Ronik CISCO CS Final Document
Ronik CISCO CS Final Document
on
BACHELOR OF TECHNOLOGY
Submitted by:
KALISETTY KAMAL
Reg. No:208X1A0459
ii
Student’s Declaration
I, Kalisetty Kamal a student of B.Tech Program, Reg. No. 208X1A0459 of the Department
completed the mandatory internship virtually from MAY 2023 to JULY 2023 in VIRTUAL
Technology.
iii
Internship Completion Certificate :
Student id -----STU64634fb6f1c451684230070
iv
ACKNOWLEDGEMENT
We profoundly express our gratitude and respect towards our honorable chairman SRI
KALLAM MOHAN REDDY , Chairman of KHIT for his precious support in the college.
We sincerely express our deepest gratitude to dynamic director of our institute Dr. M. UMA
SHANKARA REDDY M.Sc , Ph.D , Director of KHIT for his valuable guidance.
We owe our sincere gratitude to Dr. B.S.B. REDDY M.Tech , Ph.D, Principal of KHIT for
providing a great support and forgiving us the opportunity of doing the Internship.
Our deepest thanks to Dr. Sakhamuri Suryanarayana M.E., Ph.D.., Head of the Department
ECE for inspiring us all the way and for arranging all the facilities and resources needed for
our Internship.
It is with immense pleasure that we would like to express our indebted gratitude to our
Internship coordinator Dr.Ranjith Kumar Painam Ph.D.., Associate Professor who has
guided us a lot and encouraged us in every step of the intern project work, his valuable moral
support and guidance throughout the Intern project helped us to a greater extent.
KALISETTY KAMAL
208X1A0459
v
Table of Contents
List of Tables
1 vii
List of Figures
2 viii
Self-Evaluation Form
8 21
Output Screens
9 22
vi
List of Tables
CISCO Revenue
1 06
vii
List of Figures
CISCO Organization
1 05
Certificates list.
7 24
vii
i
CHAPTER 1: EXECUTIVE SUMMARY
The Cisco Cyber Security Essentials Internship is a comprehensive program that introduces
participants to the dynamic and critical world of cybersecurity.
Cybersecurity - A World of Experts and Criminals: The program begins by setting the stage,
emphasizing the ongoing battle between cybersecurity experts and cybercriminals. It
highlights the ever-evolving nature of the field and the importance of staying vigilant.
Cybersecurity Threats, Vulnerabilities, and Attacks: This section equips participants with the
knowledge to understand various cyber threats, vulnerabilities, and common attack methods.
By identifying these threats, individuals can better prepare for and defend against cyberattacks.
The Art of Ensuring Integrity: Data integrity is paramount in cybersecurity. The program
covers methods for verifying data accuracy and preventing unauthorized modifications,
thereby preserving the trustworthiness of data.
The Five Nines Concept: High availability and reliability (99.999%) of systems and networks
are crucial in maintaining operational excellence. This concept is discussed to underscore the
significance of minimizing downtime and disruptions in the cyber world.
Protecting a Cybersecurity Domain (Defending Systems and Devices): Participants will delve
into practical aspects of cybersecurity, learning how to safeguard networks, systems, and
devices from a myriad of cyber threats. This includes understanding and implementing security
measures like firewalls, intrusion detection systems, and security best practices.
Becoming a Cybersecurity Specialist: The internship concludes with insights into career paths
within the cybersecurity field. It provides guidance on acquiring the skills and qualifications
needed to become a cybersecurity specialist, including certifications, professional
development opportunities, and potential career prospects.
1
In summary, the Cisco Cyber Security Essentials Internship offers a holistic and practical
education in the realm of cybersecurity. I was gain an understanding of the challenges,
strategies, and responsibilities inherent to the field, and will be well-prepared to embark on a
cybersecurity career or continue their education in this critical domain.
2
CHAPTER 2: OVERVIEW OF THE ORGANIZATION
Cisco's policies regarding interns typically align with their commitment to providing a
positive and productive learning experience for interns. While specific policies may vary,
here are some common elements you might find in Cisco's internship policies:
1. Equal Opportunity and Inclusion
2. Learning and Development
3. Work-Life Balance
4. Inclusivity and Respect
5. Confidentiality and Data Security
6. Non-Discrimination and Harassment Prevention
7. Health and Safety
8. Intellectual Property
It's important to note that specific policies can vary based on the nature of the internship
and the location of the intern. Cisco typically provides its interns with a handbook or
orientation materials that outline these policies in more detail, and interns are expected to
adhere to these guidelines during their tenure with the company. To obtain the most
accurate and up-to-date information on Cisco's internship policies, it's recommended to
consult the company's official internship program documentation or contact the relevant
department or HR representative.
D. Organizational Structure :
Cisco's future plans center on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various cloud
providers. Cisco is also poised to delve deeper into IoT and industrial networking, exploring
innovative solutions for manufacturing, transportation, and smart cities. Artificial
intelligence and machine learning will likely play a more prominent role, enhancing
analytics for network management, security threat analysis, and user experiences.
Sustainability initiatives and reducing the environmental footprint are of increasing
importance. Cisco may intensify efforts in this area while continuing
4
Fig1: CISCO Organization
Cisco's future plans centre on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various
cloud providers. Cisco is also poised to delve deeper into IoT and industrial networking,
exploring innovative solutions for manufacturing, transportation, and smart cities.
Artificial intelligence and machine learning will likely play a more prominent role,
enhancing analytics for network management, security threat analysis, and user
experiences. Sustainability initiatives and reducing the environmental footprint are of
increasing importance. Cisco may intensify efforts in this area while continuing
F. Performance of the Organization in terms of turnover, profits, market reach and
market value:
Cisco's future plans centre on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
5
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various
cloud providers. Cisco is also poised to delve deeper into IoT and industrial networking,
exploring innovative solutions for manufacturing, transportation, and smart cities.
Artificial intelligence and machine learning will likely play a more prominent role,
enhancing analytics for network management, security threat analysis, and user
experiences. Sustainability initiatives and reducing the environmental footprint are of
increasing importance. Cisco may intensify efforts in this area while continuing
Table1:CISCO Revenue
Cisco's future plans centre on a dynamic technology landscape. The company is likely to
concentrate on supporting digital transformation, enabling customers to harness technology
for operational enhancements. Embracing 5G and edge computing, Cisco may seek
opportunities in edge solutions and services to cater to the demands of an increasingly
interconnected world. Cybersecurity innovation remains a priority, with a focus on threat
detection and prevention, identity and access management, and the integration of AI and
ML for proactive security measures. Cisco's commitment to software-defined networking
(SDN) and intent-based networking is expected to persist, furthering network automation
and flexibility. They may expand cloud services to facilitate hybrid and multicloud
environments, allowing seamless management of data and applications across various
cloud providers. Cisco is also poised to delve deeper into IoT and industrial networking,
exploring innovative solutions for manufacturing, transportation, and smart cities.
Artificial intelligence and machine learning will likely play a more prominent role,
enhancing analytics for network management, security threat analysis, and user
experiences. Sustainability initiatives and reducing the environmental footprint are of
increasing importance. Cisco may intensify efforts in this area while continuing
6
CHAPTER 3: INTERNSHIP PART
The Sales Force Intern provides an opportunity to gain professional experience in a real-
world setting
Modules:
Cybersecurity - A World of Experts and Criminals
The Cybersecurity Cube(Three Dimensions)
Cybersecurity Threats, Vulnerabilities, and Attacks
The Art of Protecting Secrets(Cryptography)
The Art of Ensuring Integrity
The Five Nines Concept
Protecting a Cybersecurity Domain(Defending Systems and Devices)
Becoming a Cybersecurity Specialist
Quiz:
1-8 modules Quiz
Final Cybersecurity Essentials Quiz
Final Packet Tracer Quiz
Projects:
Problem Statement: Choose a university/college campus and analyze its network topology.
Map the network using Cisco Packet Tracer and identify the security controls that are in place,
such as network segmentation, intrusion detection systems, firewalls, and authentication and
authorization systems. Apply the knowledge gained from the NetAcad cyber security course
to conduct an attack surface mapping, aiming to identify potential entry points for cyber-
attacks. Propose countermeasures to mitigate these risks.
Tasks:
1. Campus Network Analysis: Choose a university or college campus and conduct an analysis
of its existing network topology, including the layout, devices, and connections.
2. Network Mapping: Utilize Cisco Packet Tracer to map the network infrastructure,
representing the placement and interconnectivity of routers, switches, firewalls, and other
relevant network components.
3. Attack Surface Mapping: Conduct an attack surface mapping exercise to identify potential
vulnerabilities and weaknesses within the network architecture and design, considering factors
such as unauthorized access, data breaches, and network availability.
4. Secure Access Controls: Incorporate appropriate security controls (e.g., VLANs, IDP/IPS,
VPN, Firewalls, password management, vulnerability management etc.) in your design to
enhance security posture.
Deliverables:
1. Network topology diagram depicting the existing infrastructure and attack surface findings.
2. Security assessment report highlighting identified security risks, proposed solutions, and
countermeasures to mitigate attack surface risks.
Badges:
Cybersecurity Essentials
https://www.credly.com/badges/f2fde6c4-6e26-4603-8c29-0387fa5159a0/public_url
7
CHAPTER-4: ACTIVITY LOG AND REPORT
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
8
ACTIVITY LOG FOR THE SECOND WEEK
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
Lab - Exploring Authentication, Authorization, and Examine, identify, and configure the
Accounting appropriate authentication,
Day – 5 authorization or access controls.
(26/05/2023) You will also install and configure
security controls
Packet Tracer - Exploring File and Data Encryption o Locate the FTP
Account Credentials
for Mary’s Laptop
o Upload Confidential
Data using FTP
o Locate the FTP
Day – 6 Account Credentials
(27/05/2023) for Bob’s PC
o Download
Confidential Data
using FTP
o Decrypt the Contents
9
ACTIVITY LOG FOR THE THIRD WEEK
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
10
ACTIVITY LOG FOR THE FOURTH WEEK
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
11
ACTIVITY LOG FOR THE FIFTH WEEK
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
Lab - Use Wireshark to Compare Telnet and SSH Use Wireshark to capture web
Traffic browser traffic.
Use Wireshark to capture
Day – 6
Telnet traffic.
(17/06/2023)
Use Wireshark to capture SSH
traffic.
12
ACTIVITY LOG FOR THE SIXTH WEEK
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
Packet Tracer - Router and Switch In this Packet Tracer activity, we was
Redundancy completed the following objectives:
Day – 4 Observe a Network Failover with
(22/06/2023) Redundant Routers
Observe a Network Failover with
Redundant Switches
Incident Response Containment and Eradication, and
Recovery Incident Response
Day – 5 Technologies(NetFlow and IPFIX)
(23/06/2023)
13
ACTIVITY LOG FOR THE SEVENTH WEEK
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
Lab – Hardening a Linux System In this lab, we was demonstrate the use of a
security auditing tool to harden a Linux
Day – 2 system.
(27/06/2023)
Packet Tracer – Server Firewalls and Router In this Packet Tracer activity, we was
ACLs completed the following objectives:
Connect to the Web Server
Day – 6
Prevent Unencrypted HTTP
(01/07/2023)
Sessions
Access the Firewall on the Email
Server
14
ACTIVITY LOG FOR THE EIGHT WEEK
DAY
BRIEF DESCRIPTION OF THE DAILY
& LEARNING OUTCOME
ACTIVITY
DATE
15
WEEKLY REPORT
WEEK – 1 (From Dt: 15-05-2023 to Dt: 20-05-2023)
How to became cybersecurity specialists to help defeat the cyber criminals that threaten the cyber world
Threats are particularly dangerous to certain industries and the records they must maintain.
Greater attention to detection and isolation of cyberattacks, cyber criminals must be more careful
WEEKLY REPORT
WEEK – 2 (From Dt: 22-05-2023 to Dt: 27-05-2023)
Know about how each of the three dimensions contributes to that effort
Understand about control objectives that guide the high-level design and implementation of a
comprehensive information security management system (ISMS).
Lab activity: Install and configure security controls
16
WEEKLY REPORT
WEEK – 3 (From Dt: 29-05-2023 to Dt: 03-06-2023)
Know about tools that can detect threats and remove vulnerabilities from a host.
Know about Wireless and Mobile Device Attacks -Grayware and Smishing, Rogue Access Points, RF
Jamming, Bluejacking and Bluesnarfing, WEP and WPA Attacks
Lab activity: Introduce security measures used to prevent attacks on mobile and wireless devices.
Know about application attacks -Cross-Site Scripting, Code Injection, Buffer Overflow, Remote Code
Executions.
WEEKLY REPORT
WEEK – 4(From Dt: 05-06-2023 to Dt: 10-06-2023)
Study about Access Controls-Guards ,Fences ,Motion detectors ,Laptop locks ,Locked doors ,Swipe
cards ,Guard dogs ,Video camera ,Encryption ,Smart cards ,Passwords ,Biometrics ,Access Control Lists
(ACLs) ,Protocols ,Firewalls ,Policies etc..,
Gaining more knowledge about Identification, Authorization, Authentication, Accountability
Lab activity: The objective of steganography activity lab to hide a document within a JPEG file.
Data Masking and it’s Techniques(Substitution ,Shuffling ,Nulling, Social Steganography, Detection,
Obfuscation
Lab activity :Packet Tracer - Configuring VPN Transport Mode
17
WEEKLY REPORT
WEEK – 5 (From Dt: 12-06-2023 to Dt: 17-06-2023)
Study about Preventing Attacks(Lookup Tables, Reverse Lookup Tables, Rainbow Tables)
WEEKLY REPORT
WEEK – 6 (From Dt: 19-06-2023 to Dt: 24-06-2023)
Learn about High availability features Eliminate single points of failure, Design for reliability
Study about Asset Management -Asset Identification, Asset Classification, Asset Standardization, Threat
Identification, Risk Analysis, Mitigation
Study about Defence In Depth ,Redundancy ,System Resilience
Lab activity: In this Packet Tracer activity, you will complete the following objectives:
18
WEEKLY REPORT
WEEK – 7 (From Dt: 26-06-2023 to Dt: 01-07-2023)
Learn about Defending systems and Host Hardening-Anti Malware, Patch Management, Host-Based
Firewalls and Intrusion Detection Systems
Lab activity: Hardening a Linux System –
demonstrate the use of a security auditing tool to harden a Linux system.
Study about Secure Hardening(Secure Remote Access, Administrative Measures, Physical protection of
servers)
Study about Network Hardening (Securing Network Devices, Voice and Video Equipment)
Lab activity: In this Packet Tracer activity completed the following objectives:
WEEKLY REPORT
WEEK – 8 (From Dt: 03-07-2023 to Dt: 08-07-2023)
Develop user awareness and secure practices to mitigate social engineering threats, enforce access
controls, and implement multi-factor authentication.
Understand cloud architecture and security, configure secure wide-area network (WAN) connectivity,
and implement access controls for cloud resources.
Develop skills in secure software development, conduct vulnerability assessments, and ensure
application-level security by implementing best practices in coding and testing.
Understanding about the Ethics of Working in Cybersecurity
Understanding about Cybersecurity Websites
Understanding about Cybersecurity Weapons
configure a wireless router, upload and download files using FTP, connect securely to a remote site
using a
19
CHAPTER 5: OUTCOMES DESCRIPTION
An exploration of the dual landscape of cybersecurity, involving both experts dedicated to safeguarding
systems and criminals seeking to exploit vulnerabilities.
Delving into the intricate world of cryptography as a fundamental tool for securing information by
encoding it, ensuring confidentiality in communication and data storage.
Exploring methods and practices aimed at maintaining the accuracy and trustworthiness of data, a
critical aspect of cybersecurity to prevent unauthorized alterations.
Introduction to the "Five Nines" principle, emphasizing the goal of achieving 99.999% system
reliability and availability, a crucial benchmark in cybersecurity.
Insights into the skills, knowledge, and pathways involved in pursuing a career as a cybersecurity
specialist, including the importance of continuous learning and staying updated on evolving threats.
20
Student Self-Evaluation for the Short-Term Internship
Name and Address of the Supervisor: Dr.Ranjith Kumar Painam Ph.D.., & Guntur.
1) Oral communication 1 2 3 4 5
2) Written communication 1 2 3 4 5
3) Proactiveness 1 2 3 4 5
5) Positive Attitude 1 2 3 4 5
6) Self-confidence 1 2 3 4 5
7) Ability to learn 1 2 3 4 5
9) Professionalism 1 2 3 4 5
10) Creativity 1 2 3 4 5
21
OUTPUT SCREENS
22
Fig4: CISCO Network Academy CyberSecurity Essentials completion Certificate .
23
Fig5: Learning Transcript From Cisco Networking Academy.
24
Fig6: Certificates list.
25