Final (3) - 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 49

Cyber Security from ExcelR

A Summer Internship Report submitted in partial fulfillment of the


requirements for the award of a degree of

BACHELOR OF TECHNOLOGY

In

Electrical and Electronics Engineering

Submitted by:

Melam Durga Chandrika


21P31A0224

Electrical and Electronics Engineering

ADITYA COLLEGE OF ENGINEERING & TECHNOLOGY (A)


Approved by AICTE, Permanently affiliated to JNTUK & Accredited by NAAC with ‘A+’ Grade

Recognized by UGC under the sections 2(f) and 12(B)of the UGC act 1956
Aditya Nagar, ADB Road –Surampalem 533437, E.G. Dist., A.P.,

2024-2025.

1
ADITYA COLLEGE OF ENGINEERING & TECHNOLOGY (A)
Approved by AICTE, Permanently Affiliated to JNTUK & Accredited by NAAC with ‘A+’ Grade
Recognized by UGC under the sections 2(f) and 12(B) of the UGC act 1956
Aditya Nagar, ADB Road - Surampalem – 533437, E.G.Dist., A.P.,

Department Of Electrical and Electronics Engineering

CERTIFICATE

This is to certify that the Internship report entitled “CYBER SECURITY” is being submitted by
Melam Durga Chandrika bearing (21P31A0224), in partial fulfillment for the award of the Degree
of Bachelor of Technology, during the year 2024- 2025 in Electrical and Electronics Engineering
of Aditya College Of Engineering and Technology, for the record of bonafide work carried out by
him.

Internship Guide Head of the Department

Mrs. V U P Lavanya M.Tech,(Ph.D), Dr M Ravindra


M.Tech.,Ph.D,
Sr.Assistent Professor Associative Professor

2
DECLARATION

I hereby declare that the Internship entitled “Cyber Security” is a genuine report. This work has
been submitted to the ADITYA COLLEGE OF ENGINEERING & TECHNOLOGY (A),
Surampalem, permanently affiliated to JNTUK, KAKINADA in partial fulfillment of the B.Tech
degree.

I also hereby declare that this internship report is not submitted in full or partial to any other
university for any degree.

Melam Durga Chandrika


(21P31A0224)

3
Institute Vision & Mission

Vision Mission of the Institute:

Vision: To induce higher planes of learning by imparting technical education with


• International standards
• Applied research
• Creative Ability
• Value based instruction and
To emerge as a premiere institute

Mission: Achieving academic excellence by providing globally acceptable technical


Education by forecasting technology through
• Innovative Research And development
• Industry Institute Interaction
• Empowered Manpower

4
DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING

Vision Mission of the Department:

Vision: To be recognized as a leader in education, training, and research.

Mission:

 Provide state-of-art infrastructure to impart technical skills in the frontier areas of electrical and
electronics engineering.
 Enable innovative teaching and learning process with collaboration.
 To raise professionals, academicians, researchers and entrepreneurs with a passion for solving
societal problems.

Head of the Department

5
DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING

Program Educational Objectives (PEOs):

PEO1: Pursue a successful career by demonstrating the knowledge acquired in Electrical and
Electronics Engineering.

PEO2 : Exhibit technical skills in solving real world problems using emerging technologies
considering societal, technological and business challenges.

PEO3 : Engage in professional practice as individuals and as team members with ethical values and
attitude of lifelong learning.

Head of the Department

6
Program Outcomes (POs):

 Engineering Knowledge: Apply the knowledge of mathematics, science, engineering


fundamentals, and an engineering specialization to the solution of complex engineering problems.
 Problem Analysis: Identify, formulate, research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences,
and engineering sciences.
 Design/Development of Solutions: Design solutions for complex engineering problems and design
system components or processes that meet the specified needs with appropriate consideration for
the public health and safety, and the cultural, societal, and environmental considerations.
 Conduct Investigations of Complex Problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of the
information to provide valid conclusions.
 Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modelling to complex engineering activities with
an understanding of the limitations.
 The Engineer and Society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
 Environment and Sustainability: Understand the impact of the professional engineering solutions
in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable
development.
 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms
of the engineering practice.
 Individual and Team Work: Function effectively as an individual, and as a member or leader in
diverse teams, and in multidisciplinary settings.
 Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able to comprehend and write effective reports
and design documentation, make effective presentations, give and receive clear instructions.
 Project Management and Finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
 Life-Long Learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change

7
Head of the Department

DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING

Program Specific Outcomes (PSOs):

PSO1: Provide solid foundation in mathematical, scientific, and engineering fundamentals which is
required to solve electrical and electronics engineering problems.

PSO2 : Understand, analyze, simulate, design, and implement the electrical power systems, modern
electrical drives, modern lighting systems, and automation of systems using state of art components,
software tools and ICT.

Head of the Department

8
COMPLETION CERTIFICATE

9
ACKNOWLEDGEMENT

I offer my sincere thanks to the dynamic and beloved Principal, Dr. A. Ramesh, M.Tech;Ph.D,

Aditya College of Engineering & Technology (A) for his cooperation.

My sincere thanks to Dr.M Ravendra, M.Tech., Ph.D, Head of the Department of Electrical and
Electronics Engineering for his valuable support.

I express my sincere gratitude to my internship guide, Ms.V U P Lavanya, M.Tech,(Ph.D),

Sr.Assistent Professor, Department of Electrical and Electronics Engineering, for her valuable guidance
and encouragement which has been helpful in the successful completion of this internship.

With immense pleasure, I would like to express my deep sense and heart full thanks to the
management of Aditya College of Engineering & Technology (A).

Melam Durga Chandrika


21P31A0224
Electrical and Electronics Engineering

10
Learning Objectives / Internship Objectives
Technical Skills

1. Network Security: Understand fundamental concepts of network security, including


firewalls, intrusion detection/prevention systems, and VPNs.
2. Incident Response: Participate in simulated incident response scenarios to learn how to
identify, contain, and remediate security incidents.
3. Vulnerability Assessment: Conduct vulnerability assessments using tools like Nessus or
OpenVAS and learn to prioritize remediation efforts based on risk.
4. Secure Coding Practices: Gain familiarity with secure coding principles and identify
common vulnerabilities in code (e.g., SQL injection, XSS).

Knowledge Acquisition

1. Regulatory Compliance: Understand relevant cybersecurity regulations and standards


(e.g., GDPR, HIPAA, NIST) and their implications for organizational security.

Threat Landscape Awareness: Research and present on current cybersecurity


threats and trends, including emerging technologies and attack vectors.Practical
Application

1. Security Policies: Assist in the development or review of security policies and


procedures, understanding the importance of governance in cybersecurity.
2. Tool Utilization: Gain hands-on experience with cybersecurity tools (e.g., SIEM
systems, endpoint protection software) and learn how to analyze the data they generate.

Soft Skills

1. Communication Skills: Improve the ability to communicate technical concepts to non-


technical stakeholders, including creating clear and concise reports.
2. Team Collaboration: Work effectively within a team environment, demonstrating the
ability to collaborate on projects and share knowledge.

Project Management

1. Project Involvement: Participate in a specific cybersecurity project from initiation to


completion, learning about project management methodologies and best practices.

Personal Development

11
1. Critical Thinking: Develop critical thinking skills to assess security situations and make
informed decisions based on available data and best practices.
2. Ethical Considerations: Understand the ethical implications of cybersecurity practices and
the importance of maintaining integrity and professionalism in the field

TABLE OF CONTENTS

S.No Name of the topic Pg. No

1 Chapter 1 : Executive Summary 13


2 Chapter 2 : Overview of the organization 14-17
2.1: Introduction of the ExcelR
2.2:VissionMission, and Values of the ExcelR
2.3: Policy of the ExcelR, in relation to the Cyber
Security intern role
2.4: ExcelR Structure
2.5: Roles and responsibilities of the Cyber Security employees
2.6: Performance of the ExcelR in terms of turnover,
profits, market reach and market value
2.7: Future Plans of the ExcelR
3 Chapter 3 : Internship Part 18-33
Activity Logs
3.1: Activity log for the first week & Weekly report
3.2: Activity log for the second week & Weekly report
3.3: Activity log for the third week & Weekly report
3.4: Activity log for the fourth week & Weekly report
3.5: Activity log for the fifth week & Weekly report
3.6: Activity log for the sixth week & Weekly report
3.7: Activity log for the seventh week & Weekly report
3.8: Activity log for the eighth week & Weekly report
4 Chapter 4 : Project 34-36
4.1: Title Of The Project
4.2: Project Description
4.3: Methodology
4.4: Expected Outcomes
4.5: Report Structure
4.6: Future Recommendations

12
5 Outcomes Descriptions 37

6 Evaluation of the short-term Internship 38-39


7 Photos Library 40-43

CHAPTER 1: EXECUTIVE SUMMARY

During my internship in Cyber Security with ExcelR I had the opportunity to enhance my technical and
analytical skills while working on real-world projects in the data science domain.The cybersecurity
internship program aims to provide hands-on experience and practical training for students or
recent graduates interested in pursuing a career in cybersecurity. Through a combination of
technical training, real-world project involvement, and mentorship, interns will develop
essential skills and knowledge to address contemporary cybersecurity challenges.

Objectives: The primary goals of the internship include:

Skill Development: Equip interns with critical technical skills in areas such as network
security,incident response, and vulnerability assessment. Interns will gain proficiency in using
industry-standard tools and technologies.

Knowledge Acquisition: Enhance understanding of cybersecurity regulations, compliance


requirements, and the evolving threat landscape. Interns will engage in research and discussions
to stay updated on current trends and threats.

Practical Experience: Provide opportunities for interns to participate in security assessments,


policy development, and incident response exercises, allowing them to apply theoretical
knowledge in practical scenarios.

Professional Growth: Foster personal development through improved communication skills,


teamwork, and ethical considerations in cybersecurity practice. Interns will learn to convey
complex information clearly to diverse audiences.

 Conducting vulnerability assessments and presenting findings to the cybersecurity team.


 Assisting in the development of security policies and procedures.
 Participating in incident response drills to simulate real-world security incidents.

Mentorship and Evaluation: Interns will be paired with experienced cybersecurity


professionals who will provide guidance and support throughout the program. Regular
evaluations and feedback sessions will ensure that learning objectives are being met and that
interns receive constructive input on their performance.

13
Conclusion: This cybersecurity internship program not only serves to enhance the technical
capabilities of aspiring cybersecurity professionals but also contributes to the organization's
overall security posture. By investing in the next generation of cybersecurity talent, we aim to
build a more secure digital environment while fostering innovation and continuous
improvement in our security practices.

CHAPTER 2: OVERVIEW OF THE ORGANIZATION

2.1 Introduction to ExcelR

.ExcelR is an educational organization focused on providing professional training and


development in various fields, particularly in data science, analytics, digital marketing, and
management. They offer a range of courses, including online and in-person training, designed to
help individuals and businesses enhance their skills and stay competitive in today's job market.

ExcelR is known for its industry-relevant curriculum, experienced trainers, and a strong
emphasis on practical learning through projects and case studies. Their programs are aimed at
both beginners looking to start a new career and professionals seeking to upskill or transition
into new roles.

In addition to training, ExcelR often engages in workshops, webinars, and corporate training
sessions, catering to the needs of different learners and organizations. Their mission is to
empower individuals with the knowledge and skills necessary for career advancement and
success.

2.2 Vision, Mission, and Values of the ExcelR

Vision

The vision of ExcelR typically revolves around empowering individuals and organizations
through high-quality education and training. They aim to be a leading provider of professional
development programs that bridge the skills gap in the job market.

ExcelR envisions a world where learners are equipped with the latest knowledge and practical
skills, enabling them to excel in their careers and contribute effectively to their organizations.
By fostering a culture of continuous learning and innovation, ExcelR strives to create a
community of skilled professionals ready to meet the challenges of an evolving workforce.

14
Mission

The mission of ExcelR generally focuses on providing accessible, high-quality education and
training that equips individuals with the skills needed to thrive in their careers. They aim to:

1. Empower Learners: Offer comprehensive training programs that enhance both technical
and soft skills.
2. Industry Relevance: Ensure that their curriculum is aligned with current industry
standards and demands.
3. Practical Experience: Emphasize hands-on learning through projects, case studies, and
real-world applications.
4. Career Growth: Support individuals in achieving their professional goals and advancing
in their careers.
5. Community Building: Foster a network of learners and industry experts for
collaboration and growth.

Values

1. Excellence and Quality: We are dedicated to maintaining high standards in course delivery,
content, and support, ensuring our programs are both relevant and effective. Quality education is
at the heart of what we do.
2. Integrity and Transparency: ExcelR believes in building trust with our students and partners
by fostering a culture of openness, honesty, and accountability in every interaction.
3. Continuous Innovation: Embracing new technologies, learning methods, and industry trends,
we strive to keep our curriculum cutting-edge, preparing students to excel in rapidly evolving
fields.
4. Student-Centric Approach: Every program and service we offer is crafted with the learner in
mind. We are committed to supporting students through mentorship, career counseling, and
resources that enhance their learning journey.
5. Collaborative Partnerships: We value collaboration and build strong relationships with
industry leaders, educational institutions, and recruiters to provide real-world experiences,
internship opportunities, and career pathways for our learners.
6. Empowerment and Growth: At ExcelR, we believe in empowering individuals to achieve their
full potential. We aim to inspire confidence in our students and provide them with the skills to
succeed in competitive job markets.

15
7. Community and Inclusion: We foster a diverse and inclusive learning environment where all
students feel supported and valued. ExcelR is committed to creating a sense of community
where students can learn, network, and grow together.

2.3 Policy of the ExcelR, in relation to the Cyber Secuirity intern role
1. Hands-on Learning and Practical Projects: Data Science interns at ExcelR engage in real-
world projects, focusing on skills such as data collection, preprocessing, analysis, and
visualization. This practical experience helps them gain proficiency in industry-standard tools
like Python, R, and SQL.
2. Mentorship and Guidance: Each intern is paired with an experienced data science mentor who
provides regular guidance, feedback, and support. Weekly check-ins are conducted to help
interns grow and stay on track with their projects.
3. Data Privacy and Ethical Standards: ExcelR requires all interns to follow strict data privacy
protocols and adhere to ethical standards when handling data. Interns are trained to ensure that all
data usage aligns with confidentiality agreements and ethical guidelines.
4. Collaboration and Teamwork: Interns are encouraged to work collaboratively, sharing ideas
and supporting team projects. ExcelR values a team-oriented environment where interns can
contribute to group brainstorming sessions and knowledge-sharing activities.
5. Regular Feedback and Skill Development: Interns receive constructive feedback through
regular performance reviews. ExcelR emphasizes continuous learning, providing resources and
guidance for interns to improve both their technical and professional skills throughout the
internship.

2.4 ExcelR Structure

1. Executive Leadership
 Chief Executive Officer (CEO): Oversees the strategic direction of ExcelR, ensuring the
organization meets its mission and goals in education and skill development.
 Head of Training and Development: Leads the curriculum and training programs, focusing
on course design, updates, and alignment with industry standards.
2. Training and Curriculum Development Department
 Curriculum Designers: Develop and continuously update course content across various
fields such as data science, software engineering, digital marketing, and business.
 Technical Instructors and Trainers: Deliver instructional sessions, oversee hands-on
training activities, and ensure that students receive comprehensive education aligned with
industry practices.
3. Mentorship and Student Support Department

16
 Mentorship Coordinators: Assign and manage mentor-student relationships, ensuring that
each learner receives personalized guidance and feedback.
 Student Support Specialists: Assist with queries, provide academic support, and help
students address challenges in their learning journey.
4. Career Services and Industry Partnerships
 Career Counselors: Offer career guidance, interview preparation, and job application
assistance to help students transition into the workforce.
 Industry Partnership Managers: Establish and maintain relationships with companies,
securing internship and job placement opportunities for learners.
5. Operations and Administration
 Administrative Team: Manages the day-to-day operations, including admissions,
scheduling, and resource allocation.
 Finance and HR: Handles budgeting, payroll, hiring, and employee management,
supporting the organizational framework.

2.5 Roles and responsibilities of the cyber security employees


1. Risk Assessment

 Identify and evaluate potential security risks to the organization’s information systems.
 Conduct regular security audits and vulnerability assessments.

2. Monitoring and Response

 Continuously monitor networks and systems for suspicious activity or breaches.


 Respond to security incidents and breaches, including investigation and mitigation.

3. Implementation of Security Measures

 Develop and implement security policies and procedures.


 Install and maintain security software, such as firewalls, intrusion detection systems, and
antivirus programs.

4. Training and Awareness

 Conduct training sessions for employees on cybersecurity best practices and awareness.
 Promote a culture of security within the organization.

5. Compliance and Regulations

 Ensure compliance with relevant laws, regulations, and standards (e.g., GDPR, HIPAA).
 Prepare documentation and reports for audits and compliance checks.

17
6. Incident Response Planning

 Develop and maintain an incident response plan for managing security breaches.
 Conduct drills and simulations to test response plans.

7. Collaboration

 Work with other IT professionals to ensure overall security of the organization's


infrastructure.
 Collaborate with law enforcement and other organizations in the event of a security
breach.

Performance of ExcelR in terms of turnover, profits, market reach and market value
1.Turnover: Look for annual revenue reports, which indicate the total sales generated by the
company. This can often be found in financial statements or industry reports.

2.Profits: Analyze net profit margins, which can show the profitability after all expenses. This
can also be found in financial statements, usually as part of the income statement.

3.Market Reach: Assess market reach by looking at the number of clients, geographic
presence, and the diversity of services offered. You might find this information in press releases
or company reports.
4.Market Value: If the company is publicly traded, market capitalization can be found by
multiplying the stock price by the total number of outstanding shares. For private companies,
estimates might be derived from funding rounds or valuations provided by investment firms.

2.7 Future Plans of the ExcelR

1.Expansion of Course Offerings: Introducing new programs or certifications in emerging


fields such as data science, AI, or cybersecurity to attract a broader audience.

2.Global Reach: Expanding into new geographical markets to tap into the growing demand for
online education and professional development worldwide.
3.Partnerships: Collaborating with universities, tech companies, or industry leaders to
enhance course credibility and offer more comprehensive training.

4.Technology Integration: Investing in new technologies such as AI, AR/VR for immersive
learning experiences, or improving the online learning platform for better user engagement.

5. Alumni Engagement: Creating networks for alumni to enhance community building and
provide continuous learning opportunities.

18
6.Corporate Training: Expanding services for corporate clients to offer tailored training
solutions for employee skill development.

1.

19
CHAPTER 3: INTERNSHIP
WEEKLY OVERVIEW OF INTERNSHIP ACTIVITIES
3.1 ACTIVITY LOG FOR THE FIRST WEEK

Date Day Brief Description of Daily Activity Learning Outcomes

Monday Gained insights into the


Familiarization with the team and company's cybersecurity
organization. goals, team structure,
and overall work culture.

Tuesday Developed a strong


Cybersecurity fundamentals training. foundation in core
cybersecurity concepts like
threats, vulnerabilities, risk
management, and incident
1stWEEK

response.
Wednesday Acquired knowledge of
Network security basics. network topologies,
protocols, and common
network attacks, such as
DDoS and port scanning.
Gained an understanding
Thursday
of ethical hacking
Penetration testing overview. techniques and tools,
including reconnaissance,
vulnerability scanning, and
exploitation.
Friday Security incident response planning. Learned about the incident
response lifecycle, roles and
responsibilities

Saturday
Preparing the topics covered in
Holiday first week

20
Signature of the Guide

WEEKLY REPORT
WEEK – 1 (From Dt………..….. to Dt………..….)

In Week 1 of my cyber security internship, I focused on building a foundational understanding of data


science concepts and essential skills that will support my projects moving forward.

Day 1: I began with an introduction to cyber security, exploring its significance and applications across
various industries. This initial exposure helped me grasp the critical role of data-driven decision-
making in today's data-centric world.

Day 2:Developed a strong foundation in core cybersecurity concepts like threats, vulnerabilities,
risk management, and incident response.

Day 3:Acquired knowledge of network topologies, protocols, and common network attacks,
such as DDoS and port scanning.

Day 4: Gained an understanding of ethical hacking techniques and tools, including


reconnaissance, vulnerability scanning, and exploitation.

Day 5:Security incident response planning.Learned about the incident response lifecycle, roles
and responsibilities

Day 6:Preparing the topics covered in first week . The importance of staying updated on the
latest cyber threats.The role of incident response teams in mitigating attacks.The basics of
penetration testing and ethical hacking.

Overall, Week 1 laid a strong foundation for my cyber security journey, equipping me with essential
skills and knowledge that will enable me to tackle more complex concepts and challenges in the
upcomingweeks.

21
3 .2 ACTIVITY LOG FOR THE SECOND WEEK

Date Day Brief Description of Daily Activity Learning Outcomes

Network vulnerability scanning. Gained hands-on experience with


Monday vulnerability scanning tools like
Nmap and Nessus to identify
potential weaknesses in the
network infrastructure.

Tuesday Web application security testing. Learned about common


webapplicationvulnerabilities
, such as SQL injection and
cross-site scripting

Wednesday Social engineering awareness. Gained insights into social


engineering tactics and how
to protect against them,
2nd WEEK

including phishing attacks


and pretexting.

Thursday Incident response simulation. Participated in a simulated


cyberattack scenario, learning
to respond effectively to
incidents and mitigate
damage

Friday Security awareness training. Developed skills in creating


and delivering security
awareness training materials
to educate employees about
cybersecurity best practices.

Saturday Holiday Preparing the topics covered


in second week

22
Signature of the Guide

WEEKLY REPORT
WEEK – 2 (From Dt………..….. to Dt………..….)

In Week 2 of my cyber security internship, I continued to build on the foundational knowledge


acquired in Week 1, focusing on vulnerability scanning, exploratory data , SQL and the application of
basic statistical concepts.

Day 1: I started the week by diving into data vulnerability scanning tools. Gained hands-on
experience with vulnerability scanning tools like Nmap and Nessus to identify potential
weaknesses in the network infrastructure. .

Day 2: The focus shifted to SQL,Learned about common webapplicationvulnerabilities, such as


SQL injection and cross-site scripting

Day 3: I learned about descriptive statistics, Gained insights into social engineering tactics and how
to protect against them, including phishing attacks and pretexting

Day 4: Building on the previous day’s learnings ,Participated in a simulated cyberattack scenario,
learning to respond effectively to incidents and mitigate damage

Day 5: I engaged in hands-on practice with real-world cyber security practices,Developed skills in
creating and delivering security awareness training materials to educate employees about
cybersecurity best practices.

Day 6: I concluded the week by reviewing the concepts learned during the week and reflecting on my
progress. I summarized my findings from the SQL conducted on the cyber security and prepared a
brief presentation to communicate my insights effectively. This exercise enhanced my ability to convey
complex information clearly and succinctly.

Overall, Week 2 expanded my skill set in data vulnerability scanning, exploratory SQL, and descriptive
statistics, providing me with practical tools to analyze cyber security tools effectively. This foundation
will be invaluable as I continue to progress in my cyber security journey.

23
3.3 ACTIVITY LOG FOR THE THIRD WEEK

Date Day Brief Description of Daily Learning Outcomes


Activity

Monday Attended a cybersecurity Learned about various threat


workshop on advanced hunting tools and
threathunting techniques. methodologies to
identifyadvanced
persistentthreats (APTs).

Tuesday Participated in a security Gainedhands-experiencein


incident response simulation. responding to various cyber
incidents, including data
breachesand ransomware
attacks.

Wednesday Conducted a vulnerability Identified common web


3rdWEEK

assessment of a web vulnerabilities like SQL


application using OWASP injection,cross-site
ZAP. scripting(XSS), and cross-site
request forgery (CSRF).

Thursday Reviewed and updated Gained insights into the


security policies and importance of regular policy
procedures. review and updates

Friday Presented a report on the Stayed updated on emerging


latest cybersecurity threats like AI-powered attacks
trends and threats. and IoT vulnerabilities.

Saturday Holiday Preparing the topics covered in


the third week

24
Signature of the Guide

WEEKLY REPORT
WEEK – 3 (From Dt………..….. to Dt………..….)

In Week 3 of my cyber security internship, I shifted my focus toward understanding data modeling,
machine learning concepts, and practical implementations using Python libraries.

Day 1: The week began with an learned about various threat hunting tools and methodologies to
identifyadvanced persistentthreats (APTs).

Day 2: I delved deeper into Gainedhands-experiencein responding to various cyber incidents,


including data breachesand ransomware attacks.

Day 3: The focus shifted to identified common web vulnerabilities like SQL injection,cross-site
scripting(XSS), and cross-site request forgery (CSRF).

Day 4: I engaged in hands-on exercises to apply the concepts learned so far. Gained insights into the
importance of regular policy review and updates.

Day 5: I learned about the importance of feature engineering and selection in the modeling process. I
explored techniques for creating new features from existing data and selecting the most relevant
features to improve model performance. This knowledge is crucial for optimizing models and ensuring
they generalize well to unseen data.

Day 6: To conclude the week, I participated in a group project where we applied the cyber security
concepts learned in the previous days. We collaborated to analyze a build models, and present our
findings to the team. This collaborative experience reinforced my understanding of the modeling
process and improved my communication skills.

Overall, Week 3 enhanced my understanding of cyber security techniques, providing me with practical
experience in implementing these concepts using Python. I am now better equipped to tackle more
complex data science challenges in the weeks ahead.

25
3.4 ACTIVITY LOG FOR THE FORTH WEEK

Date Day Brief Description of Daily Learning Outcomes


Activity
Monday Attended a cybersecurity Reinforced the importance
awareness training session for of security awareness and
employees. best practices, such as
strong password hygiene
and phishing prevention.
Tuesday conducted a network security Identified potential
audit using network scanning vulnerabilities in the
tools like Nmap and Nessus. network infrastructure,
such as open ports and
outdated software.
Wednesday Collaborated with the incident Gained hands-on
response team on a simulated experience in incident
ransomware attack. response procedures,
including containment,
eradication, and recovery.
4thWEEK

Thursday Researched and analyzed Stayed updated on the


emerging cybersecurity latest threat landscape and
threats, such as AI-powered potential impact on the
attacks and IoT vulnerabilities. organization.
Friday Presented a report on the Improved presentation
findings of the network skills and the ability to
security audit and communicate technical
recommended mitigation information to non-
strategies. technical audiences.
Saturday Holiday Preparing the topics
covered in Fourth week

26
Signature of the Guide

27
WEEKLY REPORT
WEEK – 4 (From Dt………..….. to Dt………..….)

In Week 4 of my cyber security internship, I focused on advanced cyber security techniques, model
evaluation, and deployment strategies, further solidifying my understanding of the cyber security
pipeline.
Day 1: The week began with an Reinforced the importance of security awareness and best
practices, such as strong password hygiene and phishing prevention.
Day 2: I Identified potential vulnerabilities in the network infrastructure, such as open ports and
outdated software.
Day 3: Collaborated with the incident response team on a simulated ransomware attack.Gained
hands-on experience in incident response procedures, including containment, eradication, and
recovery.
Day 4: I engaged in cross-validation techniques to ensure that my models were generalizing well to
unseen data. I implemented k-fold cross-validation and learned about its importance in providing a
more reliable estimate of model performance. This understanding is vital for developing robust models
that perform well in real-world scenarios.
Day 5: I began exploring the concept of model deployment. I learned about the various ways to deploy
cyber security models, including cloud services and APIs. I experimented with a simple deployment
using Flask to create a web application that serves predictions from my models, gaining valuable
experience in bringing models into production.
Day 6: To conclude the week, I participated in a team project focused on deploying a cyber security
model. We collaborated to prepare our model for deployment, documenting the process and creating a
presentation to share our insights and challenges faced during deployment. This collaborative
experience enhanced my understanding of the end-to-end cyber security workflow and the importance
of teamwork in data-driven projects.
Overall, Week 4 provided me with a deeper understanding of advanced cyber security techniques,
model evaluation, and deployment strategies. I gained practical experience that will be instrumental as I
continue to develop my skills in cyber security and contribute to real-world projects.

2
8
3.5 ACTIVITY LOG THE FIFTH WEEK

Date Day Brief Description of Daily Learning Outcomes


Activity
Monday Attended a cybersecurity Reinforced the importance
awareness training session of security awareness and
for employees. best practices, such as strong
password hygiene and
phishing prevention.
Tuesday Developed a Python script to Improved Python scripting
automate the process of skills and learned about
checking for outdated software vulnerability
software on endpoints. management.
Wednesday Participated in a simulated Gained insights into social
phishing attack exercise. engineering tactics and the
importance of user
5thWEEK

awareness in cybersecurity.
Thursday Analyzed network traffic Enhanced skills in network
logs to identify potential traffic analysis and threat
security threats. detection.

Friday Attended a cybersecurity Expanded knowledge of


conference and workshop. emerging threats and
mitigation techniques.

Saturday Holiday Preparing the topics covered


in fifth week

Signature of the Guide

2
9
WEEKLY REPORT
WEEK – 5 (From Dt………..….. to Dt………..….)

In Week 5 of my cyber security internship, I focused on deepening my knowledge of advanced topics


in cyber security, including natural language processing (NLP) and time series analysis, along with
practical applications of these techniques.

Day 1: The week began with an introduction to natural language processing (NLP). I learned about the
importance of NLP in data science and its applications in various fields, such as sentiment analysis and
chatbots. I explored key concepts like tokenization, stemming, and lemmatization, which are essential
for processing textual data.

Day 2: I engaged in hands-on exercises with NLP techniques, using the Natural Language Toolkit and
SpaCy libraries in Python. I practiced tokenizing sentences and analyzing word frequency in a sample
dataset. This practical experience helped solidify my understanding of how to manipulate and analyze
text data effectively.

Day 3: The focus shifted to more advanced NLP concepts, such as term frequency-inverse document
frequency and word embeddings. I learned how these techniques can be used to represent text data
numerically, enabling the use of machine learning algorithms for text classification tasks. I
implemented these methods on a sample dataset to enhance my skills.

Day 4: I introduced time series analysis, where I learned about the unique characteristics of time series
data and its importance in forecasting. I explored various time series components, such as trends,
seasonality, and cyclic behaviour, which are crucial for understanding and modeling time-dependent
data.

Day 5: I practiced implementing time series forecasting using techniques such as moving averages and
ARIMA models. I worked with real-world time series datasets, applying these methods to make
predictions and evaluate their accuracy. This hands-on experience reinforced my understanding of time
series analysis and its applications in various domains.

Day 6: To conclude the week, I participated in a project that combined NLP and time series analysis.
We analyzed trends in social media sentiment over time, applying the techniques learned throughout
the week. This collaborative project provided a comprehensive experience in integrating multiple data
science methods and highlighted the practical implications of my learnings.

Overall, Week 5 expanded my skill set by introducing advanced cyber security topics such as natural
language processing and time series analysis. The practical applications of these techniques will be
invaluable as I continue to develop my expertise in cyber security and tackle complex real-world
problems.

3
0
3.6 ACTIVITY LOG FOR THE SIXTH WEEK

Date Day Brief Description of Daily Activity Learning Outcomes

Monday Collaborated with the security Gained hands-on


team to conduct a red team experience in penetration
assessment of the organization's testing techniques and red
network infrastructure. teaming methodologies.

Tuesday Developed a security awareness Improved presentation


training program for employees. and communication skills
and learned about
effective security
awareness strategies.
Wednesday Implemented a security Gained knowledge of
information and event SIEM technologies and
management (SIEM) system. their role in threat
detection and incident
response.
6thWEEK

Thursday Participated in a security Enhanced incident


incident response drill. response skills and
learned about effective
communication and
coordination during
security incidents.
Friday Presented a final project on Improved presentation
[project topic, e.g., "Improving skills and learned about
the Organization's Security effective project
Posture through Automation"]. management techniques.
Saturday Holiday Preparing the topics
covered in sixth week

Signature of the Guide


3
1
WEEKLY REPORT
WEEK – 6 (From Dt………..….. to Dt………..….)

In Week 6 of my cyber security internship, I focused on enhancing my skills in data visualization,


exploring advanced data handling techniques, and working on projects that integrate the concepts
learned in previous weeks.

Day 1: The week began with an introduction to advanced data visualization techniques. I learned about
the importance of effectively communicating insights through visual representations of data. I explored
various libraries such as Matplotlib, Seaborn, and Plotly to create interactive and informative
visualizations.

Day 2: I engaged in hands-on practice by creating a variety of visualizations, including scatter plots,
box plots, and heat maps. I focused on selecting appropriate visualization types based on the data
characteristics and the message I wanted to convey. This practice helped me appreciate the power of
visual storytelling in cyber security.

Day 3: I delved into the topic of data wrangling, learning how to handle and preprocess large datasets. I
practiced using libraries like Pandas to clean, merge, and reshape data efficiently. Understanding how
to manipulate data at scale is essential for preparing datasets for analysis and modeling.

Day 4: The focus shifted to handling missing data and outliers, where I explored various strategies for
imputation and detection. I learned about the potential impacts of missing values and outliers on
analysis and modeling, and practiced implementing techniques to address these challenges in real-
world datasets.

Day 5: I applied my data wrangling and visualization skills to a project involving a comprehensive
analysis of a large dataset. I cleaned the data, performed exploratory analysis, and created
visualizations to summarize my findings. This project reinforced the importance of thorough data
preparation and effective communication of insights.

Day 6: To conclude the week, I participated in a collaborative project where we presented our analysis
and visualizations to the team. This experience not only enhanced my presentation skills but also
highlighted the value of teamwork in cyber security projects. Receiving feedback from peers allowed
me to refine my approach and improve my work.

Overall, Week 6 provided me with valuable experience in advanced data visualization and data
wrangling techniques. I strengthened my ability to analyze and present data effectively, which is crucial
for making informed decisions based on data insights. As I progress in my internship, I look forward to
applying these skills to more complex data science challenges.

3
2
3.7 ACTIVITY LOG FOR THE SEVENTH WEEK

Date Day Brief Description of Daily Learning Outcomes


Activity
Monday Conducted a security audit Gained hands-on experience
of the organization's cloud in cloud security assessments
infrastructure. and best practices.

Tuesday Developed a script to Improved scripting skills and


automate the process of learned about automated
patching vulnerabilities in vulnerability management.
endpoint devices.
Wednesday Participated in a tabletop Enhanced incident response
7thWEEK

exercise to simulate a skills and learned about


ransomware attack. effective communication
during a crisis.

Thursday Analyzed security logs to Improved log analysis skills


detect unusual activity and and learned about threat
potential threats. hunting techniques.

Friday Presented a final report Improved report writing and


summarizing the internship presentation skills.
experience and key
learnings.
Saturday Holiday Preparing the topics covered
in seventh week

Signature of the Guide

3
3
WEEKLY REPORT

WEEK – 7 (From Dt………..….. to Dt………..….)

In Week 7 of my cyber security internship, I concentrated on real-world applications of cyber security,


exploring model deployment best practices, and gaining experience with collaborative tools in cyber
security projects.

Day 1: The week began with an overview of real-world cyber security applications across various
industries, such as finance, healthcare, and marketing. I learned about case studies that highlighted how
organizations leverage machine learning to solve complex problems and drive decision-making.

Day 2: I focused on the deployment of cyber security models, understanding the various environments
where models can be deployed, such as cloud platforms (AWS, Google Cloud) and local servers. I
learned about the importance of creating reproducible environments using tools like Docker to ensure
consistency across different stages of development and deployment.

Day 3: I engaged in a practical session on deploying a machine learning model as a Restful API using
Flask. This hands-on experience taught me how to expose model predictions through an API, enabling
other applications to interact with my model. I also learned about version control using Git, which is
essential for managing code changes and collaborating effectively with team members.

Day 4: The focus shifted to monitoring and maintaining deployed models. I explored techniques for
tracking model performance over time, understanding drift, and retraining models when necessary.
This knowledge is critical for ensuring that models continue to deliver accurate predictions in changing
environments.

Day 5: I worked on a group project where we deployed a cyber security model to a cloud platform.
This project involved preparing the model, creating the API, and documenting the deployment process.
Collaborating with my teammates on this project helped me apply my learning in a practical context
and reinforced the importance of teamwork in data science.

Day 6: To conclude the week, we presented our project to the team, showcasing our deployed model
and discussing the challenges we faced during the process. This presentation not only allowed me to
refine my communication skills but also provided valuable feedback from mentors and peers, which I
can incorporate into future projects.

Overall, Week 7 was instrumental in bridging the gap between theoretical knowledge and practical
application in cyber security. I gained hands-on experience in deploying models and learned best
practices for maintaining and monitoring them in real-world settings. This week has prepared me for
the complexities of implementing cyber security solutions in professional environments.

3
4
3.8 ACTIVITY LOG FOR THE EIGHTH WEEK

Date Day Brief Description of Daily Learning Outcomes


Activity
Monday Conducted a security assessment of Gained hands-on
the organization's mobile experience in mobile
applications. application security testing
and best practices.
Tuesday Developed a security Improved communication
awareness campaign to and presentation skills and
educate employees about learned about effective
social engineering tactics. security awareness
strategies.
Wednesday Implemented a security Gained knowledge of
orchestration, automation, and SOAR technologies and
response (SOAR) platform. their role in improving
incident response
efficiency.
8thWEEK

Thursday Analyzed threat intelligence Improved threat


reports to identify emerging intelligence analysis skills
threats and vulnerabilities. and learned about proactive
security measures.
Friday Presented a final presentation Improved presentation
summarizing the internship skills and learned about
experience and key effective communication
accomplishments. techniques.
Saturday Holiday Preparing the topics
covered in eighth week

Signature of the Guide

3
5
WEEKLY REPORT

WEEK – 8 (From Dt………..….. to Dt………..….)

In Week 8 of my cyber security internship, I focused on finalizing projects, reflecting on my internship


experience, and preparing for the transition to future opportunities in the field of cyber security.

Day 1: The week began with wrapping up ongoing projects. I reviewed the models I had built and
deployed throughout my internship, ensuring that they were functioning correctly and meeting
performance expectations. This involved conducting final tests to validate the models and their
predictions against new data.

Day 2: I dedicated this day to compiling comprehensive documentation for each project I worked on
during my internship. I focused on detailing the methodologies used, data sources, code snippets, and
insights gained from the analyses. Proper documentation is crucial for sharing knowledge with future
team members and for maintaining project continuity.

Day 3: I participated in a knowledge-sharing session with my colleagues, where we discussed our


individual projects and the lessons learned throughout the internship. This collaborative atmosphere
allowed for exchanging ideas and techniques, fostering a deeper understanding of different approaches
to data science problems.

Day 4: As part of my professional development, I focused on preparing my portfolio. I compiled my


best work, including completed projects, visualizations, and code samples, showcasing my skills to
potential employers. I also updated my resume to reflect the experiences and skills I gained during my
internship.

Day 5: I dedicated this day to reflecting on my internship experience, evaluating my growth, challenges
faced, and skills acquired over the past eight weeks. I made notes on areas for further improvement and
additional skills I want to pursue as I continue my career in data science.

Day 6: To conclude the internship, I scheduled a feedback session with my supervisor and mentors. We
discussed my performance, areas of strength, and opportunities for improvement. Receiving
constructive feedback was invaluable, as it provided me with a clearer path for my continued
professional development in cyber security.

Overall, Week 8 served as a culmination of my internship experience, allowing me to finalize projects,


reflect on my learning journey, and prepare for future opportunities. I left the internship with a solid
foundation in data science, valuable industry experience, and a clearer vision of my career path ahead.
This week underscored the importance of continuous learning and adaptation in the ever-evolving field
3
6
of cyber security.

CHAPTER 4: PROJECT
4.1 Title of the Project : Vulnerability scanning and Reporting

4.2 Project Description:

 The primary goal of this project is to identify and assess potential vulnerabilities within
the organization's network infrastructure and web applications. By conducting regular
vulnerability scans and generating detailed reports, we aim to:
 Proactively identify security weaknesses: Discover and document vulnerabilities before
malicious actors can exploit them.
 Prioritize remediation efforts: Focus on critical vulnerabilities that pose the greatest
risk to the organization.
 Improve overall security posture: Strengthen the organization's security posture by
addressing identified vulnerabilities.
 Comply with industry regulations: Ensure compliance with relevant security standards
and regulations.

4.3 Methodology:

1. Identify Target Systems:

o Determine the scope of the scan, including network devices, servers, and web
applications.

2. Select Vulnerability Scanning Tools:

o Choose appropriate tools based on the target systems and desired level of detail,
such as:

 Network Scanners: Nmap, Nessus


 Web Application Scanners: OWASP ZAP, Burp Suite

3. Conduct Vulnerability Scans:

o Execute scans to identify vulnerabilities like:

 Weak passwords
 Missing security patches
 Insecure configurations
 Web application vulnerabilities (SQL injection, XSS, CSRF)

3
7
4. Analyze Scan Results:

o Review scan reports to identify critical vulnerabilities and potential threats.


o Prioritize vulnerabilities based on severity and potential impact.

5. Generate Detailed Reports:

o Create comprehensive reports that include:

 List of identified vulnerabilities


 Severity ratings
 Detailed descriptions
 Remediation recommendations
 Potential impact assessments

6. Coordinate Remediation Efforts:

o Work with relevant teams to schedule and implement remediation actions.

7. Schedule Regular Scans:

o Establish a regular scanning schedule to ensure ongoing monitoring and


vulnerability identification.

4.4 Expected Outcomes:

 Identified Vulnerabilities: A comprehensive list of vulnerabilities, categorized by


severity.
 Detailed Reports: Well-structured reports with clear recommendations.
 Remediated Vulnerabilities: Timely remediation of critical vulnerabilities.
 Improved Security Posture: A more secure network and web application infrastructure.
 Compliance with Regulations: Adherence to industry standards and regulations.

4.5 Report Structure:

1. Executive Summary:

 Overview of the project and its objectives


 Summary of key findings and recommendations

2. Methodology:

 Description of the vulnerability scanning tools and techniques used


 Scope of the scan
 Scanning schedule
3
8
3. Vulnerability Findings:

 Detailed description of each identified vulnerability


 Severity rating (e.g., critical, high, medium, low)
 Potential impact on the organization
 Remediation recommendations

4. Overall Risk Assessment:

 Assessment of the overall security risk to the organization


 Prioritization of vulnerabilities based on risk level

5. Recommendations:

 Specific recommendations for addressing identified vulnerabilities


 Recommendations for improving the organization's security posture

6. Conclusion:

 Summary of key findings and recommendations


 Future recommendations for ongoing vulnerability management

4.6 Future Recommendations:

 Expand the Scope: Extend vulnerability scanning to additional systems and applications.
 Automate the Process: Implement automated vulnerability scanning and reporting tools.
 Integrate with Security Information and Event Management (SIEM) Systems:
Correlate vulnerability findings with security events to identify potential threats.
 Stay Updated with Latest Threats: Continuously monitor the threat landscape and
update security controls accordingly.
 Foster a Culture of Security: Encourage employees to report security incidents and
adopt security best practices.

3
9
CHAPTER 5: OUTCOMES DESCRIPTION

During my individual online data science internship with ExcelR, I experienced a structured and
supportive virtual work environment that emphasized clear communication and self-directed learning.
The internship was designed to promote independent engagement while providing ample resources
through digital platforms.

People Interactions: Though primarily individual, I interacted with mentors through regular video
calls and messaging platforms, creating an encouraging atmosphere for guidance and feedback.

Facilities Available and Maintenance: The virtual setup offered access to essential resources,
including data analysis tools and online courses, all within a well-maintained digital workspace.

Clarity of Job Roles: The expectations and responsibilities of the internship were clearly defined,
enabling me to focus effectively on tasks such as data cleaning and model development.

Protocols, Procedures, and Processes: Structured workflows with clear protocols facilitated smooth
progress through various stages of data analysis and model deployment.

Time Management: I developed a personal schedule to balance project tasks and learning objectives,
ensuring I stayed organized and met deadlines efficiently.

Harmonious Relationships and Socialization: While working independently, I participated in virtual


networking events that enhanced my experience and fostered a sense of community.

Mutual Support and Teamwork: I was encouraged to seek support when needed, receiving timely
assistance and constructive feedback from mentors, which was invaluable for my growth.

Motivation: The motivating environment focused on professional development and allowed me to


engage with materials at my own pace, fostering ownership of my learning experience.

In summary, my individual online internship with ExcelR provided a supportive virtual work
environment that encouraged self-directed learning and professional growth, significantly contributing
to my development in cyber security.

4
0
Student Self-Evaluation of the Short-Term Internship

Student Name:

Registration No:

Duration of Internship:

From: To :

Date of Evaluation:

Organization Name & Address:

Please rate your performance in the following areas:

Rating Scale: Letter grade of CGPA calculation to be provided

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Interaction ability with the community 1 2 3 4 5
4 Positive Attitude 1 2 3 4 5
5 Self-confidence 1 2 3 4 5
6 Ability to learn 1 2 3 4 5
7 Work Plan and Organization 1 2 3 4 5
8 Quality of work done 1 2 3 4 5
9 Time Management 1 2 3 4 5
10 Achievement of Desired Outcomes 1 2 3 4 5
OVERALL PERFORMANCE

Student Signature
4
1
Evaluation by the Supervisor of the Intern Organization

Student Name:

Registration No:

Duration of Internship:

From: To :

Date of Evaluation:

Organization Name & Address:

Name & Address of the Supervisor with Mobile Number

Please rate the student’s performance in the following areas:

Please note that your evaluation shall be done independent of the Student’s self-evaluation

Rating Scale: 1 is the lowest and 5 is the highest rank

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Interaction ability with the community 1 2 3 4 5
4 Positive Attitude 1 2 3 4 5
5 Self-confidence 1 2 3 4 5
6 Ability to learn 1 2 3 4 5
7 Work Plan and Organization 1 2 3 4 5
8 Quality of work done 1 2 3 4 5
9 Time Management 1 2 3 4 5
10 Achievement of Desired Outcomes 1 2 3 4 5
OVERALL PERFORMANCE

Signature of the Supervisor


4
2
PHOTOS & VIDEO LINK
INTERNSHIP PHOTOS

4
3
4
4
PROJECT PHOTOS

4
5
4
6
CONCLUSION

My individual online internship with ExcelR in cyber security was a transformative


experience, offering both theoretical knowledge and practical application. A highlight of
this internship was completing a project on Titanic survival prediction, where I applied
various cyber security techniques, including vulnerability scanning, security, and model
development. This project not only strengthened my understanding of predictive analytics
but also gave me hands-on experience in working with real-world models.
Additionally, the internship enhanced my ability to work independently, teaching me to
manage time effectively and approach problem-solving methodically. The structured
guidance provided by mentors allowed me to explore advanced concepts in cyber security,
such as model optimization and evaluation, while the flexibility of the online format
encouraged self-directed learning and deep engagement with the material.
Overall, this internship has been instrumental in my professional growth, significantly
contributing to my readiness for future roles in cyber security. The combination of
theoretical learning, practical application, and personal development has prepared me to
confidently tackle complex data challenges in real-world scenarios.

4
7
References&Links

Book References:
 “The Art of invisibility” by Kevin Mitnick

 “Cyber security Dummies” by Joseph Menn

 “Hacking:The Art of Exploitation” by Jon Erickson

Links

. https://onlinelearning.excelr.com/classrooms/6697
. https://onlinrlearning.excelr.com/classrooms/6697/player?page=648788
. https://www.excelr.com

4
8
4
9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy