Final (3) - 1
Final (3) - 1
Final (3) - 1
BACHELOR OF TECHNOLOGY
In
Submitted by:
Recognized by UGC under the sections 2(f) and 12(B)of the UGC act 1956
Aditya Nagar, ADB Road –Surampalem 533437, E.G. Dist., A.P.,
2024-2025.
1
ADITYA COLLEGE OF ENGINEERING & TECHNOLOGY (A)
Approved by AICTE, Permanently Affiliated to JNTUK & Accredited by NAAC with ‘A+’ Grade
Recognized by UGC under the sections 2(f) and 12(B) of the UGC act 1956
Aditya Nagar, ADB Road - Surampalem – 533437, E.G.Dist., A.P.,
CERTIFICATE
This is to certify that the Internship report entitled “CYBER SECURITY” is being submitted by
Melam Durga Chandrika bearing (21P31A0224), in partial fulfillment for the award of the Degree
of Bachelor of Technology, during the year 2024- 2025 in Electrical and Electronics Engineering
of Aditya College Of Engineering and Technology, for the record of bonafide work carried out by
him.
2
DECLARATION
I hereby declare that the Internship entitled “Cyber Security” is a genuine report. This work has
been submitted to the ADITYA COLLEGE OF ENGINEERING & TECHNOLOGY (A),
Surampalem, permanently affiliated to JNTUK, KAKINADA in partial fulfillment of the B.Tech
degree.
I also hereby declare that this internship report is not submitted in full or partial to any other
university for any degree.
3
Institute Vision & Mission
4
DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING
Mission:
Provide state-of-art infrastructure to impart technical skills in the frontier areas of electrical and
electronics engineering.
Enable innovative teaching and learning process with collaboration.
To raise professionals, academicians, researchers and entrepreneurs with a passion for solving
societal problems.
5
DEPARTMENT OF ELECTRICAL & ELECTRONICS ENGINEERING
PEO1: Pursue a successful career by demonstrating the knowledge acquired in Electrical and
Electronics Engineering.
PEO2 : Exhibit technical skills in solving real world problems using emerging technologies
considering societal, technological and business challenges.
PEO3 : Engage in professional practice as individuals and as team members with ethical values and
attitude of lifelong learning.
6
Program Outcomes (POs):
7
Head of the Department
PSO1: Provide solid foundation in mathematical, scientific, and engineering fundamentals which is
required to solve electrical and electronics engineering problems.
PSO2 : Understand, analyze, simulate, design, and implement the electrical power systems, modern
electrical drives, modern lighting systems, and automation of systems using state of art components,
software tools and ICT.
8
COMPLETION CERTIFICATE
9
ACKNOWLEDGEMENT
I offer my sincere thanks to the dynamic and beloved Principal, Dr. A. Ramesh, M.Tech;Ph.D,
My sincere thanks to Dr.M Ravendra, M.Tech., Ph.D, Head of the Department of Electrical and
Electronics Engineering for his valuable support.
Sr.Assistent Professor, Department of Electrical and Electronics Engineering, for her valuable guidance
and encouragement which has been helpful in the successful completion of this internship.
With immense pleasure, I would like to express my deep sense and heart full thanks to the
management of Aditya College of Engineering & Technology (A).
10
Learning Objectives / Internship Objectives
Technical Skills
Knowledge Acquisition
Soft Skills
Project Management
Personal Development
11
1. Critical Thinking: Develop critical thinking skills to assess security situations and make
informed decisions based on available data and best practices.
2. Ethical Considerations: Understand the ethical implications of cybersecurity practices and
the importance of maintaining integrity and professionalism in the field
TABLE OF CONTENTS
12
5 Outcomes Descriptions 37
During my internship in Cyber Security with ExcelR I had the opportunity to enhance my technical and
analytical skills while working on real-world projects in the data science domain.The cybersecurity
internship program aims to provide hands-on experience and practical training for students or
recent graduates interested in pursuing a career in cybersecurity. Through a combination of
technical training, real-world project involvement, and mentorship, interns will develop
essential skills and knowledge to address contemporary cybersecurity challenges.
Skill Development: Equip interns with critical technical skills in areas such as network
security,incident response, and vulnerability assessment. Interns will gain proficiency in using
industry-standard tools and technologies.
13
Conclusion: This cybersecurity internship program not only serves to enhance the technical
capabilities of aspiring cybersecurity professionals but also contributes to the organization's
overall security posture. By investing in the next generation of cybersecurity talent, we aim to
build a more secure digital environment while fostering innovation and continuous
improvement in our security practices.
ExcelR is known for its industry-relevant curriculum, experienced trainers, and a strong
emphasis on practical learning through projects and case studies. Their programs are aimed at
both beginners looking to start a new career and professionals seeking to upskill or transition
into new roles.
In addition to training, ExcelR often engages in workshops, webinars, and corporate training
sessions, catering to the needs of different learners and organizations. Their mission is to
empower individuals with the knowledge and skills necessary for career advancement and
success.
Vision
The vision of ExcelR typically revolves around empowering individuals and organizations
through high-quality education and training. They aim to be a leading provider of professional
development programs that bridge the skills gap in the job market.
ExcelR envisions a world where learners are equipped with the latest knowledge and practical
skills, enabling them to excel in their careers and contribute effectively to their organizations.
By fostering a culture of continuous learning and innovation, ExcelR strives to create a
community of skilled professionals ready to meet the challenges of an evolving workforce.
14
Mission
The mission of ExcelR generally focuses on providing accessible, high-quality education and
training that equips individuals with the skills needed to thrive in their careers. They aim to:
1. Empower Learners: Offer comprehensive training programs that enhance both technical
and soft skills.
2. Industry Relevance: Ensure that their curriculum is aligned with current industry
standards and demands.
3. Practical Experience: Emphasize hands-on learning through projects, case studies, and
real-world applications.
4. Career Growth: Support individuals in achieving their professional goals and advancing
in their careers.
5. Community Building: Foster a network of learners and industry experts for
collaboration and growth.
Values
1. Excellence and Quality: We are dedicated to maintaining high standards in course delivery,
content, and support, ensuring our programs are both relevant and effective. Quality education is
at the heart of what we do.
2. Integrity and Transparency: ExcelR believes in building trust with our students and partners
by fostering a culture of openness, honesty, and accountability in every interaction.
3. Continuous Innovation: Embracing new technologies, learning methods, and industry trends,
we strive to keep our curriculum cutting-edge, preparing students to excel in rapidly evolving
fields.
4. Student-Centric Approach: Every program and service we offer is crafted with the learner in
mind. We are committed to supporting students through mentorship, career counseling, and
resources that enhance their learning journey.
5. Collaborative Partnerships: We value collaboration and build strong relationships with
industry leaders, educational institutions, and recruiters to provide real-world experiences,
internship opportunities, and career pathways for our learners.
6. Empowerment and Growth: At ExcelR, we believe in empowering individuals to achieve their
full potential. We aim to inspire confidence in our students and provide them with the skills to
succeed in competitive job markets.
15
7. Community and Inclusion: We foster a diverse and inclusive learning environment where all
students feel supported and valued. ExcelR is committed to creating a sense of community
where students can learn, network, and grow together.
2.3 Policy of the ExcelR, in relation to the Cyber Secuirity intern role
1. Hands-on Learning and Practical Projects: Data Science interns at ExcelR engage in real-
world projects, focusing on skills such as data collection, preprocessing, analysis, and
visualization. This practical experience helps them gain proficiency in industry-standard tools
like Python, R, and SQL.
2. Mentorship and Guidance: Each intern is paired with an experienced data science mentor who
provides regular guidance, feedback, and support. Weekly check-ins are conducted to help
interns grow and stay on track with their projects.
3. Data Privacy and Ethical Standards: ExcelR requires all interns to follow strict data privacy
protocols and adhere to ethical standards when handling data. Interns are trained to ensure that all
data usage aligns with confidentiality agreements and ethical guidelines.
4. Collaboration and Teamwork: Interns are encouraged to work collaboratively, sharing ideas
and supporting team projects. ExcelR values a team-oriented environment where interns can
contribute to group brainstorming sessions and knowledge-sharing activities.
5. Regular Feedback and Skill Development: Interns receive constructive feedback through
regular performance reviews. ExcelR emphasizes continuous learning, providing resources and
guidance for interns to improve both their technical and professional skills throughout the
internship.
1. Executive Leadership
Chief Executive Officer (CEO): Oversees the strategic direction of ExcelR, ensuring the
organization meets its mission and goals in education and skill development.
Head of Training and Development: Leads the curriculum and training programs, focusing
on course design, updates, and alignment with industry standards.
2. Training and Curriculum Development Department
Curriculum Designers: Develop and continuously update course content across various
fields such as data science, software engineering, digital marketing, and business.
Technical Instructors and Trainers: Deliver instructional sessions, oversee hands-on
training activities, and ensure that students receive comprehensive education aligned with
industry practices.
3. Mentorship and Student Support Department
16
Mentorship Coordinators: Assign and manage mentor-student relationships, ensuring that
each learner receives personalized guidance and feedback.
Student Support Specialists: Assist with queries, provide academic support, and help
students address challenges in their learning journey.
4. Career Services and Industry Partnerships
Career Counselors: Offer career guidance, interview preparation, and job application
assistance to help students transition into the workforce.
Industry Partnership Managers: Establish and maintain relationships with companies,
securing internship and job placement opportunities for learners.
5. Operations and Administration
Administrative Team: Manages the day-to-day operations, including admissions,
scheduling, and resource allocation.
Finance and HR: Handles budgeting, payroll, hiring, and employee management,
supporting the organizational framework.
Identify and evaluate potential security risks to the organization’s information systems.
Conduct regular security audits and vulnerability assessments.
Conduct training sessions for employees on cybersecurity best practices and awareness.
Promote a culture of security within the organization.
Ensure compliance with relevant laws, regulations, and standards (e.g., GDPR, HIPAA).
Prepare documentation and reports for audits and compliance checks.
17
6. Incident Response Planning
Develop and maintain an incident response plan for managing security breaches.
Conduct drills and simulations to test response plans.
7. Collaboration
Performance of ExcelR in terms of turnover, profits, market reach and market value
1.Turnover: Look for annual revenue reports, which indicate the total sales generated by the
company. This can often be found in financial statements or industry reports.
2.Profits: Analyze net profit margins, which can show the profitability after all expenses. This
can also be found in financial statements, usually as part of the income statement.
3.Market Reach: Assess market reach by looking at the number of clients, geographic
presence, and the diversity of services offered. You might find this information in press releases
or company reports.
4.Market Value: If the company is publicly traded, market capitalization can be found by
multiplying the stock price by the total number of outstanding shares. For private companies,
estimates might be derived from funding rounds or valuations provided by investment firms.
2.Global Reach: Expanding into new geographical markets to tap into the growing demand for
online education and professional development worldwide.
3.Partnerships: Collaborating with universities, tech companies, or industry leaders to
enhance course credibility and offer more comprehensive training.
4.Technology Integration: Investing in new technologies such as AI, AR/VR for immersive
learning experiences, or improving the online learning platform for better user engagement.
5. Alumni Engagement: Creating networks for alumni to enhance community building and
provide continuous learning opportunities.
18
6.Corporate Training: Expanding services for corporate clients to offer tailored training
solutions for employee skill development.
1.
19
CHAPTER 3: INTERNSHIP
WEEKLY OVERVIEW OF INTERNSHIP ACTIVITIES
3.1 ACTIVITY LOG FOR THE FIRST WEEK
response.
Wednesday Acquired knowledge of
Network security basics. network topologies,
protocols, and common
network attacks, such as
DDoS and port scanning.
Gained an understanding
Thursday
of ethical hacking
Penetration testing overview. techniques and tools,
including reconnaissance,
vulnerability scanning, and
exploitation.
Friday Security incident response planning. Learned about the incident
response lifecycle, roles and
responsibilities
Saturday
Preparing the topics covered in
Holiday first week
20
Signature of the Guide
WEEKLY REPORT
WEEK – 1 (From Dt………..….. to Dt………..….)
Day 1: I began with an introduction to cyber security, exploring its significance and applications across
various industries. This initial exposure helped me grasp the critical role of data-driven decision-
making in today's data-centric world.
Day 2:Developed a strong foundation in core cybersecurity concepts like threats, vulnerabilities,
risk management, and incident response.
Day 3:Acquired knowledge of network topologies, protocols, and common network attacks,
such as DDoS and port scanning.
Day 5:Security incident response planning.Learned about the incident response lifecycle, roles
and responsibilities
Day 6:Preparing the topics covered in first week . The importance of staying updated on the
latest cyber threats.The role of incident response teams in mitigating attacks.The basics of
penetration testing and ethical hacking.
Overall, Week 1 laid a strong foundation for my cyber security journey, equipping me with essential
skills and knowledge that will enable me to tackle more complex concepts and challenges in the
upcomingweeks.
21
3 .2 ACTIVITY LOG FOR THE SECOND WEEK
22
Signature of the Guide
WEEKLY REPORT
WEEK – 2 (From Dt………..….. to Dt………..….)
Day 1: I started the week by diving into data vulnerability scanning tools. Gained hands-on
experience with vulnerability scanning tools like Nmap and Nessus to identify potential
weaknesses in the network infrastructure. .
Day 3: I learned about descriptive statistics, Gained insights into social engineering tactics and how
to protect against them, including phishing attacks and pretexting
Day 4: Building on the previous day’s learnings ,Participated in a simulated cyberattack scenario,
learning to respond effectively to incidents and mitigate damage
Day 5: I engaged in hands-on practice with real-world cyber security practices,Developed skills in
creating and delivering security awareness training materials to educate employees about
cybersecurity best practices.
Day 6: I concluded the week by reviewing the concepts learned during the week and reflecting on my
progress. I summarized my findings from the SQL conducted on the cyber security and prepared a
brief presentation to communicate my insights effectively. This exercise enhanced my ability to convey
complex information clearly and succinctly.
Overall, Week 2 expanded my skill set in data vulnerability scanning, exploratory SQL, and descriptive
statistics, providing me with practical tools to analyze cyber security tools effectively. This foundation
will be invaluable as I continue to progress in my cyber security journey.
23
3.3 ACTIVITY LOG FOR THE THIRD WEEK
24
Signature of the Guide
WEEKLY REPORT
WEEK – 3 (From Dt………..….. to Dt………..….)
In Week 3 of my cyber security internship, I shifted my focus toward understanding data modeling,
machine learning concepts, and practical implementations using Python libraries.
Day 1: The week began with an learned about various threat hunting tools and methodologies to
identifyadvanced persistentthreats (APTs).
Day 3: The focus shifted to identified common web vulnerabilities like SQL injection,cross-site
scripting(XSS), and cross-site request forgery (CSRF).
Day 4: I engaged in hands-on exercises to apply the concepts learned so far. Gained insights into the
importance of regular policy review and updates.
Day 5: I learned about the importance of feature engineering and selection in the modeling process. I
explored techniques for creating new features from existing data and selecting the most relevant
features to improve model performance. This knowledge is crucial for optimizing models and ensuring
they generalize well to unseen data.
Day 6: To conclude the week, I participated in a group project where we applied the cyber security
concepts learned in the previous days. We collaborated to analyze a build models, and present our
findings to the team. This collaborative experience reinforced my understanding of the modeling
process and improved my communication skills.
Overall, Week 3 enhanced my understanding of cyber security techniques, providing me with practical
experience in implementing these concepts using Python. I am now better equipped to tackle more
complex data science challenges in the weeks ahead.
25
3.4 ACTIVITY LOG FOR THE FORTH WEEK
26
Signature of the Guide
27
WEEKLY REPORT
WEEK – 4 (From Dt………..….. to Dt………..….)
In Week 4 of my cyber security internship, I focused on advanced cyber security techniques, model
evaluation, and deployment strategies, further solidifying my understanding of the cyber security
pipeline.
Day 1: The week began with an Reinforced the importance of security awareness and best
practices, such as strong password hygiene and phishing prevention.
Day 2: I Identified potential vulnerabilities in the network infrastructure, such as open ports and
outdated software.
Day 3: Collaborated with the incident response team on a simulated ransomware attack.Gained
hands-on experience in incident response procedures, including containment, eradication, and
recovery.
Day 4: I engaged in cross-validation techniques to ensure that my models were generalizing well to
unseen data. I implemented k-fold cross-validation and learned about its importance in providing a
more reliable estimate of model performance. This understanding is vital for developing robust models
that perform well in real-world scenarios.
Day 5: I began exploring the concept of model deployment. I learned about the various ways to deploy
cyber security models, including cloud services and APIs. I experimented with a simple deployment
using Flask to create a web application that serves predictions from my models, gaining valuable
experience in bringing models into production.
Day 6: To conclude the week, I participated in a team project focused on deploying a cyber security
model. We collaborated to prepare our model for deployment, documenting the process and creating a
presentation to share our insights and challenges faced during deployment. This collaborative
experience enhanced my understanding of the end-to-end cyber security workflow and the importance
of teamwork in data-driven projects.
Overall, Week 4 provided me with a deeper understanding of advanced cyber security techniques,
model evaluation, and deployment strategies. I gained practical experience that will be instrumental as I
continue to develop my skills in cyber security and contribute to real-world projects.
2
8
3.5 ACTIVITY LOG THE FIFTH WEEK
awareness in cybersecurity.
Thursday Analyzed network traffic Enhanced skills in network
logs to identify potential traffic analysis and threat
security threats. detection.
2
9
WEEKLY REPORT
WEEK – 5 (From Dt………..….. to Dt………..….)
Day 1: The week began with an introduction to natural language processing (NLP). I learned about the
importance of NLP in data science and its applications in various fields, such as sentiment analysis and
chatbots. I explored key concepts like tokenization, stemming, and lemmatization, which are essential
for processing textual data.
Day 2: I engaged in hands-on exercises with NLP techniques, using the Natural Language Toolkit and
SpaCy libraries in Python. I practiced tokenizing sentences and analyzing word frequency in a sample
dataset. This practical experience helped solidify my understanding of how to manipulate and analyze
text data effectively.
Day 3: The focus shifted to more advanced NLP concepts, such as term frequency-inverse document
frequency and word embeddings. I learned how these techniques can be used to represent text data
numerically, enabling the use of machine learning algorithms for text classification tasks. I
implemented these methods on a sample dataset to enhance my skills.
Day 4: I introduced time series analysis, where I learned about the unique characteristics of time series
data and its importance in forecasting. I explored various time series components, such as trends,
seasonality, and cyclic behaviour, which are crucial for understanding and modeling time-dependent
data.
Day 5: I practiced implementing time series forecasting using techniques such as moving averages and
ARIMA models. I worked with real-world time series datasets, applying these methods to make
predictions and evaluate their accuracy. This hands-on experience reinforced my understanding of time
series analysis and its applications in various domains.
Day 6: To conclude the week, I participated in a project that combined NLP and time series analysis.
We analyzed trends in social media sentiment over time, applying the techniques learned throughout
the week. This collaborative project provided a comprehensive experience in integrating multiple data
science methods and highlighted the practical implications of my learnings.
Overall, Week 5 expanded my skill set by introducing advanced cyber security topics such as natural
language processing and time series analysis. The practical applications of these techniques will be
invaluable as I continue to develop my expertise in cyber security and tackle complex real-world
problems.
3
0
3.6 ACTIVITY LOG FOR THE SIXTH WEEK
Day 1: The week began with an introduction to advanced data visualization techniques. I learned about
the importance of effectively communicating insights through visual representations of data. I explored
various libraries such as Matplotlib, Seaborn, and Plotly to create interactive and informative
visualizations.
Day 2: I engaged in hands-on practice by creating a variety of visualizations, including scatter plots,
box plots, and heat maps. I focused on selecting appropriate visualization types based on the data
characteristics and the message I wanted to convey. This practice helped me appreciate the power of
visual storytelling in cyber security.
Day 3: I delved into the topic of data wrangling, learning how to handle and preprocess large datasets. I
practiced using libraries like Pandas to clean, merge, and reshape data efficiently. Understanding how
to manipulate data at scale is essential for preparing datasets for analysis and modeling.
Day 4: The focus shifted to handling missing data and outliers, where I explored various strategies for
imputation and detection. I learned about the potential impacts of missing values and outliers on
analysis and modeling, and practiced implementing techniques to address these challenges in real-
world datasets.
Day 5: I applied my data wrangling and visualization skills to a project involving a comprehensive
analysis of a large dataset. I cleaned the data, performed exploratory analysis, and created
visualizations to summarize my findings. This project reinforced the importance of thorough data
preparation and effective communication of insights.
Day 6: To conclude the week, I participated in a collaborative project where we presented our analysis
and visualizations to the team. This experience not only enhanced my presentation skills but also
highlighted the value of teamwork in cyber security projects. Receiving feedback from peers allowed
me to refine my approach and improve my work.
Overall, Week 6 provided me with valuable experience in advanced data visualization and data
wrangling techniques. I strengthened my ability to analyze and present data effectively, which is crucial
for making informed decisions based on data insights. As I progress in my internship, I look forward to
applying these skills to more complex data science challenges.
3
2
3.7 ACTIVITY LOG FOR THE SEVENTH WEEK
3
3
WEEKLY REPORT
Day 1: The week began with an overview of real-world cyber security applications across various
industries, such as finance, healthcare, and marketing. I learned about case studies that highlighted how
organizations leverage machine learning to solve complex problems and drive decision-making.
Day 2: I focused on the deployment of cyber security models, understanding the various environments
where models can be deployed, such as cloud platforms (AWS, Google Cloud) and local servers. I
learned about the importance of creating reproducible environments using tools like Docker to ensure
consistency across different stages of development and deployment.
Day 3: I engaged in a practical session on deploying a machine learning model as a Restful API using
Flask. This hands-on experience taught me how to expose model predictions through an API, enabling
other applications to interact with my model. I also learned about version control using Git, which is
essential for managing code changes and collaborating effectively with team members.
Day 4: The focus shifted to monitoring and maintaining deployed models. I explored techniques for
tracking model performance over time, understanding drift, and retraining models when necessary.
This knowledge is critical for ensuring that models continue to deliver accurate predictions in changing
environments.
Day 5: I worked on a group project where we deployed a cyber security model to a cloud platform.
This project involved preparing the model, creating the API, and documenting the deployment process.
Collaborating with my teammates on this project helped me apply my learning in a practical context
and reinforced the importance of teamwork in data science.
Day 6: To conclude the week, we presented our project to the team, showcasing our deployed model
and discussing the challenges we faced during the process. This presentation not only allowed me to
refine my communication skills but also provided valuable feedback from mentors and peers, which I
can incorporate into future projects.
Overall, Week 7 was instrumental in bridging the gap between theoretical knowledge and practical
application in cyber security. I gained hands-on experience in deploying models and learned best
practices for maintaining and monitoring them in real-world settings. This week has prepared me for
the complexities of implementing cyber security solutions in professional environments.
3
4
3.8 ACTIVITY LOG FOR THE EIGHTH WEEK
3
5
WEEKLY REPORT
Day 1: The week began with wrapping up ongoing projects. I reviewed the models I had built and
deployed throughout my internship, ensuring that they were functioning correctly and meeting
performance expectations. This involved conducting final tests to validate the models and their
predictions against new data.
Day 2: I dedicated this day to compiling comprehensive documentation for each project I worked on
during my internship. I focused on detailing the methodologies used, data sources, code snippets, and
insights gained from the analyses. Proper documentation is crucial for sharing knowledge with future
team members and for maintaining project continuity.
Day 5: I dedicated this day to reflecting on my internship experience, evaluating my growth, challenges
faced, and skills acquired over the past eight weeks. I made notes on areas for further improvement and
additional skills I want to pursue as I continue my career in data science.
Day 6: To conclude the internship, I scheduled a feedback session with my supervisor and mentors. We
discussed my performance, areas of strength, and opportunities for improvement. Receiving
constructive feedback was invaluable, as it provided me with a clearer path for my continued
professional development in cyber security.
CHAPTER 4: PROJECT
4.1 Title of the Project : Vulnerability scanning and Reporting
The primary goal of this project is to identify and assess potential vulnerabilities within
the organization's network infrastructure and web applications. By conducting regular
vulnerability scans and generating detailed reports, we aim to:
Proactively identify security weaknesses: Discover and document vulnerabilities before
malicious actors can exploit them.
Prioritize remediation efforts: Focus on critical vulnerabilities that pose the greatest
risk to the organization.
Improve overall security posture: Strengthen the organization's security posture by
addressing identified vulnerabilities.
Comply with industry regulations: Ensure compliance with relevant security standards
and regulations.
4.3 Methodology:
o Determine the scope of the scan, including network devices, servers, and web
applications.
o Choose appropriate tools based on the target systems and desired level of detail,
such as:
Weak passwords
Missing security patches
Insecure configurations
Web application vulnerabilities (SQL injection, XSS, CSRF)
3
7
4. Analyze Scan Results:
1. Executive Summary:
2. Methodology:
5. Recommendations:
6. Conclusion:
Expand the Scope: Extend vulnerability scanning to additional systems and applications.
Automate the Process: Implement automated vulnerability scanning and reporting tools.
Integrate with Security Information and Event Management (SIEM) Systems:
Correlate vulnerability findings with security events to identify potential threats.
Stay Updated with Latest Threats: Continuously monitor the threat landscape and
update security controls accordingly.
Foster a Culture of Security: Encourage employees to report security incidents and
adopt security best practices.
3
9
CHAPTER 5: OUTCOMES DESCRIPTION
During my individual online data science internship with ExcelR, I experienced a structured and
supportive virtual work environment that emphasized clear communication and self-directed learning.
The internship was designed to promote independent engagement while providing ample resources
through digital platforms.
People Interactions: Though primarily individual, I interacted with mentors through regular video
calls and messaging platforms, creating an encouraging atmosphere for guidance and feedback.
Facilities Available and Maintenance: The virtual setup offered access to essential resources,
including data analysis tools and online courses, all within a well-maintained digital workspace.
Clarity of Job Roles: The expectations and responsibilities of the internship were clearly defined,
enabling me to focus effectively on tasks such as data cleaning and model development.
Protocols, Procedures, and Processes: Structured workflows with clear protocols facilitated smooth
progress through various stages of data analysis and model deployment.
Time Management: I developed a personal schedule to balance project tasks and learning objectives,
ensuring I stayed organized and met deadlines efficiently.
Mutual Support and Teamwork: I was encouraged to seek support when needed, receiving timely
assistance and constructive feedback from mentors, which was invaluable for my growth.
In summary, my individual online internship with ExcelR provided a supportive virtual work
environment that encouraged self-directed learning and professional growth, significantly contributing
to my development in cyber security.
4
0
Student Self-Evaluation of the Short-Term Internship
Student Name:
Registration No:
Duration of Internship:
From: To :
Date of Evaluation:
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Interaction ability with the community 1 2 3 4 5
4 Positive Attitude 1 2 3 4 5
5 Self-confidence 1 2 3 4 5
6 Ability to learn 1 2 3 4 5
7 Work Plan and Organization 1 2 3 4 5
8 Quality of work done 1 2 3 4 5
9 Time Management 1 2 3 4 5
10 Achievement of Desired Outcomes 1 2 3 4 5
OVERALL PERFORMANCE
Student Signature
4
1
Evaluation by the Supervisor of the Intern Organization
Student Name:
Registration No:
Duration of Internship:
From: To :
Date of Evaluation:
Please note that your evaluation shall be done independent of the Student’s self-evaluation
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Interaction ability with the community 1 2 3 4 5
4 Positive Attitude 1 2 3 4 5
5 Self-confidence 1 2 3 4 5
6 Ability to learn 1 2 3 4 5
7 Work Plan and Organization 1 2 3 4 5
8 Quality of work done 1 2 3 4 5
9 Time Management 1 2 3 4 5
10 Achievement of Desired Outcomes 1 2 3 4 5
OVERALL PERFORMANCE
4
3
4
4
PROJECT PHOTOS
4
5
4
6
CONCLUSION
4
7
References&Links
Book References:
“The Art of invisibility” by Kevin Mitnick
Links
. https://onlinelearning.excelr.com/classrooms/6697
. https://onlinrlearning.excelr.com/classrooms/6697/player?page=648788
. https://www.excelr.com
4
8
4
9