IT-Report Format of ITR
IT-Report Format of ITR
(MUMBAI)
INDUSTRIAL TRAINING PROJECT REPORT
SUBMITTED BY
AT
Cyber Sanskar
Marks (5
Marks for PA
PA Marks
each week) Marks
by Total
by Mentor by
Industry Marks
Sr. Enrollment Name of the and Industry Mentor
Supervisor
No. Number Student Supervisor Faculty
jointly
Out of
Out of 25 Out of
Out of 30 (a) 75
(B) 20 (C)
(A+B+C)
2111670248 Harshwardhan Sanjay
1
Jadhav
A) Marks for PA are to be awarded out of 5 for each week considering the level of
completeness of activity observed, from the daily dairy maintained.
B) Marks are to be awarded by Industry Supervisor on the basis of general observation
and behavioral aspects of student.
C) Marks are to be awarded by mentor faculty on the basis of report, understanding
level and work performance of the Student.
Signature Signature
Name and designation of the Mentor/faculty Name and designation of the Mentor/faculty
Format 5
Evaluation Sheet for ESE of Industrial Training by Mentor and Industrial Personnel
Industrial
Training/Online Presentation Viva Total Marks (75
Training Report (25 Marks) (25 Marks) Marks)
(25 Marks)
Signature Signature
Name of Internal/Mentor Name of External Examiner
(Industry Personnel)
Abstract
Industrial training is an important phase of a student life. A well planned, properly executed
and evaluated industrial training helps a lot in developing a professional attitude. It develops
an awareness of industrial approach to problem solving, based on a broad understanding of
process and mode of operation of organization. The aim and motivation of this industrial
training is to receive discipline, skills, teamwork and technical knowledge through a proper
training environment, which will help me, as a student in the field of Information Technology,
to develop a responsiveness of the self-disciplinary nature of problems in information and
communication technology. During a period of 6 weeks training at Cyber Sanskar, we were
taught about the Cyber Security, and we did a project on classification problem. In This
course we learned about Ethical hacking, Bug bounty, Website Development, Digital
Marketing, Soft Skill Development, Mobile application Development. As a result, we are vital
to achieve the minimum requirement of Cyber Security field, now we are confident that we
can make a better secure software . Throughout this industrial training, I have been learned
new programming tools that required for the cyber security, the process of developing
websites and applications.
Keywords: Cyber Security, Bugbounty, Ethical hacking, Digital Marketing, App and Website
development.
ACKNOWLEDGEMENT
With the deep sense of gratitude, we would like to thanks all the people who have lit
our path with their kind guidance. We are very grateful to these intellectuals who did their
best to help during our project work. It is our proud privilege to express deep sense of
gratitude to, Prof.PM. Dharmadhikari, Principal, Sandip Polytechnic, Nashik, for his
comments and kind permission to complete this project. We remain indebted to Prof.
V.B.Ohol, H.O.D, Information Technology Department for their timely suggestion and
valuable guidance. ‘
The special gratitude goes to guide from Implant Industry staff members and staff
members, of Information Technology Department for their expensive, excellent and
precious guidance in completion of this work.
We thanks to all the colleagues for their appreciable help for our working project.
With various industry owners or lab technicians to help, it has been our endeavor to
throughout our work to cover the entire project work. We also thankful to our parents who
provided their wishful support for our project completion in a successful manner.
And lastly we thanks to our all friends and the people who are directly or indirectly
related to our project work
Chapter 1
Organizational Structure of Industry / Organization and general layout
• Understand the
1 theory part
• Perform the
3 assigned task
• Submit the
4 assigned task
Chapter 2
Introduction of Industry / Organization
(Type of products, services, history, turnover, no of employees)
Chapter 4
Assignment Performed in Industry
We have performed different assignments in the industry which are as
follows –
Finding Open Wifi using Wifi Map :
Website Designed using weebly :
Description :
1. The above website was made by me when I was working as an intern in
cyber sanskar with the guidance of Dr. Tanmay S Dikshit.
2. The website is regarding our own business owned by my dad himself the
business is regarding musical instruments selling and repairing.
3.So the website shows the work done by my dad and his achievements.
1. We Were able to find MAC Address and check the vulnerabilities of Wi-
Fi devices using WPS WPA Tester.
2. WIFI Map Help we into finding Open Wi-Fi in are near area.
3. We are able to find the area of a particular user, by identifying nearby
tower using Open Signal Application.
4. We learn to create Application for all type of OS using Andromo.
5. We learn Web Development using Weebly Which is no coding tool
which also provide sub domain.
6. We were Able to track the ip address and the location of a particular user
by Ip logger tool provided by Grabify.
Chapter 6
What we learned? (In Training)
In these 45 days industrial training we have learnt several topic related cyber security. The
topics where specially designed for the training purpose.
1 . Ethical Hacking :
a) Google Dorks
b) Google Parameters
c) Google Safe Search
d) Computer and Mobile virus
e) Types of viruses
f ) Virus Total
g) ‘Mukham’ : The age Identifier .
2. Cyber Security :
a) Website Hacking
b) SQL Injection
c) Mobile Hacking
d) Android Device From Web Browser
e) Monitoring activities on a target mobile.
f) Google location history
3. Bug Bounty :
a) Bug bounty
b) Wordlist for bug bounty
c) Different types of bug bounty programs
d) Vulnerability disclosure policy
e) Software Tools
f) Reporting a Bug Efficiently
4. Website Design
a) Process of creating and building a website
b) Advantages for businesses
c) Website requirement
d) Domain Name
e) Buy a new domain
f) Web hosting
g) Design & Layout
h) CMS
i) Responsive Report
j) SEO
k) Website Security
d
5. Digital Marketing
a) Digital Marketing
b) Search Engine
c) Email marketing
d) Influencer Marketing
f) Display Advertising
g) Affiliate Marketing
h) AI Based Video Marketing
Certificates Obtained:
Chapter 7
Conclusion
In this industrial training, I have learned various new concepts and methods to Secure the
device. I have learned about Cyber Security and many more unknown topics. It was
knowledgeable and enjoyable training. I am very thankful to my trainer Dr. Tanmay s
Dikshit, Proprietor, Cyber Sanskar and all my staff members to helped me a lot. MSBTE
has given me this opportunity to improve my technical skills and learn something new in
new domain. Now, I can say that I have full confidence in Cyber Security that I can make
new Websites and android applications using different methods which was taught in
training. It is my fortune to be a intern of Cyber Sanskar.
At
Cyber Sanskar
Week 1 was assigned for cyber security, bug bounty and ethical hacking.
Day 1:
Ethical hacking and cyber investigation are two critical domains within the field of
cybersecurity that focus on identifying vulnerabilities in computer systems,
networks, and applications, as well as investigating cybercrimes in a legal and
ethical manner.
It's important to note that ethical hacking and cyber investigation are conducted
within legal and ethical boundaries, with the intention of protecting systems and
networks from malicious actors, assisting in the prevention of cybercrimes, and
aiding in the prosecution of cybercriminals. These practices contribute to the
overall improvement of cybersecurity by identifying weaknesses, ensuring
compliance with regulations, and enhancing incident response capabilities.
Day 2:
Mobile Hacking:
Mobile hacking involves exploiting security weaknesses in mobile devices, such
as smartphones and tablets, to gain unauthorized access or control over the device
or its data. Some common mobile hacking techniques include:
Website Hacking:
Website hacking involves exploiting vulnerabilities in websites, web applications,
or underlying technologies to gain unauthorized access, deface the website, steal
sensitive data, or perform other malicious actions. Common website hacking
techniques include:
5. Remote File Inclusion (RFI) and Local File Inclusion (LFI): Attackers exploit
vulnerabilities in web applications to include and execute malicious files from
remote or local systems, allowing them to gain unauthorized access or execute
arbitrary code.
It's important to note that ethical hacking, also known as penetration testing, is
performed with proper authorization to identify and address security
vulnerabilities. Ethical hackers work within legal and ethical boundaries to assess
and improve the security of websites and mobile applications, assisting
organizations in protecting their systems and user data.
Google Safe Search is a feature provided by Google that helps users filter out
explicit or inappropriate content from search results. It is primarily designed to
create a safer browsing experience, especially for children or individuals who
prefer to limit their exposure to explicit material.
When Safe Search is enabled, Google's search algorithms are set to filter out
potentially explicit or objectionable content from search results. This includes
explicit images, videos, and websites that may contain adult content, violence, or
other sensitive material.
Safe Search can be enabled on various Google platforms, including the Google
search engine, Google Images, Google Video, and other Google services. It can be
accessed and adjusted through the settings or preferences menu of each platform.
Day 3:
In our country, the age of maturity believed is 18. The people above eighteen are
fully mature, literates, prudent. They know the differences between right and
wrong. They are able to take appropriate decisions. They are independent and can
take responsibilities of their own. Therefore, they considered as mature. However,
person bellow 18, are consider as children. Because, they cannot identify what is
correct, and what is not. They are innocent and unaware about the worldliness.
They can easily grasp the wrong things as well as the right one. Therefore, it
becomes necessary to preclude them from some adult things. We should save them
from wrong things.
Thus, some websites with adult contents are not allow for children. Some movies
with adult content, pub, drugs, wine-shops, cigarettes not allowed for children.
Even social media platforms like Facebook, Instagram, twitter also not open for
children. However, sometimes due to weak security, children create accounts on
these platforms very early. They are very technology friendly. This causes to teach
some wrong things to these children. We are seeing that children are involving in
crimes today. It is dangerous for their future as well as the country’s future. That is
why Cyber Scholar Dixit made the Mukham.
Mukham software is a tool, which created for secure children’s future. Yes…This
software works by identifying your age through face scanning. Generally, websites
need usernames and passwords for login or sign up. There are some requirements
like birth details, for identifying your age. However, maximum children gives fake
birth details and show, as they are adult. However, in the software mukham, it is
not possible. It opens the camera, which scans your face and identify your true
age. You cannot cheat to this software. It will work as a security guard. Because of
this tool, there will no need of guards in the door of cinema hall. The camera will
scan the faces and will identify your age perfectly. If camera would see you as
adult, it will show you the green-signal. If you prove as a child, it will not allow
you to enter in the hall. It will give the security to websites also.
In India, adult contents, and things like drugs, cigarettes believed as uncivilized.
However, western countries allow these types of things. It is normal for them.
Therefore, the mukham will give extra advantage to these countries. In India, it
will work in theatres, Pubs, wine-shops, etc. Due to this, there will open a door for
Kids’ bright future.
Features of the Mukham :
The scanning of face through camera. It will help the tool to identify an
individual’s age perfectly. The Artificial Intelligence plays vital role here.
It includes cookies and outstanding local storage, which can grasp maximum
data, and can calculate and make the right decision.
It does not require any coding. There is only one condition, that you should be
at least 18 years old.
It is user-friendly, and able to work immediately, perfectly in an effective
manner. It will give accurate results.
You can set the age limit as per the need of your website or place. Along with
this, the software is able to set its own age limit according to specific country.
Day 4:
Website security and data protection are crucial aspects of maintaining the
confidentiality, integrity, and availability of data stored on a website. It involves
implementing various measures to prevent unauthorized access, data breaches, and
other malicious activities. Here are some key considerations for website security
and data protection:
4. Strong Password Policies: Enforce strong password policies for user accounts,
including complexity requirements, password expiration, and password reset
mechanisms. Encourage users to use unique passwords and consider implementing
password hashing and salting techniques to protect stored passwords.
6. Regular Security Audits and Testing: Conduct regular security audits and
vulnerability assessments to identify weaknesses in the website's infrastructure,
code, or configurations. Perform penetration testing to simulate real-world attacks
and ensure the website's resilience against potential threats.
7. Data Encryption and Storage: Implement encryption techniques to protect
sensitive data stored on the website's servers or databases. Encrypting data at rest
ensures that even if unauthorized access occurs, the data remains unreadable and
unusable.
8. User Input Validation: Validate and sanitize all user inputs to prevent common
vulnerabilities, such as SQL injection, cross-site scripting, or command injection.
Proper input validation mitigates the risk of attackers exploiting weaknesses in the
website's code.
9. Secure Backups: Regularly backup website data and ensure that backups are
securely stored in off-site locations. Backups are crucial for disaster recovery and
can help restore the website and its data in the event of a security incident or data
loss.
10. Privacy Policies and Compliance: Clearly define and communicate your
website's privacy policies to users, outlining how their data is collected, stored,
and used. Ensure compliance with relevant data protection regulations, such as the
General Data Protection Regulation (GDPR) or California Consumer Privacy Act
(CCPA).
Remember that website security and data protection require ongoing effort and
attention. Regular monitoring, updating security measures, and staying informed
about emerging threats are essential to maintain a secure and trusted website
environment for users and protect their sensitive data.
Mobile safe in lookout application
Here are some key features and functionalities offered by Lookout Mobile
Security:
1. Malware Protection: Lookout scans mobile apps and files for known malware
and detects malicious behavior to safeguard against viruses, spyware, and other
malicious software.
3. Theft and Loss Protection: Lookout offers features to help locate lost or stolen
devices. It can track the device's location, activate a loud alarm to help locate it,
and remotely lock or wipe the device to protect sensitive data.
4. App Monitoring: Lookout analyzes installed apps on the device, assessing their
behavior and permissions to identify potential privacy or security risks. It provides
insights into the information accessed by apps and helps users make informed
decisions about their installed applications.
5. Wi-Fi Security: Lookout alerts users when they connect to potentially unsecured
Wi-Fi networks that may pose security risks. It encourages users to be cautious
when connecting to public Wi-Fi hotspots and provides recommendations for
secure browsing.
6. Breach Report: Lookout monitors data breaches and alerts users if their personal
information, such as email addresses or passwords, is compromised in a data
breach. It offers guidance on steps to take to secure compromised accounts.
Week 2 : From 12th June To 17th June
Website advantages.
Day 1:
Website design and development involves creating and building websites from
scratch or modifying existing ones. It encompasses various disciplines, including
visual design, user experience (UX) design, front-end development, back-end
development, and content creation. Here are the key aspects of website design and
development:
1. Planning and Strategy: This phase involves understanding the goals, target
audience, and desired functionalities of the website. Planning includes defining the
website's structure, content hierarchy, and navigation flow. It also involves
conducting research on competitors and industry best practices.
2. Visual Design: Visual design focuses on creating an appealing and intuitive user
interface (UI). It includes designing the website's layout, typography, color
schemes, and graphical elements. The goal is to create a visually pleasing design
that aligns with the brand identity and engages users.
3. User Experience (UX) Design: UX design focuses on optimizing the website for
a seamless and intuitive user experience. It involves designing user flows,
wireframing, and prototyping to ensure ease of navigation, clear information
architecture, and effective interaction design.
7. Testing and Quality Assurance: This phase involves thorough testing of the
website to identify and fix any bugs, compatibility issues, or usability problems.
Testing ensures that the website functions as intended and delivers a positive user
experience across different devices and browsers.
It's worth noting that website design and development can be undertaken by
individuals or teams with expertise in various areas. Depending on the complexity
of the project, it may involve collaboration between web designers, UX designers,
front-end developers, back-end developers, and content creators.
3. Increased Reach and Customer Base: With a website, businesses can expand
their reach beyond local markets and target a broader audience. This can lead to
increased visibility, brand awareness, and the potential to attract new customers or
clients from different regions.
10. Scalability and Flexibility: Websites can easily adapt to evolving business
needs. They can be scaled up to accommodate growing product lines, services, or
user demands. Websites can also be updated and modified with new content,
features, or design elements to reflect changing trends or business goals.
Website registration and hosting are two essential components of establishing and
launching a website. Here's an overview of each:
Website Registration:
Website registration, also known as domain registration, involves the process of
acquiring a unique domain name for your website. A domain name is the address
that users enter into their web browsers to access your website (e.g.,
www.example.com). Here are the key points to understand about website
registration:
1. Choose a Domain Name: Select a domain name that reflects your brand,
business, or website purpose. It should be memorable, easy to spell, and relevant
to your target audience.
2. Registrar: To register a domain name, you need to work with a domain registrar.
A domain registrar is an organization accredited by the Internet Corporation for
Assigned Names and Numbers (ICANN) to manage domain registrations. Popular
registrars include GoDaddy, Namecheap, and Google Domains.
3. Check Availability: Use the registrar's website or a domain search tool to check
if your desired domain name is available. If it's available, you can proceed with the
registration process. If not, you may need to choose an alternative domain name or
consider other extensions (e.g., .net, .org) that are still available.
5. Domain Ownership: Once registered, you become the owner of the domain
name for the duration of the registration period. You can manage and configure the
domain's settings through the registrar's provided control panel.
Website Hosting:
Website hosting involves storing your website's files, data, and content on a server
that is accessible via the internet. When users visit your website, their browsers
retrieve the website's files from the hosting server. Here are the key points to
understand about website hosting:
2. Hosting Provider: Choose a reputable hosting provider that offers the hosting
package suitable for your needs. Some popular hosting providers include Bluehost,
SiteGround, and HostGator. Consider factors such as reliability, customer support,
performance, security features, and pricing.
4. Uploading Website Files: Once the domain is pointed to the hosting server, you
can upload your website files, including HTML, CSS, JavaScript, images, and
other assets. This can be done using FTP (File Transfer Protocol) or through the
hosting provider's file manager.
1. Content Planning: Begin by outlining the structure and content requirements for
your website. Determine the pages you want to include, such as the homepage,
about page, product/service descriptions, blog posts, or contact page. Define the
purpose, target audience, and key messaging for each page.
3. Refinement and Editing: Review and refine the generated text provided by
ChatGPT. Edit and adapt the content to align with your specific requirements,
tone, and style. Ensure that the information is accurate, engaging, and suitable for
your website's purpose.
5. Development and Implementation: Once you have the content and visuals
ready, proceed with website development. This involves converting the design into
HTML, CSS, and JavaScript code. You can either code it yourself or work with a
web developer to bring the website to life.
Live Streaming
Live streaming refers to the real-time broadcasting of video or audio content over
the internet. It allows users to broadcast and share live events, performances,
presentations, or any other form of content with viewers in different locations.
Here's some information on live streaming:
1. How it Works: Live streaming involves capturing audio and video signals using
cameras, microphones, or other sources, encoding the content into a digital format,
and transmitting it over the internet in real time. Viewers can then access the live
stream using internet-connected devices, such as computers, smartphones, or smart
TVs.
2. Platforms and Services: Various platforms and services facilitate live streaming,
making it accessible to both individuals and businesses. Popular live streaming
platforms include YouTube Live, Facebook Live, Twitch, Instagram Live, and
LinkedIn Live. These platforms provide the infrastructure, tools, and audience
reach to host and broadcast live streams.
3. Content Types: Live streaming can cover a wide range of content, including but
not limited to:
7. Copyright and Licensing: It's important to respect copyright laws when live
streaming. Ensure you have the necessary rights or permissions to broadcast
copyrighted content, such as music, movies, or performances, to avoid potential
legal issues.
Live streaming has revolutionized the way content is shared and consumed,
enabling real-time connections and expanding audience reach. It offers
opportunities for individuals, organizations, and businesses to engage with
viewers, share experiences, and create interactive and immersive online
experiences.
Day 5:
Website Hosting:
Website hosting refers to the process of storing and serving the files and data of a
website on a server that is connected to the internet. When someone visits a
website, their browser requests those files from the hosting server, allowing the
website to be displayed. Here are some key points about website hosting:
2. Shared Hosting: In shared hosting, multiple websites are hosted on the same
server, sharing its resources (CPU, memory, storage, bandwidth). It is an
affordable option but may have limitations in terms of performance and
customization.
3. Virtual Private Servers (VPS): VPS hosting involves dividing a physical server
into multiple virtual servers, providing dedicated resources for each website. It
offers more control, scalability, and customization options compared to shared
hosting.
1. Top-Level Domains (TLDs): TLDs are the highest level of domain names in the
hierarchical Domain Name System (DNS). Common TLDs include .com, .org,
.net, .edu, .gov, etc. They are used to categorize websites based on their purpose or
organization type.
It's important to choose a hosting provider that offers the necessary features,
reliability, security, and support for your website's needs. Additionally, selecting a
domain name that aligns with your brand, is easy to remember, and represents
your website's purpose can help attract and retain visitors.
Day 6:
Real-time cyber investigations involve actively monitoring and responding to
ongoing cyber incidents or threats as they occur. Here is an overview of how real-
time cyber investigations can take place:
8. Remediation and Recovery: Once the immediate threat is contained, the focus
shifts to remediating the vulnerabilities or weaknesses exploited during the
incident. Patches or security updates may be applied, system configurations may
be hardened, or additional security controls may be implemented to prevent similar
incidents in the future. Additionally, affected systems or data may be restored from
backups.
Day 1:
3. Development: Developers write the code for the application using programming
languages, frameworks, and libraries. The choice of technology depends on the
target platform and specific requirements. For example, web applications often use
HTML, CSS, and JavaScript, while mobile apps can be built using languages like
Java or Swift.
Types of Applications:
2. Web Applications: Web applications are accessed through web browsers and
run-on web servers. They can be simple websites, dynamic web applications, or
complex enterprise systems. Web development technologies include HTML, CSS,
JavaScript, and various server-side languages and frameworks.
There are various types of operating systems and platforms available, each
designed to cater to specific needs and devices. Here are some common types:
7. Gaming Platforms:
a. Xbox: Developed by Microsoft, primarily for gaming consoles.
b. PlayStation: Developed by Sony, primarily for gaming consoles.
c. PC Gaming: Windows-based operating systems are widely used for gaming
on personal computers.
8. Web-Based Platforms:
a. These platforms provide applications and services over the internet,
accessible through web browsers. Examples include Google Workspace
(formerly G Suite), Microsoft 365, and Salesforce.
9. Virtualization Platforms:
a. These platforms enable running multiple operating systems simultaneously
on a single physical machine. Examples include VMware vSphere,
Microsoft Hyper-V, and Oracle VM VirtualBox.
11.These are just a few examples, and there are many other specialized operating
systems and platforms available for specific purposes and devices.
Day 3:
1. Cloud Service Providers: There are several major cloud service providers,
including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud
Platform (GCP). These platforms offer a wide range of services and tools for
application development and deployment.
3. Storage and Databases: Cloud platforms offer various storage options, including
object storage, file storage, and databases (relational, NoSQL, etc.). Developers
can leverage these services to store and manage application data.
10. Cost Optimization: Cloud platforms offer various pricing models and tools to
optimize costs. Developers should consider factors like resource utilization, auto-
scaling, and reserved instances to effectively manage costs.
1. Define the Application's Purpose: Clearly articulate the purpose and objectives
of your application. Understand what problem it aims to solve or what value it
provides to users.
2. Identify Target Users: Determine the target audience for your application.
Understand their demographics, needs, preferences, and pain points. This
information will help shape the features and design of your application.
9. Plan Data Requirements: Determine the data your application will need to store
and access. Define data structures, database requirements, and any external APIs
or integrations required for data exchange.
10. Prioritize and Iterate: Prioritize the gathered information and requirements
based on their importance and feasibility. It's often beneficial to start with a
Minimum Viable Product (MVP) and iterate based on user feedback and evolving
needs.
Day 6 :
1.The Pictures of the app are given above, name of the app given above is viery.
2. The app was basically made by me when I was working as an intern in cyber
Sanskar under the guidance of Dr. Tanmay S Dikshit.
3. The main motive of the application is to make people aware of different
mobile viruses and malware by providing in detail info about the viruses and
viruses.
Week 4 : From 26th June To 1st July
Email marketing
Day 1:
Affiliate Marketing:
Affiliate marketing is a performance-based marketing model where individuals or
entities (affiliates) promote products or services of a company or merchant and
earn a commission for each successful referral or sale they generate. Here's an
overview of affiliate marketing:
Merchant: The merchant is the company or business that offers the products or
services. They set up an affiliate program and provide affiliates with promotional
materials, tracking tools, and commission structures.
3. Social Media Marketing: Social media marketing utilizes social media platforms
like Facebook, Instagram, Twitter, LinkedIn, and others to reach and engage with
target audiences. It involves creating and sharing content, running paid ads, and
interacting with followers to build brand presence and drive engagement.
Digital marketing offers businesses the opportunity to reach a vast audience, target
specific demographics, and measure the effectiveness of campaigns with real-time
data. Its dynamic nature allows for continuous optimization and adaptation to
changing consumer trends and behaviors.
Day 2 :
Canva Posts :
Day 3:
1. Building an Email List: The first step in email marketing is to build a list of
subscribers who have willingly provided their email addresses. This can be done
through website sign-up forms, lead generation campaigns, or other means of
collecting email addresses.
2. Creating Email Campaigns: Once you have a list of subscribers, you can create
and send email campaigns. These campaigns typically include various types of
content, such as newsletters, product updates, promotional offers, event
invitations, or educational content.
6. Monitoring and Analytics: It's important to track the performance of your email
campaigns by analyzing metrics such as open rates, click-through rates, conversion
rates, and unsubscribe rates. This data helps you understand the effectiveness of
your campaigns and make improvements over time.
Benefits of Email Marketing:
However, it's crucial to adhere to email marketing best practices and comply with
relevant laws and regulations, such as obtaining consent from subscribers and
providing an option to unsubscribe from future emails.
Day 4:
Influencer marketing through YouTube collaboration involves partnering with
popular YouTube creators or channels to promote products, services, or brands to
their audience. It leverages the influencer's credibility, reach, and engaged
following to raise awareness, drive engagement, and potentially generate
conversions. Here are some key aspects of influencer marketing using YouTube
collaboration:
Live streaming refers to the broadcasting of real-time audio and video content over
the internet, allowing viewers to watch and engage with the content as it happens.
It has gained significant popularity in recent years due to its ability to provide
immediate and interactive experiences to a global audience. Here's some
information on live streaming:
2. Content Types: Live streaming can cover a wide range of content types,
including but not limited to:
- Product Launches and Demos: Companies often use live streaming to introduce
new products, demonstrate their features, or showcase live product launches to
generate excitement and engagement.
5. Mobile Live Streaming: With the rise of smartphones, mobile live streaming has
become increasingly popular. Mobile apps like Periscope (Twitter's live streaming
platform), Instagram Live, or TikTok allow users to live stream directly from their
mobile devices, enhancing accessibility and convenience.
7. Analytics and Metrics: Many live streaming platforms provide analytics and
metrics to track viewership, engagement, and other key performance indicators.
These insights help content creators and businesses understand their audience,
measure the success of their live streams, and refine their future strategies.
Live streaming offers a dynamic and interactive way to connect with audiences in
real time, creating engaging experiences and fostering community interaction. It
has become a valuable tool for content creators, businesses, and individuals to
share their message, showcase their talents, and build a loyal following.
Day 6:
There are several ways to obtain content for an e-book. Here are some methods
you can consider:
2. Repurpose Existing Content: Look into your existing content library, such as
blog posts, articles, whitepapers, or presentations, and repurpose them into an e-
book. Adapt and expand the content to fit the e-book format, ensuring a cohesive
flow and structure.
7. Hire Freelance Writers: If you prefer not to create the content yourself, you can
hire freelance writers or content creators to write the e-book for you. Clearly
communicate your requirements, provide guidance, and work closely with the
writer to ensure the content meets your expectations.
Content Creation using AI-
Here we learnt to create promotional videos using Untitled Video Lumen5 and to
create a video using a human image in type of presenting something with D_ID
platform.
Week 5 : From 3rd July To 8th July
Week 5 was thoroughly given for getting our hands on the on-field tasks. We were
assigned different tasks this week to be accomplished with the knowledge we
gained in the fore weeks.
Rest of the students were also assigned such different topics to gather information
on. All together later all the information gathered was put together and merged as
an E-book.
Day 1:
Collecting data for content creation involves gathering information, statistics, and
insights that support your content goals. Here are some steps to help you collect
data effectively:
1. Define your content goals: Determine the purpose and objective of your
content. Are you aiming to inform, entertain, or persuade? Knowing your goals
will guide your data collection efforts.
3. Determine data sources: Identify potential sources of data that align with your
content goals. Consider the following sources:
d. Industry reports and studies: Research and gather data from reputable
industry reports, studies, and publications relevant to your content niche.
4. Collect and analyze data: Implement your chosen data collection methods.
Ensure that your data is collected in a structured and organized manner. Once
collected, analyze the data to identify patterns, trends, and key insights that can
inform your content creation process.
5. Validate data and fact-check: Cross-reference the data you've collected with
multiple sources to ensure accuracy and reliability. Fact-check the information
to maintain credibility in your content.
6. Organize and store data: Establish a system to organize and store your data for
easy access and retrieval. This can include using spreadsheets, cloud storage, or
dedicated data management tools.
7. Utilize data-driven insights: Apply the insights gained from your data
collection to shape your content strategy and creation process. Use the data to
understand your audience's needs, preferences, and pain points, allowing you to
create more relevant and engaging content.
8. Remember to respect privacy and comply with any legal and ethical
considerations while collecting and utilizing data.
Day 2:
Once you have collected and analyzed the data, you can use it to create articles for
your blog. Here's how you can incorporate the data into your content creation
process:
1. Identify key insights: Review the data you have collected and identify the key
insights, trends, or statistics that are relevant to your blog's topic or theme. These
insights will form the foundation of your articles.
3. Outline your articles: Create an outline for each article, including the main
points or arguments you want to make. Organize your thoughts and structure the
content in a logical and coherent manner.
4. Incorporate data into your articles: Integrate the data you collected into your
articles to support your points or claims. Use statistics, quotes, or case studies to
provide evidence and make your content more compelling and credible.
5. Provide context and analysis: Avoid simply presenting raw data. Instead,
provide context and analysis to help your readers understand the significance of
the data. Explain the implications, draw conclusions, or offer interpretations based
on the data you've gathered.
8. Cite your sources: Ensure that you properly attribute any data or information
you use in your articles. Provide citations or references to the sources where you
obtained the data, adhering to the appropriate citation style.
9. Edit and proofread: Review your articles for clarity, coherence, and grammar.
Make sure your content is error-free and flows smoothly. Consider seeking
feedback from peers or editors to ensure high-quality content.
10. Optimize for SEO: Implement search engine optimization (SEO) techniques to
improve the visibility of your articles in search engine results. Use relevant
keywords, optimize meta tags, and ensure your content is well-structured and easy
to navigate.
11. Publish and promote: Once you are satisfied with your articles, publish them
on your blog. Promote your content through social media, email newsletters, or
other marketing channels to reach your target audience and maximize its visibility.
Remember, while data is valuable, storytelling and providing value to your readers
should remain your primary focus. Use the data to enhance your articles, but
ensure they are well-written, informative, and engaging to deliver a great reading
experience.
Day 3:
To merge the data, you have collected with your article and create a blog post,
follow these steps:
1. Review your data: Take a thorough look at the data you have collected,
including any insights, statistics, or quotes that are relevant to your blog post topic.
2. Identify key points: Identify the most important and compelling data points that
you want to highlight in your blog post. These points will form the backbone of
your content.
3. Determine your blog post structure: Decide on the structure and format of your
blog post. Common structures include introductory paragraphs, subheadings,
bullet points, or numbered lists. Determine how you will incorporate the data into
each section of your post.
4. Craft an introduction: Begin your blog post with a captivating introduction that
hooks the reader and sets the stage for the information you will be presenting.
Consider using an intriguing statistic or an anecdote related to your data to grab
the reader's attention.
5. Integrate data within the body of the article: Incorporate the data seamlessly
within the body of your article. Use the data to support your points, illustrate
concepts, or add credibility to your claims. Ensure that you provide context and
explain the significance of the data as you present it.
6. Interpret and analyze the data: Avoid merely presenting raw data. Offer your
interpretation and analysis of the data to help readers understand its implications
and relevance. Explain how the data supports your overall message or argument.
7. Provide examples and visuals: To make the data more engaging and
understandable, use relevant examples or case studies that relate to the data.
Additionally, consider incorporating visuals such as charts, graphs, or infographics
to present the data in a visually appealing way.
8. Write in a reader-friendly style: Ensure that your writing style is clear, concise,
and easily comprehensible to your target audience. Avoid jargon or complex
terminology that may confuse readers. Break up the text with subheadings, bullet
points, and short paragraphs to enhance readability.
9. Conclude and summarize: Summarize the key points and findings derived from
the data in your conclusion. Reinforce the main takeaways from the data and
emphasize the significance of the insights you've presented.
10. Edit and proofread: Carefully edit and proofread your blog post to eliminate
any errors, typos, or inconsistencies. Check the flow, coherence, and overall
quality of your writing. Consider asking a colleague or friend to review your
content as well.
11. Optimize for SEO: Optimize your blog post for search engine optimization
(SEO) by incorporating relevant keywords and meta tags. Consider linking to
other relevant content on your blog or external reputable sources to enhance the
post's SEO value.
12. Publish and promote: Once you are satisfied with your blog post, publish it on
your blogging platform or website. Promote your blog post through social media,
email newsletters, or other marketing channels to increase its visibility and reach.
By merging your collected data with your article, you provide valuable insights
and evidence that support your blog post's message. This helps to make your
content more credible, informative, and engaging to your readers.
Day 4:
Data can be collected from various sources depending on your content goals and
target audience. Here are some common methods and sources for collecting data:
4. Industry reports and studies: Research and analyze industry reports, market
research studies, and academic papers related to your content niche. These sources
often contain valuable statistics, trends, and insights that can support your content.
6. Interviews and expert opinions: Conduct interviews with subject matter experts,
industry professionals, or thought leaders relevant to your content. These
interviews can provide unique insights, quotes, and expert opinions that enrich
your content.
10. Crowdsourcing and open data: Leverage crowdsourcing platforms or open data
initiatives that provide access to a wide range of public-contributed data. Examples
include projects like OpenStreetMap, Kaggle, or citizen science initiatives.
1. Identify your audience and purpose: Determine who your target audience is and
what you aim to achieve with your articles. Are you providing information,
entertaining, or persuading? Understanding your audience and purpose will guide
your content creation.
2. Generate article ideas: Brainstorm topics and ideas that align with your
audience's interests, needs, and your content goals. Consider current trends,
frequently asked questions, industry news, or challenges your audience may face.
4. Outline the article: Create a clear and organized outline for each article. Include
main sections, subheadings, and key points you want to cover. This step helps
structure your thoughts and ensures a logical flow of ideas.
5. Write the introduction: Craft a compelling introduction that hooks readers and
introduces the topic. Engage them with a captivating opening sentence or a
thought-provoking question that draws them into the article.
6. Develop the body paragraphs: Expand on the main points from your outline,
dedicating each paragraph to a specific idea or subtopic. Provide supporting
evidence, examples, statistics, or quotes to strengthen your arguments and make
your content more informative and credible.
9. Craft a conclusion: Summarize the main points discussed in the article and
provide a concise conclusion. Restate the key takeaways or provide a call to action
for readers, encouraging them to further explore the topic or share their thoughts.
10. Proofread and edit: Review your article for grammar, spelling, punctuation,
and clarity. Ensure that your writing flows smoothly and that the content is error-
free. Consider using editing tools or seeking feedback from others to polish your
work.
11. Optimize for SEO: Incorporate relevant keywords and meta tags to optimize
your article for search engines. This practice helps improve its visibility and
organic reach. Also, ensure your article is properly formatted for search engine
readability.
12. Format and publish: Format your article according to your publishing
platform's guidelines. Add appropriate headings, subheadings, and any necessary
HTML formatting. Insert images or other media as needed. Then, publish your
article on your website or blog.
13. Promote and share: Once your article is published, promote it across various
channels to reach your target audience. Share it on social media, email newsletters,
relevant forums or communities, or collaborate with influencers or other content
creators to amplify its visibility.
14. Monitor and engage: Keep an eye on the performance of your articles, monitor
comments or feedback, and engage with your audience. Respond to comments,
answer questions, and analyze metrics such as page views, shares, or time on page
to evaluate the success of your articles.
By following these steps, you can create a diverse range of articles that effectively
communicate your message, provide value to your readers, and help you achieve
your content goals.
Day 6:
By following these steps, you can create and publish a comprehensive e-book
derived from merged articles.
Week 6 : From 10th July To 15th July
Blog writing.
Industrial Visit
Maintaining password security is crucial for protecting your online accounts and sensitive
information from unauthorized access. Here are some essential tips to help you enhance the
security of your passwords:
1. Use Strong and Unique Passwords: Create passwords that are difficult to guess by using a
combination of upper- and lower-case letters, numbers, and special characters. Avoid using
easily guessable information like birthdates, common words, or sequential patterns.
2. Longer is Better: Aim for longer passwords, as they are generally more secure. Passwords
with 12 characters or more are recommended.
3. Avoid Dictionary Words: Hackers often use software that can quickly try thousands of
common words. Avoid using easily guessable dictionary words as passwords.
4. Don't Reuse Passwords: Use a unique password for each of your online accounts. If one
account gets compromised, you don't want it to provide access to all your other accounts.
7. Beware of Phishing Attempts: Be cautious of phishing emails or websites that try to trick
you into revealing your passwords. Always verify the authenticity of the sender or website
before entering your login credentials.
9. Keep Passwords Private: Never share your passwords with anyone, including friends,
family, or colleagues.
10. Secure Devices and Networks: Ensure your devices (computers, smartphones, etc.) are
protected with passwords or biometric authentication. Also, be cautious when using public
Wi-Fi networks, as they can be less secure.
11. Regularly Update Software: Keep your operating systems, applications, and antivirus
software up to date to reduce vulnerabilities that hackers could exploit.
12. Use Passphrases: Consider using passphrases, which are longer phrases or sentences that
are easier for you to remember but harder for attackers to crack.
13. Avoid Storing Passwords in Plain Text: Don't write down passwords on sticky notes or
store them in easily accessible digital files.
By following these best practices, you can significantly improve the security of your
passwords and reduce the risk of unauthorized access to your accounts.
Day 2 :
Developing your personality is a lifelong journey that involves self-awareness, continuous
learning, and intentional efforts to improve various aspects of yourself. Here are some
practical steps to help you in the process of personality development:
Self-Assessment and Reflection: Take time to introspect and assess your strengths,
weaknesses, values, and beliefs. Reflect on your past experiences and identify areas for
improvement.
Set Clear Goals: Define specific and achievable goals for your personality development.
Whether it's improving communication skills, becoming more confident, or enhancing
emotional intelligence, setting clear objectives will give you direction.
Continuous Learning: Engage in lifelong learning. Read books, attend workshops, take
courses, and seek new experiences that challenge and expand your knowledge and skills.
Cultivate Positive Thinking: Foster a positive mindset by challenging negative thoughts and
focusing on gratitude and optimism. Surround yourself with positive influences and practice
mindfulness to reduce stress.
Improve Communication Skills: Work on your verbal and non-verbal communication skills.
Practice speaking clearly, assertively, and empathetically. Also, listen actively to others and
pay attention to their body language.
Build Self-Confidence: Step out of your comfort zone and take on challenges. Celebrate
your achievements, no matter how small, and recognize your capabilities.
Adaptability and Flexibility: Embrace change and be open to new experiences and
perspectives. Being adaptable allows you to navigate various situations with ease.
Develop Social Skills: Cultivate good interpersonal skills by respecting others' opinions,
collaborating, and maintaining healthy relationships.
Practice Time Management: Prioritize tasks and set realistic deadlines. Effective time
management reduces stress and improves productivity.
Resilience and Perseverance: Learn from failures and setbacks, and use them as
opportunities for growth. Cultivate resilience to bounce back stronger from challenges.
Stay Authentic: Embrace your unique qualities and be true to yourself. Avoid pretending to
be someone you're not.
Surround Yourself with Positive Influences: Surround yourself with supportive and
inspiring individuals who encourage your personal growth.
Give Back and Help Others: Volunteering and helping others can foster a sense of
fulfilment and purpose in your life.
Seek Feedback: Request feedback from trusted friends, mentors, or colleagues to gain
insights into areas you can improve.
Day 4:
Body language, also known as nonverbal communication, refers to the use of physical
behaviors, expressions, and movements to convey information, feelings, and attitudes. It is
an essential aspect of human communication and plays a significant role in how we interact
with others and interpret their intentions. Body language can complement, reinforce, or even
contradict verbal communication, providing additional insights into a person's thoughts and
emotions.
Here are some common elements of body language and their possible interpretations:
Facial Expressions: The face is one of the most expressive parts of the body. Smiling
typically indicates happiness or friendliness, while frowning might signify displeasure or
sadness. Raised eyebrows can show surprise, and narrowed eyes might indicate suspicion or
skepticism.
Gestures: Hand movements and gestures can emphasize or reinforce spoken words. For
example, waving to say hello, nodding to show agreement, or pointing to direct attention.
Eye Contact: The level and duration of eye contact can reveal various emotions and
intentions. Maintaining eye contact can indicate attentiveness and sincerity, while avoiding
eye contact might signal discomfort, guilt, or dishonesty.
Touch: Physical touch can communicate a range of emotions, from comfort and support to
aggression or dominance. The meaning of touch varies across cultures and contexts.
Personal Space: The distance people maintain between themselves and others reflects their
comfort level and relationship. Intruding into someone's personal space might make them
feel uncomfortable or threatened.
Mirroring: People often unconsciously mimic the body language of those they are
interacting with. Mirroring can signal rapport and a sense of connection.
It's essential to remember that interpreting body language is not an exact science and can
vary based on cultural norms, personal traits, and context. Therefore, it is essential to
consider multiple cues and avoid making assumptions solely based on body language.
Day 5:
For industrial visit we went to Amey Industries. Amey industry is an ISO certified company
was established in 1986, from then company is recognized for its best quality and service to
its customers. Amey Industries are manufacturer of MV electrical components,
manufacturer of precision machined components. They are also a major developer of
mechanisms of switch gear assemblies.
Mr. Mukund Kulkarni, CEO, is Graduate in Mechanical engineering and has vast
experience in field of fixturing and tooling. His core competency is in development of jig,
welding fixtures and conventional milling fixtures.
They have developed tooling for welded shafts for our jobs. They have also developed
arrange of tooling for C&S electric Ltd, ABB Ltd, EFACEC India Ltd. Etc.
Amey industries has tresses in non-conventional area. We are extremely proud to say that
we are manufacturer of water pumping windmill for last one decade. Over 2000 windpumps
has been installed in and across India particularly in Gujarat, Rajasthan, Tamil Nadu, etc.
We have approved design of gear type windmill form central govt.
Detecting bugs in a website involves thorough testing and analysis to identify any issues or
defects that may affect its functionality, usability, or performance. Here are the steps to help
you effectively detect bugs in a website:
Functional Testing: Test all the functionalities of the website to ensure they work as
intended. This includes checking forms, buttons, links, navigation, login/logout, search,
and any interactive elements.
Cross-Browser Testing: Test the website on different web browsers (e.g., Chrome,
Firefox, Safari, Edge) to ensure compatibility and consistent performance across various
platforms.
Mobile Responsiveness Testing: Verify that the website is responsive and displays
correctly on different devices, such as smartphones, tablets, and desktops.
Performance Testing: Evaluate the website's loading speed and performance. Use tools
like Google PageSpeed Insights or GTmetrix to identify performance bottlenecks.
Security Testing: Check for potential security vulnerabilities, such as SQL injection,
cross-site scripting (XSS), or insecure authentication methods.
User Experience (UX) Testing: Gather feedback from users or conduct usability testing to
identify any issues related to the user experience, such as confusing navigation, slow load
times, or design inconsistencies.
Broken Links and Images: Verify that all internal and external links are working
correctly, and images are loading properly.
Form Validation: Test form submissions to ensure proper validation and handling of user
input. Check for errors in form submissions.
Accessibility Testing: Ensure that the website is accessible to all users, including those
with disabilities. Verify compliance with accessibility standards like WCAG (Web
Content Accessibility Guidelines).
Database Testing: If the website interacts with a database, test data integrity, retrieval,
and storage operations.
Error Handling: Check how the website handles error conditions, such as displaying
informative error messages to users.
Browser Developer Tools: Use browser developer tools (e.g., Chrome DevTools, Firefox
Developer Edition) to inspect and debug issues related to HTML, CSS, and JavaScript.
Automated Testing: Consider using automated testing tools to perform repetitive tests
efficiently and catch regressions after changes are made to the website.
User Feedback: Encourage users to provide feedback on their experience with the
website. User-reported issues can be valuable in identifying bugs.
Bug Tracking System: Use a bug tracking system or project management tool to
document and manage identified bugs, making it easier to track their status and resolution
progress.
By following these steps, you can systematically identify and address bugs in your website,
leading to a more stable, functional, and user-friendly online presence. Remember that the
bug detection process should be ongoing, especially during development and after updates or
changes to the website.