifying and mitigating potential security
incidents.

Detailed Report:
Cloud Computing Technologies:
Cloud computing involves the delivery of computing services, including storage, processing
power, and applications, over the internet. This technology enables users to access and use
resources without the need for physical infrastructure. It encompasses Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Secure Access Service Edge (SASE) Solutions:
SASE is a comprehensive security framework that combines network security functions with
WAN capabilities to support the dynamic and secure access needs of organizations. It integrates
cloudnative security services with wide-area networking to provide secure access for users,
regardless of their location. This approach enhances security by consolidating networking and
security services in the cloud, reducing complexity and improving performance.
Cloud and Mobility Concepts:
Cloud and mobility are interconnected concepts that redefine the way organizations operate. Cloud
computing facilitates flexible and scalable resources, while mobility enables access to these
resources from anywhere. Together, they empower employees to work remotely, enhance
collaboration, and optimize resource utilization.
SaaS Solutions for Data Classification and Sharing:
SaaS solutions play a crucial role in data management by offering centralized platforms for
collaboration and communication. These solutions often include features for data classification,
ensuring sensitive information is appropriately labeled and protected. They also enable secure data
sharing, promoting efficient collaboration while maintaining data integrity and confidentiality.
Permission Visibility and Threat Detection in Applications:
Ensuring robust security within applications involves monitoring permission visibility and
detecting potential threats. By implementing access controls and regularly auditing permissions,
organizations can enhance visibility into who has access to what data. Threat detection
mechanisms, such as anomaly detection and behavior analysis, further strengthen the security
posture by identifying and mitigating potential security incidents.

In conclusion, the integration of cloud computing, SASE solutions, and SaaS platforms
revolutionizes the way organizations operate in the digital age. This synergy not only enhances
efficiency and flexibility but also addresses critical aspects of security, data management, and
threat detection, contributing to a more resilient and adaptive business environment.

16
ACTIVITY LOG FOR THE SEVENTH WEEK

Day Person
& Brief description of the daily activity Learning Outcome Incharge
Date Signature

Introduction to general concepts of


SOC

Day – 1

Introduction to the general concept


Day – 2
SecOps

Learnt about the Security


Studied the Security Operations
Day – 3 Operations framework,
framework, people, processes
people, processes

Learnt about the


Studied the technology aspects technology aspects
Day – 4
required to support the business required to support the
business

e Learnt about endpoint


protection with the Cortex
Studied endpoint protection with th XDR agent, which
Cortex XDR agent, which combines combines behavioral
Day – 5
behavioral protection and AI-based protection and AI-based
analysis to stop advanced attacks. analysis to stop advanced
attacks.

Studied about the security operations


framework
Learnt about the security
Day –6
operations framework

16
WEEKLY REPORT WEEK–7 (From 19-11-22 to 26-11-22)

Objective of the Activity Done:

To learn about SecOps and Frameworks, security operations frameworks,


people and processes, technology aspects and endpoint protection with cortex XDR.

Detailed Report:
Overview of Security Operations Concepts and Frameworks

Introduction:
Security Operations (SecOps) is a comprehensive approach to information security that
integrates security and operations teams to effectively identify, respond to, and mitigate security
threats. It encompasses various aspects, including frameworks, people, processes, and
technology, to safeguard an organization’s digital assets. Security Operations Framework:
Studying the Security Operations framework involves a structured approach to managing
security incidents and threats. This framework typically includes defining roles and
responsibilities, establishing incident response processes, and implementing technologies to
monitor and analyze security events.
People and Processes:
An integral part of SecOps is understanding the role of people and processes. Effective
communication and collaboration between security and operations teams are crucial.
Establishing well-defined processes for incident detection, analysis, and response ensures a
coordinated and efficient approach to security.
Technology Aspects:
The technology aspects of SecOps involve implementing tools and solutions to support business
security needs. This includes endpoint protection systems like Cortex XDR, which utilizes a
combination of behavioral protection and AI-based analysis to proactively identify and halt
advanced cyber threats.
Endpoint Protection with Cortex XDR:
Studying the Cortex XDR agent provides insights into advanced endpoint protection. This
solution goes beyond traditional antivirus measures, incorporating behavioral analysis and
artificial intelligence to detect and prevent sophisticated attacks. It enhances the organization’s
overall security posture by providing real-time threat intelligence.

16
ACTIVITY LOG FOR THE EIGHT WEEK

Person
Incharge
Signature

Day
&
Date Brief description of the daily activity Learning Outcome

Learnt about
technology required to
Studied about technology required to support and defend the
Day – 1 support and defend the business business
Day – 2 Learnt about the interfaces
needed with other

organizations outside of the


Studied about the interfaces needed SOC.
with other organizations outside of the
SOC.

Learnt about Cortex


Day – 3 Studied about Cortex XSOAR XSOAR
Learnt about Cortex XDR

Day – 4 Studied about Cortex XDR

Studied about Cortex XSOAR TIM Learnt about Cortex


Day – 5 and XSIAM XSOAR TIM and XSIAM
Assessment on The
Fundamentals of SOC

Day –6

WEEKLY REPORT WEEK–8 (From 27-11-22 to 03-12-22)

Objective of the Activity Done:

To explore products of Palo Alto Networks and Critical role of SOC’s

Detailed Report:

In my studies on technology supporting business defense, I delved into the critical role of
Security
Operations Centers (SOCs) and their interfaces with external organizations. Specifically,
I explored Palo Alto Networks’ Cortex XSOAR, a comprehensive security orchestration,
automation, and response platform, recognizing its efficacy in streamlining incident
response workflows.

Additionally, I examined Cortex XDR, Palo Alto Networks’ extended detection and
response solution, understanding its capacity to provide advanced threat detection and
response across multiple security layers.

In the context of Cortex XSOAR, I explored the Tactical Incident Manager (TIM) and
Security Information and Event Management (SIEM) Accelerated Model (XSIAM). TIM
enhances incident response by coordinating actions, while XSIAM enhances SIEM
capabilities, ensuring a robust security infrastructure.

Overall, the integration of these technologies demonstrates a proactive approach to


cybersecurity, fortifying the business against evolving threats and fostering efficient
collaboration with external entities.
CHAPTER 5: OUTCOMES AND CONCLUSION
Describe the real time technical skills you have acquired (in terms of the job- related skills
and hands on experience)

After completing a cybersecurity virtual internship:


I gained practical experience in identifying and
addressing security threats.
Enhancing your understanding of cybersecurity tools and
techniques.
Developing problem-solving skills.
building a foundation for a career in the field.
I am able to implement basic network security
configuration techniques
Additionally, I had the opportunity to network with
professionals in the industry potentially leading to future
job opportunities or references.
Describe the technological developments you have observed and relevant to the subject
area of training (focus on digital technologies relevant to your job role)

The world of cybersecurity is constantly evolving, and staying ahead of the curve is essential
for protecting sensitive information and preventing cyberattacks. With new technologies
emerging all the time, it can be challenging to keep up with the latest trends and
developments. Some of the Latest Cybersecurity Technologies Include:
Artificial Intelligence (AI) and Machine Learning (ML)
Behavioral Biometrics
Zero Trust Architecture
Blockchain
Quantum Computing
Cloud Security
Internet of Things (IoT) Security

In conclusion, staying ahead of the curve in cybersecurity requires a deep


understanding of the latest technologies and trends. These are just a few of the latest
developments in cybersecurity technologies. As the threat landscape continues to
evolve, it’s likely that new technologies and strategies will emerge to help businesses
and organizations protect their data and networks from cyberattacks.

Student Self-Evaluation of the Short-Term Internship

Student Name: Chinnakotla Pavan Kumar


Registration No: 21541A4531
Term of Internship: 2 MONTHS From: 23-09-2023 To: 09-12-2023 Date
of Evaluation:
Organization Name & Address: Jawaharlal Nehru Technological University,
Kakinada Please rate your performance in the following areas:

Rating Scale: Letter grade of CGPA calculation to be provided

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5

4 Interaction ability with community 1 2 3 4 5

5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5

11 Quality of work done 1 2 3 4 5

12 Time Management 1 2 3 4 5

13 Understanding the Community 1 2 3 4 5

14 Achievement of Desired Outcomes 1 2 3 4 5

15 OVERALL PERFORMANCE 1 2 3 4 5

Date: Signature of the Student


Evaluation by the Supervisor of the Intern Organization

Student Name: Chinnakotla Pavan Kumar


Department of : Computer Science And Engineering
Registration No: 21541A4531
Term of Internship: 2 Months From: 23-09-2023 To: 09-12-2023 Date of
Evaluation:
Organization Name & Address:
Name & Address of the Supervisor with Mobile Number

Please rate the student’s performance in the following areas:

Please note that your evaluation shall be done independent of the Student’s self evaluation
Rating Scale: 1 is lowest and 5 is highest rank

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5

3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5

5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5

7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5

9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5

11 Quality of work done 1 2 3 4 5


12 Time Management 1 2 3 4 5

13 Understanding the Community 1 2 3 4 5


14 Achievement of Desired Outcomes 1 2 3 4 5

15 OVERALL PERFORMANCE 1 2 3 4 5

Date: Signature of the Supervis

Pag
PHOTOS&VIDEO LINKS
20

2
MARKS STATEMENT
(To be used by the Examiners)

INTERNAL ASSESSMENT STATEMENT

S.No Evaluation Criterion Maximum Marks


Marks Awarded

1. Activity Log 25

2. Internship Evaluation 50

3. Oral Presentation 25

GRAND TOTAL 100

Date: Signature of the Faculty Guide

Certified by
Certified by

Date: Signature of the Head


Department/Principal Seal:

You might also like