0% found this document useful (0 votes)
12 views

Ronik CISCO CS Final Document

Uploaded by

kalisettyrevanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Ronik CISCO CS Final Document

Uploaded by

kalisettyrevanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

An Internship Report

on

VIRTUAL INTERNSHIP PROGRAM IN CYBERSECURITY

Submitted In accordance with the requirement for the degree of

BACHELOR OF TECHNOLOGY

Electronics and Communication Engineering

Submitted by:
KALISETTY KAMAL
Reg. No:208X1A0459

Department of Electronics and Communication Engineering

Kallam Haranadhareddy Institute of Technology


(Autonomous)
Approved by (AICTE, New Delhi; Permanently Affiliated to JNTU,KAKINADA)
Accredited by NAAC with an ‘A’ Grade
NH – 16, Chowdavaram, Guntur – 522019 (A.P)
AY: 2023-2024
Program Book for Summer Internship - 2

Name of the Student: KALISETTY KAMAL

Name of the College: Kallam Haranadhareddy Institute Of Technology

Registration Number: 208X1A0459

Period of Internship: 8 Weeks From: 15-05-2023 To: 08-07-2023

Name & Address of the Intern Organization: CISCO

ii
Student’s Declaration

I, Kalisetty Kamal a student of B.Tech Program, Reg. No. 208X1A0459 of the Department

of ECE, Kallam Haranadhareddy Institute of Technology do hereby declare that I have

completed the mandatory internship virtually from MAY 2023 to JULY 2023 in VIRTUAL

INTERNSHIP PROGRAM IN CYBERSECURITY under the Faculty Guideship of

Dr.Ranjith Kumar Painam Ph.D.., Department of ECE, Kallam Haranadhareddy Institute of

Technology.

Signature and Date

Internship Coordinator External Examiner

Head of the Department Principal

iii
Internship Completion Certificate :

Student id -----STU64634fb6f1c451684230070

iv
ACKNOWLEDGEMENT

We profoundly express our gratitude and respect towards our honorable chairman SRI

KALLAM MOHAN REDDY , Chairman of KHIT for his precious support in the college.

We sincerely express our deepest gratitude to dynamic director of our institute Dr. M. UMA

SHANKARA REDDY M.Sc , Ph.D , Director of KHIT for his valuable guidance.

We owe our sincere gratitude to Dr. B.S.B. REDDY M.Tech , Ph.D, Principal of KHIT for

providing a great support and forgiving us the opportunity of doing the Internship.

Our deepest thanks to Dr. Sakhamuri Suryanarayana M.E., Ph.D.., Head of the Department

ECE for inspiring us all the way and for arranging all the facilities and resources needed for

our Internship.

It is with immense pleasure that we would like to express our indebted gratitude to our

Internship coordinator Dr.Ranjith Kumar Painam Ph.D.., Associate Professor who has

guided us a lot and encouraged us in every step of the intern project work, his valuable moral

support and guidance throughout the Intern project helped us to a greater extent.

KALISETTY KAMAL

208X1A0459

v
Table of Contents

Sl.no Title Pg.no

List of Tables
1 vii

List of Figures
2 viii

CHAPTER 1: EXECUTIVE SUMMARY


3 01-02

CHAPTER 2: OVERVIEW OF THE


4 ORGANIZATION 03-06

CHAPTER 3: INTERNSHIP PART


5 07

CHAPTER 4: ACTIVITY LOG & REPORT


6 08-19

CHAPTER 5: OUTCOMES DESCRIPTION


7 20

Self-Evaluation Form
8 21

Output Screens
9 22

vi
List of Tables

Table no. Table Description Page no.

CISCO Revenue
1 06

ACTIVITY LOG FOR THE


2 FIRST WEEK 08

ACTIVITY LOG FOR THE


3 SECOND WEEK 09

ACTIVITY LOG FOR THE


4 THIRD WEEK 10

ACTIVITY LOG FOR THE


5 FOURTH WEEK 11

ACTIVITY LOG FOR THE


6 FIFTH WEEK 12

ACTIVITY LOG FOR THE


7 SIXTH WEEK 13

ACTIVITY LOG FOR THE


8 SEVENTH WEEK 14

ACTIVITY LOG FOR THE


9 EIGHT WEEK 15

vii
List of Figures

Figure No. Figure Description Page No.

CISCO Organization
1 05

CISCO Network Academy


CyberSecurity Essentials I’m
2 22
Learning profile

CISCO Network Academy


CyberSecurity Essentials 22
3
completion status
CISCO Network Academy
4 CyberSecurity Essentials 23
completion Certificate
CISCO Network Academy
CyberSecurity Essentials
5 completion status along with 23
Introduction to Packet Tracer

Learning Transcript From


6 Cisco Networking Academy 24

Certificates list.
7 24

vii
i
CHAPTER 1: EXECUTIVE SUMMARY

The Cisco Cyber Security Essentials Internship is a comprehensive program that introduces
participants to the dynamic and critical world of cybersecurity.

Throughout the internship, I was exploring the following key areas:

Cybersecurity - A World of Experts and Criminals: The program begins by setting the stage,
emphasizing the ongoing battle between cybersecurity experts and cybercriminals. It
highlights the ever-evolving nature of the field and the importance of staying vigilant.

The Cybersecurity Cube (Three Dimensions): Participants are introduced to a foundational


framework in cybersecurity, often depicted as a three-dimensional cube. This framework
focuses on the core principles of confidentiality, integrity, and availability, forming the basis
for risk assessment and management.

Cybersecurity Threats, Vulnerabilities, and Attacks: This section equips participants with the
knowledge to understand various cyber threats, vulnerabilities, and common attack methods.
By identifying these threats, individuals can better prepare for and defend against cyberattacks.

The Art of Protecting Secrets (Cryptography): Cryptography, a fundamental aspect of


cybersecurity, is explored in depth. Participants will gain insight into the techniques and
algorithms used to secure data through encryption, ensuring that sensitive information remains
confidential.

The Art of Ensuring Integrity: Data integrity is paramount in cybersecurity. The program
covers methods for verifying data accuracy and preventing unauthorized modifications,
thereby preserving the trustworthiness of data.

The Five Nines Concept: High availability and reliability (99.999%) of systems and networks
are crucial in maintaining operational excellence. This concept is discussed to underscore the
significance of minimizing downtime and disruptions in the cyber world.

Protecting a Cybersecurity Domain (Defending Systems and Devices): Participants will delve
into practical aspects of cybersecurity, learning how to safeguard networks, systems, and
devices from a myriad of cyber threats. This includes understanding and implementing security
measures like firewalls, intrusion detection systems, and security best practices.

Becoming a Cybersecurity Specialist: The internship concludes with insights into career paths
within the cybersecurity field. It provides guidance on acquiring the skills and qualifications
needed to become a cybersecurity specialist, including certifications, professional
development opportunities, and potential career prospects.

1
In summary, the Cisco Cyber Security Essentials Internship offers a holistic and practical
education in the realm of cybersecurity. I was gain an understanding of the challenges,
strategies, and responsibilities inherent to the field, and will be well-prepared to embark on a
cybersecurity career or continue their education in this critical domain.

2
CHAPTER 2: OVERVIEW OF THE ORGANIZATION

A. Introduction of the Organization:


CISCO Systems, Inc., commonly known as Cisco, is a global technology company
headquartered in San Jose, California, USA. Founded in 1984 by Leonard Bosack and
Sandy Lerner, Cisco has established itself as a leading provider of networking,
cybersecurity, and communication technology solutions. The company's mission is to
enable people and organizations to connect, communicate, and collaborate securely and
effectively in the digital age.
Cisco's technologies are widely adopted across various industries, including businesses,
governments, educational institutions, and service providers worldwide. The company's
commitment to innovation, reliability, and its comprehensive approach to networking and
communication have solidified its position as a prominent and trusted player in the
technology industry.
As technology continues to evolve, Cisco remains at the forefront of developing and
delivering solutions that empower organizations to connect, communicate, and secure their
digital assets in an increasingly interconnected world.
Cisco Systems, Inc., known as Cisco, is a global technology leader headquartered in San
Jose, California. Key facets of Cisco's business encompass networking solutions,
cybersecurity, and communication technologies. Cisco's networking hardware, software,
and services empower organizations to build and manage networks, while its cybersecurity
offerings protect against cyber threats. The company facilitates unified communication and
collaboration through products like Cisco Webex, offers cloud and data centre solutions,
and plays a significant role in the Internet of Things (IoT) arena. Additionally, Cisco's
Networking Academy provides education and certifications in IT and networking. With a
commitment to innovation and comprehensive technology solutions, Cisco remains a
trusted enabler of connectivity, security, and collaboration in the digital age.
B. Vision, Mission and Values of the Organization :

CISCO Vision Statement:


Cisco's vision is to "power an inclusive future for all." They aim to leverage technology to
create opportunities, connect people and things, and make a positive impact on the world.
Cisco envisions a future where digital innovations enhance the quality of life and promote
global progress.

CISCO Mission Statement :


Cisco's mission is to "shape the future of the Internet by creating unprecedented value and
opportunity for customers, employees, investors, and ecosystem partners." They are
committed to delivering innovative networking, security, and collaboration solutions that
help organizations thrive in an ever-changing digital landscape.
CISCO Values
 Integrity
3
 Innovation
 Inclusion and Diversity
 Sustainability
 Customer Success:
 Collaboration
 Giving Back

C. Policy of the Organization, in relation with the intern role :

Cisco's policies regarding interns typically align with their commitment to providing a
positive and productive learning experience for interns. While specific policies may vary,
here are some common elements you might find in Cisco's internship policies:
1. Equal Opportunity and Inclusion
2. Learning and Development
3. Work-Life Balance
4. Inclusivity and Respect
5. Confidentiality and Data Security
6. Non-Discrimination and Harassment Prevention
7. Health and Safety
8. Intellectual Property
It's important to note that specific policies can vary based on the nature of the internship
and the location of the intern. Cisco typically provides its interns with a handbook or
orientation materials that outline these policies in more detail, and interns are expected to
adhere to these guidelines during their tenure with the company. To obtain the most
accurate and up-to-date information on Cisco's internship policies, it's recommended to
consult the company's official internship program documentation or contact the relevant
department or HR representative.

D. Organizational Structure :

Cisco's future plans center on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various cloud
providers. Cisco is also poised to delve deeper into IoT and industrial networking, exploring
innovative solutions for manufacturing, transportation, and smart cities. Artificial
intelligence and machine learning will likely play a more prominent role, enhancing
analytics for network management, security threat analysis, and user experiences.
Sustainability initiatives and reducing the environmental footprint are of increasing
importance. Cisco may intensify efforts in this area while continuing

4
Fig1: CISCO Organization

E. Roles and responsibilities of the employees in which the intern is placed:

Cisco's future plans centre on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various
cloud providers. Cisco is also poised to delve deeper into IoT and industrial networking,
exploring innovative solutions for manufacturing, transportation, and smart cities.
Artificial intelligence and machine learning will likely play a more prominent role,
enhancing analytics for network management, security threat analysis, and user
experiences. Sustainability initiatives and reducing the environmental footprint are of
increasing importance. Cisco may intensify efforts in this area while continuing
F. Performance of the Organization in terms of turnover, profits, market reach and
market value:

Cisco's future plans centre on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
5
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various
cloud providers. Cisco is also poised to delve deeper into IoT and industrial networking,
exploring innovative solutions for manufacturing, transportation, and smart cities.
Artificial intelligence and machine learning will likely play a more prominent role,
enhancing analytics for network management, security threat analysis, and user
experiences. Sustainability initiatives and reducing the environmental footprint are of
increasing importance. Cisco may intensify efforts in this area while continuing

Table1:CISCO Revenue

G. Future Plans of the Organization:

Cisco's future plans centre on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various
cloud providers. Cisco is also poised to delve deeper into IoT and industrial networking,
exploring innovative solutions for manufacturing, transportation, and smart cities.
Artificial intelligence and machine learning will likely play a more prominent role,
enhancing analytics for network management, security threat analysis, and user
experiences. Sustainability initiatives and reducing the environmental footprint are of
increasing importance. Cisco may intensify efforts in this area while continuing

6
CHAPTER 3: INTERNSHIP PART

The Sales Force Intern provides an opportunity to gain professional experience in a real-
world setting

Modules:
 Cybersecurity - A World of Experts and Criminals
 The Cybersecurity Cube(Three Dimensions)
 Cybersecurity Threats, Vulnerabilities, and Attacks
 The Art of Protecting Secrets(Cryptography)
 The Art of Ensuring Integrity
 The Five Nines Concept
 Protecting a Cybersecurity Domain(Defending Systems and Devices)
 Becoming a Cybersecurity Specialist
Quiz:
 1-8 modules Quiz
 Final Cybersecurity Essentials Quiz
 Final Packet Tracer Quiz

Projects:
Problem Statement: Choose a university/college campus and analyze its network topology.
Map the network using Cisco Packet Tracer and identify the security controls that are in place,
such as network segmentation, intrusion detection systems, firewalls, and authentication and
authorization systems. Apply the knowledge gained from the NetAcad cyber security course
to conduct an attack surface mapping, aiming to identify potential entry points for cyber-
attacks. Propose countermeasures to mitigate these risks.
Tasks:
1. Campus Network Analysis: Choose a university or college campus and conduct an analysis
of its existing network topology, including the layout, devices, and connections.
2. Network Mapping: Utilize Cisco Packet Tracer to map the network infrastructure,
representing the placement and interconnectivity of routers, switches, firewalls, and other
relevant network components.
3. Attack Surface Mapping: Conduct an attack surface mapping exercise to identify potential
vulnerabilities and weaknesses within the network architecture and design, considering factors
such as unauthorized access, data breaches, and network availability.
4. Secure Access Controls: Incorporate appropriate security controls (e.g., VLANs, IDP/IPS,
VPN, Firewalls, password management, vulnerability management etc.) in your design to
enhance security posture.
Deliverables:
1. Network topology diagram depicting the existing infrastructure and attack surface findings.
2. Security assessment report highlighting identified security risks, proposed solutions, and
countermeasures to mitigate attack surface risks.
Badges:
Cybersecurity Essentials
https://www.credly.com/badges/f2fde6c4-6e26-4603-8c29-0387fa5159a0/public_url

7
CHAPTER-4: ACTIVITY LOG AND REPORT

ACTIVITY LOG FOR THE FIRST WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

CHAPTER 1:Cybersecurity - A World of At a fundamental level, these


Experts and Criminals domains are strong because of the
Overview of the Cybersecurity Domains ability to collect user data
contributed by the users themselves.
Day – 1 This data often includes users’
(15/05/2023) backgrounds, discussions, likes,
locations, travels, interests, friends
and family members, professions,
hobbies, and work and personal
schedules.
Cybersecurity Criminals versus Cybersecurity The role of cyber criminals and
Specialists their motivations. Finally, the
chapter explains how to become a
Day – 2
cybersecurity specialist. These
(16/05/2023)
cybersecurity specialists help defeat
the cyber criminals that threaten the
cyber world
Threat Arenas Cyber threats are particularly
Day – 3 dangerous to certain industries and
(17/05/2023) the records they must maintain.

Heightened Recognition of Cybersecurity Threats The new generation of attacks


and Threat complexity involves intelligent selection of
victims. In the past, attacks would
Day – 4 select the low hanging fruit or most
(18/05/2023) vulnerable victims. However, with
greater attention to detection and
isolation of cyberattacks, cyber
criminals must be more careful
A workforce Framework for CyberSecurity The specialty areas then define
Day – 5 common types of cybersecurity
(19/05/2023) work like security provisioning
,operate, collect and analyse etc..,
Online Cybersecurity Communities International technology
organizations often sponsor
Day – 6 workshops and conferences. These
(20/05/2023) organizations often keep
cybersecurity professionals inspired
and motivated.

8
ACTIVITY LOG FOR THE SECOND WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

CHAPTER 2:The Cybersecurity Cube The central responsibility of a


The Three Dimensions of the Cybersecurity Cube cybersecurity professional is to
Day – 1 protect an organization’s systems
(22/05/2023) and data.

CIA Triad(Confidentiality ,Integrity and Three dimensions of the


Availability) cybersecurity cube.
Day – 2 and how each of the three
(23/05/2023) dimensions contributes to that effort

The ISO Cybersecurity Model A model which represents an


international framework to
Day – 3 standardize the management of
(24/05/2023) information systems

Cybersecurity Countermeasures, Policies and The model provides control


Procedures objectives that guide the high-level
Day – 4 design and implementation of a
(25/05/2023) comprehensive information security
management system (ISMS).

Lab - Exploring Authentication, Authorization, and Examine, identify, and configure the
Accounting appropriate authentication,
Day – 5 authorization or access controls.
(26/05/2023) You will also install and configure
security controls

Packet Tracer - Exploring File and Data Encryption o Locate the FTP
Account Credentials
for Mary’s Laptop
o Upload Confidential
Data using FTP
o Locate the FTP
Day – 6 Account Credentials
(27/05/2023) for Bob’s PC
o Download
Confidential Data
using FTP
o Decrypt the Contents

9
ACTIVITY LOG FOR THE THIRD WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

CHAPTER 3: Cybersecurity Threats, Viruses, Worms, and Trojan Horses


Vulnerabilities, and Attacks Vishing, Smishing, Pharming, and
 Types of Malware Whaling and defending methods
Day – 1
 Email and Browser attacks against email and browsing attacks
(29/05/2023) as well as against malware

 Types of Cyberattacks Denial of Service,


 Deception methods Spoofing,Sniffing and Man-in-the-
Day – 2 middle.
(30/05/2023) Shoulder Surfing and Dumpster
Diving, Impersonation and Hoaxes
and Piggybacking and Tailgating
Lab - Detecting Threats and Vulnerabilities This lab was about to know tools
that can detect threats and remove
Day – 3
(31/05/2023) vulnerabilities from a host.

Wireless and Mobile Device Attacks Grayware and Smishing, Rogue


Access Points, RF Jamming,
Day – 4 Bluejacking and Bluesnarfing, WEP
(01/06/2023) and WPA Attacks and defending
methods

Packet Tracer - Configuring WEP/WPA2 It was introduce security measures


PSK/WPA2 RADIUS used to prevent attacks on mobile
and wireless devices.

Configure WEP for Healthcare at


Day – 5 Home
(02/06/2023)
Configure WPA2 PSK for Gotham
Healthcare Branch

Configure WPA2 RADIUS for


Metropolis Bank HQ

Application Attacks. Cross-Site Scripting, Code


Injection, Buffer Overflow, Remote
Day – 6 Code Executions,
(03/06/2023)

10
ACTIVITY LOG FOR THE FOURTH WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

Chapter 4: The Art of Protecting Secrets Symmetric and asymmetric


 Cryptography algorithms(3DES (Triple
 Types of Encryption DES),RSA (Rivest-Shamir-
 Types of Cryptography Adleman, Diffie-Hellman, Elliptic
Day – 1
 What You Know, What You Have, Who Curve Cryptography (ECC))
(05/06/2023)
You Are Block Ciphers, Stream Ciphers
Identification, Authorization,
Authentication, Accountability

Types of Access Controls Guards ,Fences ,Motion detectors


 Physical Access Controls ,Laptop locks ,Locked doors ,Swipe
 Logical Access Controls cards ,Guard dogs ,Video camera
 Administrative Access Controls ,Encryption ,Smart cards
Day – 2
Types of Access Controls strategies ,Passwords ,Biometrics ,Access
(06/06/2023)
 Mandatory Access Control Control Lists (ACLs) ,Protocols
 Discretionary Access Control(DAC) ,Firewalls ,Policies etc..,
 Role-Based Access Control

Types of Security Controls Deterrent Controls, Detective


Controls, Corrective Controls,
Day – 3 Recovery Controls, Compensative
(07/06/2023) Controls and Prevention Controls

Lab – Using Steganography The objective of this lab is use


steganography to hide a document
Day – 4 within a JPEG file.
(08/06/2023)

Data Masking and Steganography  Substitution ,Shuffling


,Nulling
Day – 5
 Social Steganography,
(09/06/2023)
Detection, Obfuscation

Packet Tracer - Configuring VPN Transport Mode  Sending Unencrypted FTP


Traffic
 Configuring the VPN Client
Day – 6 within Metropolis
(10/06/2023)  Sending Encrypted FTP
Traffic

11
ACTIVITY LOG FOR THE FIFTH WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

Chapter 5: The Art of Ensuring Integrity Hashing Algorithms(MD5,SHA)


Types of Data Integrity Controls Preventing Attacks(Lookup Tables,
Day – 1 Salting Reverse Lookup Tables, Rainbow
(12/06/2023) Tables)

Lab - Password Cracking Use a password cracking tool to


recover a user’s password
Day – 2
(13/06/2023)

Digital Signature Non-Repudiation


 Process Code signing, Digital certificates
Day – 3  Using Digital Signatures
(14/06/2023)

Lab - Using Digital Signatures  Understand the concepts


behind digital signatures.
Day – 4  Demonstrate the use of
(15/06/2023) digital signatures.
 Demonstrate the verification
of a digital signature.
 Database Integrity Database Validation(Validation
 Data Validation Rules, Data Type, Input Validation,
Day – 5  Database Integrity Requirements Anamoly Verification)
(16/06/2023) Requirements(Entity, Referential,
Domain Integrity)

Lab - Use Wireshark to Compare Telnet and SSH  Use Wireshark to capture web
Traffic browser traffic.
 Use Wireshark to capture
Day – 6
Telnet traffic.
(17/06/2023)
 Use Wireshark to capture SSH
traffic.

12
ACTIVITY LOG FOR THE SIXTH WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

Chapter 6: The Five Nines Concept


High availability High availability refers to a system or
component that is continuously operational
for a given length of time. To help ensure
high availability:
Day – 1
Eliminate single points of failure
(19/06/2023)
Design for reliability

Detect failures as they occur

Measures to Improve Availability Asset Identification, Asset Classification,


Asset Management Asset Standardization, Threat
Day – 2 Identification, Risk Analysis, Mitigation
(20/06/2023)

 Defence In Depth  Layering,Limiting,Diversty,


 Redundancy Obscurity
Day – 3  System Resilience  Spanning tree, Singlepoint of
(21/06/2023) Failure, RAID
 IOS, Application Resilience

Packet Tracer - Router and Switch In this Packet Tracer activity, we was
Redundancy completed the following objectives:
Day – 4  Observe a Network Failover with
(22/06/2023) Redundant Routers
 Observe a Network Failover with
Redundant Switches
Incident Response Containment and Eradication, and
Recovery Incident Response
Day – 5 Technologies(NetFlow and IPFIX)
(23/06/2023)

Disaster Recovery Implementing Disaster Recovery Controls,


Disaster Recovery Plan(DRP),
Day – 6 Business Continuity Planning(BCP)
(24/06/2023)

13
ACTIVITY LOG FOR THE SEVENTH WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

Chapter 7: Protecting a Cybersecurity (Anti Malware, Patch Management, Host-


Domain Based Firewalls and Intrusion Detection
Defending Systems and Devices Systems)
 Host Hardening (WEP, WPA/WPA2, Mutual
Day – 1
 Hardening Wireless and Mobile Authentication..)
(26/06/2023)
Devices (File access, File encryption and system &
 Host Data Protection data backup)

Lab – Hardening a Linux System In this lab, we was demonstrate the use of a
security auditing tool to harden a Linux
Day – 2 system.
(27/06/2023)

Software Hardening Secure Remote Access


Administrative Measures
Day – 3 Physical protection of servers
(28/06/2023)

Network Hardening Securing Network Devices


Voice and Video Equipment
Day – 4
(29/06/2023)

Physical Security Physical Access Control


Surveillance
Day – 5
(30/06/2023)

Packet Tracer – Server Firewalls and Router In this Packet Tracer activity, we was
ACLs completed the following objectives:
 Connect to the Web Server
Day – 6
 Prevent Unencrypted HTTP
(01/07/2023)
Sessions
 Access the Firewall on the Email
Server

14
ACTIVITY LOG FOR THE EIGHT WEEK

DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE

Chapter 8: Becoming a Cybersecurity Specialist Develop user awareness and secure


Cybersecurity Domains practices to mitigate social
 User Domain engineering threats, enforce access
Day – 1
 Device Domain controls, and implement multi-
(03/07/2023)
 Local Area Network Domain factor authentication.

 Private Cloud (WAN) Domain Understand cloud architecture and


 Public Cloud Domain security, configure secure wide-area
 Physical Facilities Domain network (WAN) connectivity, and
 Application Domain implement access controls for cloud
Day – 2 resources. Develop skills in secure
(04/07/2023) software development, conduct
vulnerability assessments, and
ensure application-level security by
implementing best practices in
coding and testing.
Understanding the Ethics of Working in Ethics and Guiding Principles
Cybersecurity Cyber Laws and Liability(Civil,
Criminal, and Regulatory Cyber
Day – 3 Laws)
(05/07/2023)

Cybersecurity Information Websites National Vulnerability Database


CERT
Internet Storm Center
Day – 4
The Advanced Cyber Security
(06/07/2023)
Center

Cybersecurity Weapons Vulnerability Scanners


Penetration Testing
Day – 5 Packet Analyzers
(07/07/2023) Security Tools(Kali)

This culminating activity includes


Packet Tracer - Skills Integration Challenge. many of the skills that you have
acquired during this course. We
Day – 6 was configure a wireless router,
(08/07/2023) upload and download files using
FTP, connect securely to a remote
site using a VPN, and secure a
Cisco IOS router

15
WEEKLY REPORT
WEEK – 1 (From Dt: 15-05-2023 to Dt: 20-05-2023)

Ability to collect user data contributed by the ourselves

How to became cybersecurity specialists to help defeat the cyber criminals that threaten the cyber world

Threats are particularly dangerous to certain industries and the records they must maintain.

Greater attention to detection and isolation of cyberattacks, cyber criminals must be more careful

Security provisioning ,operate, collect and analyse etc..,

Inspired and motivated by cybersecurity professionals.

WEEKLY REPORT
WEEK – 2 (From Dt: 22-05-2023 to Dt: 27-05-2023)

Study about Cybersecurity cube(Confidentiality, Integrity, Availability)

Know about how each of the three dimensions contributes to that effort

Understanding about international framework to standardize the management of information systems

Understand about control objectives that guide the high-level design and implementation of a
comprehensive information security management system (ISMS).
Lab activity: Install and configure security controls

 Locate the FTP Account Credentials for Mary’s Laptop

 Upload Confidential Data using FTP

 Locate the FTP Account Credentials for Bob’s PC

 Download Confidential Data using FTP

 Decrypt the Contents of the clientinfo.txt File

16
WEEKLY REPORT
WEEK – 3 (From Dt: 29-05-2023 to Dt: 03-06-2023)

Know about Malware types-Viruses, Worms, and Trojan Horses


Email and Browser Attacks-Vishing, Smishing, Pharming, and Whaling
Know about Defending methods against email and browsing attacks as well as against malware

Know about tools that can detect threats and remove vulnerabilities from a host.

Know about Wireless and Mobile Device Attacks -Grayware and Smishing, Rogue Access Points, RF
Jamming, Bluejacking and Bluesnarfing, WEP and WPA Attacks
Lab activity: Introduce security measures used to prevent attacks on mobile and wireless devices.

Configure WEP for Healthcare at Home

Configure WPA2 PSK for Gotham Healthcare Branch

Configure WPA2 RADIUS for Metropolis Bank HQ

Know about application attacks -Cross-Site Scripting, Code Injection, Buffer Overflow, Remote Code
Executions.

WEEKLY REPORT
WEEK – 4(From Dt: 05-06-2023 to Dt: 10-06-2023)

Study about Cryptographic Algorithms-Symmetric and asymmetric algorithms(3DES (Triple DES),RSA


(Rivest-Shamir-Adleman, Diffie-Hellman, Elliptic Curve Cryptography (ECC))

Study about Access Controls-Guards ,Fences ,Motion detectors ,Laptop locks ,Locked doors ,Swipe
cards ,Guard dogs ,Video camera ,Encryption ,Smart cards ,Passwords ,Biometrics ,Access Control Lists
(ACLs) ,Protocols ,Firewalls ,Policies etc..,
Gaining more knowledge about Identification, Authorization, Authentication, Accountability

Lab activity: The objective of steganography activity lab to hide a document within a JPEG file.

Data Masking and it’s Techniques(Substitution ,Shuffling ,Nulling, Social Steganography, Detection,
Obfuscation
Lab activity :Packet Tracer - Configuring VPN Transport Mode

 Sending Unencrypted FTP Traffic

 Configuring the VPN Client within Metropolis

 Sending Encrypted FTP Traffic

17
WEEKLY REPORT
WEEK – 5 (From Dt: 12-06-2023 to Dt: 17-06-2023)

Study about Hashing Algorithms(MD5,SHA)

Study about Preventing Attacks(Lookup Tables, Reverse Lookup Tables, Rainbow Tables)

Lab activity: Use a password cracking tool to recover a user’s password

Digital Signatures Concept(Non-Repudiation)-Code signing, Digital certificates

Database Validation(Validation Rules, Data Type, Input Validation, Anamoly


Verification)Requirements(Entity, Referential, Domain Integrity)
Lab activity: Use Wireshark to Compare Telnet and SSH Traffic

 Use Wireshark to capture web browser traffic

 Use Wireshark to capture Telnet traffic.

 Use Wireshark to capture SSH traffic.

WEEKLY REPORT
WEEK – 6 (From Dt: 19-06-2023 to Dt: 24-06-2023)

Learn about High availability features Eliminate single points of failure, Design for reliability

Study about Asset Management -Asset Identification, Asset Classification, Asset Standardization, Threat
Identification, Risk Analysis, Mitigation
Study about Defence In Depth ,Redundancy ,System Resilience

Lab activity: In this Packet Tracer activity, you will complete the following objectives:

 Observe a Network Failover with Redundant Routers

 Observe a Network Failover with Redundant Switches

Learn about Incident Response and Technologies(NetFlow and IPFIX)

Study about Disaster Recovery and know about DRP,BCP

18
WEEKLY REPORT
WEEK – 7 (From Dt: 26-06-2023 to Dt: 01-07-2023)

Learn about Defending systems and Host Hardening-Anti Malware, Patch Management, Host-Based
Firewalls and Intrusion Detection Systems
Lab activity: Hardening a Linux System –
demonstrate the use of a security auditing tool to harden a Linux system.
Study about Secure Hardening(Secure Remote Access, Administrative Measures, Physical protection of
servers)

Study about Network Hardening (Securing Network Devices, Voice and Video Equipment)

Study about Physical Hardening(Physical Access Control, Surveillance)

Lab activity: In this Packet Tracer activity completed the following objectives:

 Connect to the Web Server

 Prevent Unencrypted HTTP Sessions

 Access the Firewall on the Email Server

WEEKLY REPORT
WEEK – 8 (From Dt: 03-07-2023 to Dt: 08-07-2023)

Develop user awareness and secure practices to mitigate social engineering threats, enforce access
controls, and implement multi-factor authentication.
Understand cloud architecture and security, configure secure wide-area network (WAN) connectivity,
and implement access controls for cloud resources.
Develop skills in secure software development, conduct vulnerability assessments, and ensure
application-level security by implementing best practices in coding and testing.
Understanding about the Ethics of Working in Cybersecurity
Understanding about Cybersecurity Websites
Understanding about Cybersecurity Weapons

Lab Challenge: Packet Tracer - Skills Integration Challenge.

 configure a wireless router, upload and download files using FTP, connect securely to a remote site
using a

VPN, and secure a Cisco IOS router

19
CHAPTER 5: OUTCOMES DESCRIPTION

1. Cybersecurity - A World of Experts and Criminals:

An exploration of the dual landscape of cybersecurity, involving both experts dedicated to safeguarding
systems and criminals seeking to exploit vulnerabilities.

2. The Cybersecurity Cube (Three Dimensions):

Introduction to the three critical dimensions of cybersecurity—confidentiality, integrity, and


availability—forming the basis for comprehensive protection strategies.

3. Cybersecurity Threats, Vulnerabilities, and Attacks:

Analysis of common cybersecurity threats, identification of vulnerabilities, and an understanding of


the various types of cyber-attacks that organizations may face.

4. The Art of Protecting Secrets (Cryptography):

Delving into the intricate world of cryptography as a fundamental tool for securing information by
encoding it, ensuring confidentiality in communication and data storage.

5. The Art of Ensuring Integrity:

Exploring methods and practices aimed at maintaining the accuracy and trustworthiness of data, a
critical aspect of cybersecurity to prevent unauthorized alterations.

6. The Five Nines Concept:

Introduction to the "Five Nines" principle, emphasizing the goal of achieving 99.999% system
reliability and availability, a crucial benchmark in cybersecurity.

7. Protecting a Cybersecurity Domain (Defending Systems and Devices):

Strategies for safeguarding cybersecurity domains by implementing defensive measures to protect


systems and devices from unauthorized access, malware, and other threats.

8. Becoming a Cybersecurity Specialist:

Insights into the skills, knowledge, and pathways involved in pursuing a career as a cybersecurity
specialist, including the importance of continuous learning and staying updated on evolving threats.

20
Student Self-Evaluation for the Short-Term Internship

Student Name: Kalisetty Kamal & Registration No: 208X1A0459

Term of Internship: 8 Weeks From: 15-05-2023 To: 08-07-2023


Date of Evaluation:

Organization Name & Address: CISCO

Name and Address of the Supervisor: Dr.Ranjith Kumar Painam Ph.D.., & Guntur.

Please rate your performance in the following areas:

Rating Scale: 1 is lowest and 5 is highest rank

1) Oral communication 1 2 3 4 5

2) Written communication 1 2 3 4 5

3) Proactiveness 1 2 3 4 5

4) Interaction ability with community 1 2 3 4 5

5) Positive Attitude 1 2 3 4 5

6) Self-confidence 1 2 3 4 5

7) Ability to learn 1 2 3 4 5

8) Work Plan and organization 1 2 3 4 5

9) Professionalism 1 2 3 4 5

10) Creativity 1 2 3 4 5

11) Quality of work done 1 2 3 4 5

12) Time Management 1 2 3 4 5

13) Understanding the Community 1 2 3 4 5

14) Achievement of Desired Outcomes 1 2 3 4 5

15) OVERALL PERFORMANCE 1 2 3 4 5

Date: Signature of the Student

21
OUTPUT SCREENS

Fig2: CISCO Network Academy CyberSecurity Essentials Learning profile.

Student ID: STU64634fb6f1c451684230070

Fig3: CISCO Network Academy CyberSecurity Essentials completion status.

22
Fig4: CISCO Network Academy CyberSecurity Essentials completion Certificate .

23
Fig5: Learning Transcript From Cisco Networking Academy.

24
Fig6: Certificates list.

25

You might also like