Professional Documents
Culture Documents
CHILLARA
CHILLARA
On
CYBER SECURITY
JawaharlalNehru TechnologicalUniversity,Kakinada.
In the partial fulfillment for the award of the degree of
BACHELOR OF TECHNOLOGY IN
ELECTRICAL& ELECTRONICS ENGINEERING
By
CHILLARA VENKATESH
(208A1A0223)
BACHELOR OF TECHNOLOGY
Submitted by:
CHILLARA VENKATESH
Department of
ELECTRICAL & ELECTRONICS ENGINEERING
Endorsements
Principal:
Certificate from Intern Organization
I take this opportunity to express my deep gratitude of appreciation to all those who
encourage us for successful completion of the internship.
I am also thankful to all who helped me directly and indirectly in the successful
completion of this internship.
Project associate:
CH. VENKATESH – 208A1A0223
CONTENTS
2.1.1 History 2
2.2.1 Vision 3
2.2.2 Mission 4
2.2.3 Values 4
WEEKLY REPORT 10
WEEKLY REPORT 12
WEEKLY REPORT 14
WEEKLY REPORT 16
WEEKLY REPORT 18
WEEKLY REPORT 20
WEEKLY REPORT 22
WEEKLY REPORT 24
ACTIVITY LOG FOR WEEK-9 25
WEEKLY REPORT 26
WEEKLY REPORT 28
5.2 Describe the real time technical skills you have acquired 31
Concealed malicious actors even threaten our electrical power grids, global
financial systems, air traffic control systems, telecommunications system,
healthcare systems, and nuclear power plants.
Learning Objectives:
Outcomes:
1
CYBER SECURITY
In 2018, Palo Alto Networks was listed 8th in the Forbes Digital 100. In June
2018, former Google and SoftBank executive Nikesh Arora joined the company as
Chairman and CEO.
2.1.1 History
2
CYBER SECURITY
3
CYBER SECURITY
2.2.1 Vision
• Our vision is a world where each day is safer and more secure than the one before.
• Transforming the vision of ‘Skilled India’ and Education for to benefit the education
ecosystem by providing 360-degree holistic solutions to all the stakeholders.
2.2.2 Mission
• Identification of skills gaps in the students and mapping them with latest and
world’s best technical skills.
2.2.3 Values
Palo Alto Networks takes this goal to heart, and its University Relations (UR) team
has developed a distinctive internship program that even in the midst of a
4
CYBER SECURITY
pandemic that forced all interns to work remotely is ranked among the top 100 in
the nation for 2020 for the quality of experiences given to interns, its emphasis on
diversity and inclusion, and its innovative approach to remote work.
We are the global cybersecurity leader, known for always challenging the security
status quo. Our mission is to protect our way of life in the digital age by preventing
successful cyberattacks. This has given us the privilege of safely enabling tens of
thousands of organizations and their customers. Our pioneering Security
Operating Platform safeguards your digital transformation with continuous
innovation that combines the latest breakthroughs in security, automation, and
analytics. By delivering you a true platform and empowering a growing ecosystem
of change-makers like us, we provide you highly effective and innovative
cybersecurity across clouds, networks, and mobile. This document describes the
fundamentals of security policies on the Palo Alto Networks firewall.
All traffic traversing the data plane of the Palo Alto Networks firewall is matched
against a security policy. This doesn't include traffic originating from the
management interface of the firewall, because, by default, this traffic does not pass
through the data plane of the firewall. Security policies on the firewall can be
defined using various criteria such as zones, applications, IP addresses, ports,
users, and HIP profiles. Firewall administrators can define security policies to allow
or deny traffic, starting with the zone as a wide criterion, then fine-tuning policies
with more granular options such as ports, applications, and HIP profiles.
The Palo Alto Networks firewall is a stateful firewall, meaning all traffic
passing through the firewall is matched against a session and each session is then
matched against a security policy. A session consists of two flows. The Client to
Server flow and the Server to Client flow. The endpoint where traffic initiates is
always the Client, and the endpoint where traffic is destined is the Server. For
defining security policies, only the c2s flow direction needs to be considered. Define
policies that allow or deny traffic from the originating zone to the destination zone,
that is, in the c2s direction. The return flow, s2c, doesn't require a new rule. The
security policy evaluation on the firewall occurs sequentially from top to bottom in
the list, so traffic matching the first closest rule in the list applies to the session.
5
CYBER SECURITY
The Govt. of Andhra Pradesh, Higher Education Department has introduced Skills
and Skill Development courses along with three mandatory internships during
their graduation. The Andhra Pradesh State Council of Higher education has given
the instructions to all the colleges and universities. Hence, the internship is
mandatory for the undergraduate students. The Commissioner of the Collegiate
Education and concerned universities are the implementing authorities. Here I am
going to explain the internship, Firstly I selected the domain of cybersecurity,
Attended the online classes, Read the materials for the preparation of the modules.
I have successfully completed the Modules of the domain and what kind of skills I
acquired etc are discussing in this chapter.
6
CYBER SECURITY
relevant skills and experience in a particular field. The students will get benefit
from these placements because they often recruit employees from their best
interns, who have known capabilities, thus saving time and money in the long run.
Internships for professional careers are similar in some ways. Similar to
internships, apprenticeships transition students from vocational school into the
workforce. Interns may be college students, and university students, or post
graduate adults.
Companies in search of interns often find and place students in mostly unpaid
internships, for a fee. These companies charge students to assist with research,
promising to refund the fee if no internship is found. The programs vary and aim
to provide internship placements at reputable companies. Some companies may
also provide controlled housing in a new city, mentorship, support, networking,
weekend activities or academic credit. Some programs offer extra addons such as
languages classes, networking events, local excursions, and academic options.
7
CYBER SECURITY
It teaches us how to protect computer operating systems, networks, and data from
cyber-attacks.
I learned about how to monitor systems and mitigate threats when they happen.
Communication skills.
Critical thinking.
Eager to learn
8
CYBER SECURITY
Day
Brief description of the Person In Charge
& Learning Outcome
daily activity Signature
Date
9
CYBER SECURITY
WEEKLY REPORT
WEEK-1 (From09/07/2022 to 14/07/2022)
Objective of the Activity Done: Registration in APSCHE LMS portal.
Detailed Report: After completion of our 2-2 semester, I was got to know about
internship on 09 JULY 2022. I went through the detailed view of the internship on
10 JULY 2022.On 11 JULY 2022, I registered in APSCHE LMS portal. I get
confirmation from APSCHE on 12 JULY 2022. I created my profile in LMS portal
on 13 JULY 2022. I went through some industry contents on 14 JULY 2022.
10
CYBER SECURITY ACTIVITY LOG FOR WEEK
Week-2
11
CYBER SECURITY
WEEK-2
2 (From14/08/2022 to 12/09/2022)
Objective of the Activity Done: Registration for Internship.
Detailed Report: I got mail from APSCHE Edu Skills to register for internship
on 14/08/2022. In search on good contents for Internship on 16/08/2022. Finally,
I selected Cybersecurity and Cloud Computing on 17/08/2022. I registered for
both Cybersecurity and Cloud computing on 18/08/2022. I went through some
online contents for those subjects on 10 to 12 days.
12
CYBER SECURITY
Person In
Day Brief description of Learning
Charge
& the Outcome
Date daily activity
Signature
13
CYBER SECURITY
Weekly report
(From16/09/2022 to 21/09/2022)
Objective of the Activity Done: Learned about those subjects.
Detailed Report: During this week I went through some online portals and
search for good contents that are useful for my further purposes regarding the
internship subjects which I registered.
14
CYBER SECURITY
Day Learning
Brief description of the Person In Charge
& Outcome
daily activity Signature
Date
How to get
Day – 4 Through that message I
30.09.2022 joined in a telegram group. information from
different sources.
How to get
Day –6 I went through
information from
02.10.2022 that information.
different sources
15
CYBER SECURITY
Detailed Report: I got message from GOVT-AP that I have been selected for Palo
Alto Cybersecurity virtual internship on 27/09/2022. I went through that message
from GOVT-AP that I have selected for Palo Alto Cybersecurity virtual internship
on 29/09/2022. Through that message I joined in a telegram group. I got know
some information about the internship in that group. I went through that
information.
16
CYBER SECURITY
WEEK-5
How to get
Day – 1 I got some other updates
information from
03.10.2022 from APSCHE-EduSkills.
different sources.
How to get
Day – 3
I went through that links. information from
05.10.2022
different sources
How to get
Day – 4 I got some knowledge
06.10.2022 about my subjects. information from
different sources
17
CYBER SECURITY
WEEKLY REPORT
(From 03/10/2022 to 08/10/2022)
Objective of the Activity Done: Creating canvas account.
18
CYBER SECURITY
ACTIVITY LOG FOR WEEK
WEEK-6
Completed the
Day –6 Prepared for Introduction to Introduction to the
14.10.2022 the cybersecurity. cybersecurity
module.
19
CYBER SECURITY
WEEKLY REPORT
(From 09/10/2022 to 14/10/2022)
Objective of the Activity Done: Attended Orientation Classes.
Detailed Report: I attended to first day of orientation program, Got some clarity
about Palo Alto Networks Cybersecurity. Cybersecurity orientation classes through
online is started. Gone through login process from the document. I attend the
second day of the orientation class. Gone through the purpose of learning about
Cybersecurity.
Gone through the Process of achieving the certificate. Gone through the brief topics
of cybersecurity. I attend the third day of the orientation class. Gone through the
basic introduction about Cybersecurity. I attend the fourth day of the orientation
class. Gone through the Introduction to cybersecurity. I attend the fifth day of the
orientation class.
Completed the Introduction to the cybersecurity module.
20
CYBER SECURITY
WEEK-7
21
CYBER SECURITY
WEEKLY REPORT
WEEK-7 (From 15/10/2022 to 20/10/2022)
Objective of the Activity Done: Attended Orientation Classes.
22
CYBER SECURITY ACTIVITY LOG FOR WEEK
WEEK-8
Identified how
I attend the eighth day of
Day – 4 spamming and
online class through
24.10.2022 phishing attacks are
recorded.
performed.
Identified
I attend the tenth day of
Day –6 capabilities of the
online class through
26.10.2022 Palo Alto networks
recorded.
prevention.
23
CYBER SECURITY
WEEKLY REPORT
WEEK-8 (From 21.10.2022-26.10.2022) Objective
of the Activity Done: certificate upload.
24
CYBER SECURITY ACTIVITY LOG FOR WEEK
WEEK-9
Day Person In
& Brief description of the daily Charge
Date activity Learning Outcome Signature
25
CYBER SECURITY
WEEKLY REPORT
WEEK-9 (From 27.10.2022-14.11.2022)
Objective of the Activity Done: Certificate verification.
26
CYBER SECURITY ACTIVITY LOG FOR WEEK
week-10
Day Person In
& Brief description of Charge
Date the daily activity Learning Outcome Signature
The internship
was completed Completion internship.
Day – 4 within a period of 10
18.11.2022 weeks.
Documentation was
completed and this is
Day –6 last day regarding to Document prepared.
25.11.2022 my internship.
WEEKLY REPORT
27
CYBER SECURITY
28
CYBER SECURITY
Palo Alto Networks used to have an amazing culture but that has slipped away.
The company touts care for yourself but in practice, most people I have worked with
throughout the company are constantly stressed out at work and do not have a
good work-life balance if they are able to deliver on the expectations of work.
understanding politics is also extremely helpful. With all that said there is constant
change and the company is growing quickly. There are plenty of learning
opportunities and if you are lucky enough to get a good manager/team the
experience may differ. Palo Alto Networks is rated 4.7 out of 5, based on 10 reviews
by employees on Ambition Box. Palo Alto Networks is known for Job Security which
is rated at the top and given a rating of 4.7. However, Career growth is rated the
lowest at 4.0 and can be improved. The company had a GREAT work culture and
strong technology. It still has strong technology but the culture has changed rather
dramatically over the last four or five years. It's also grown by about 3x in that time,
and some culture change is natural in that sort of accelerated growth mode. Still,
there used to be a bit of a work-life balance there. But over all the people there are
quite smart and hardworking. It just got to be much more of a grind in the
pandemic. And working fully remote didn't help that much.
About 53% of the employees at Palo Alto Networks work 8 hours or less, while 7%
of them have an extremely long day - longer than twelve hours. Overall, the employees at
29
CYBER SECURITY
Palo Alto Networks are extremely happy, based on their aggregated ratings of future
outlook, customer perception, and their excitement going to work.
It provides benefits that put you in the driver’s seat giving you the final say of what
you need and how you get it. We offer benefits and resources to meet you wherever
you are in life to make sure you and your family are healthy, supported and
protected. We value your health and provide options so you can choose what best
supports your lifestyle and personal health goals. A variety of nationwide plans
including Anthem Blue Cross, Kaiser Permanente, Dental Guard, VSP and more
are available to you and your family. Our providers offer the flexibility you want and
the coverage you need. Professional development is serious business at Palo Alto
Networks, where the Talent Development team offers 25+ courses to help employees
boost their careers and develop leadership capability.
Most roles are eligible for equity grants, and we now offer new hires a quarterly
vesting schedule right away. We want you to be fairly compensated and rewarded
as soon as you make an impact on our team, that happens immediately and
because we consider every employee a stakeholder in our long-term success, we
offer an Employee Stock Purchase Plan (ESPP) with a 24-month lookback. From
life insurance to health savings accounts, we provide ways to help you protect and
grow your wealth. Palo Alto Networks offers both traditional and Roth 401(k)
options. In addition to paid corporate holidays, Flexible Time Off programs
empower our employees to balance their work schedules with personal time off. We
30
CYBER SECURITY
offer 12 weeks of full pay for medical leave and 6 weeks of full pay for parental
leave. As a company with strong ties to the military and veterans, we also offer 26
weeks of full pay for military leave.
5.2 Describe the real time technical skills you have acquired: -
1). Scripting:
Scripting is a type of coding in which you make a program do something. The
difference is that coding is static, whereas scripts can make images and text move
around. Knowing how to build tools and automate repetitive tasks with languages
like Python or Power shell empowers you to become a more efficient analyst. Python
in particular ranks among the most prevalent languages in cybersecurity. As a
bonus, it’s also among the easiest to learn.
31
CYBER SECURITY
This security technology prevents unauthorized network traffic from entering the
internal network and protects users and employees that may access malicious
websites that contain viruses or malware. Secure web gateways typically include
web-filtering technology and security controls for web applications. Many
cybersecurity attacks take place across a network of connected devices. The same
technologies that allow companies to collaborate can also lead to security
vulnerabilities. To keep an organization secure, you’ll need an understanding of
wired and wireless networks, and how to secure them.
32
CYBER SECURITY
background, such as executives or legal teams. You may also be asked to write incident
reports, where you’ll have to document what you did in a concise and clear manner. As
a cybersecurity analyst, you’ll likely work with a larger security team of other
cybersecurity professionals. You may also need to collaborate with other teams within
your company (legal, IT, public relations) or share your findings with other organizations
or the greater cybersecurity community.
1). Planning:
Planning is a vital aspect within an organization. It refers to one’s ability to
organize activities in line with set guidelines while still remaining within the limits
of the available resources such as time, money, and labour. It is also the process of
formulating a set of actions or one or more strategies to pursue and achieve certain
goals or objectives with the available resources. The planning process includes
identifying and setting achievable goals, developing necessary strategies, and
outlining the tasks and schedules on how to achieve the set goals. Without a good
plan, little can be achieved.
2). Communication:
Possessing great communication skills is crucial for a manager. It can
determine how well information is shared throughout a team, ensuring that the
group acts as a unified workforce. How well a manager communicates with the rest
of his/her team also determines how well outlined procedures can be followed, how
well the tasks and activities can be completed, and thus, how successful an
organization will be. Communication involves the flow of information within the
organization, whether formal or informal, verbal or written, vertical or horizontal,
and it facilitates the smooth functioning of the organization. Clearly established
communication channels in an organization allow the manager to collaborate with
the team, prevent conflicts, and resolve issues as they arise. A manager with good
communication skills can relate well with the employees and, thus, be able to
achieve the company’s set goals and objectives easily.
3). Decision-making:
33
CYBER SECURITY
4). Delegation:
Delegation is another key management skill. Delegation is the act of passing
on work-related tasks and/or authorities to other employees or subordinates. It
involves the process of allowing your tasks or those of your employees to be
reassigned or reallocated to other employees depending on current workloads. A
manager with good delegation skills is able to effectively and efficiently reassign
tasks and give authority to the right employees. When delegation is carried out
effectively, it helps facilitate efficient task completion. Every manager must have
good delegation abilities to achieve optimal results and accomplish the required
productivity results.
5). Problem-solving:
Problem-solving is another essential skill. A good manager must have the
ability to tackle and solve the frequent problems that can arise in a typical workday.
Problem-solving in management involves identifying a certain problem or situation
and then finding the best way to handle the problem and get the best solution. It is
the ability to sort things out even when the prevailing conditions are not right.
1). Listening:
People want to know that they are being heard. Really listen to what the
other person is saying, instead of formulating your response. Ask for clarification
to avoid misunderstandings. At that moment, the person speaking to you should
34
CYBER SECURITY
be the most important person in your life. Another important point is to have one
conversation at a time. This means that if you are speaking to someone on the
phone, do not respond to an email, or send a text at the same time. The other person
will know that she doesn’t have your undivided attention.
35
CYBER SECURITY
Term of Internship: 10 Week From: September 2022 To: November 2022 Date
of Evaluation:
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
12 Time Management 1 2 3 4 5
36
CYBER SECURITY
15 OVERALL PERFORMANCE 1 2 3 4 5
Please note that your evaluation shall be done independent of the student’s self-
evaluation
Rating Scale:
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
37
CYBER SECURITY
7 Ability to learn 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
12 Time Management 1 2 3 4 5
Date:
PHOTOS
38
CYBER SECURITY
EVALUATION
Internal Evaluation for Short Term Internship
(On-site/Virtual)
39
CYBER SECURITY
Objectives:
Assessment Model:
The number of credits assigned is 4. Later the marks shall be converted into grades and
grade points to include finally in the SGPA and CGPA.
Activity Log is the record of the day-to-day activities. The Activity Log is assessed on an
individual basis, thus allowing for individual members within groups to be assessed this
way. The assessment will take into consideration the individual student’s involvement
in the assigned work.
While evaluating the student’s Activity Log, the following shall be considered – o
The individual student’s effort and commitment. o The originality and quality of
the work produced by the individual student. o The student’s integration and
40
CYBER SECURITY
The Internship Evaluation shall include the following components and based on
Weekly Reports and Outcomes Description
Developments recorded.
MARKS STATEMENT
(To be used by the Examiners)
INTERNAL ASSESSMENT STATEMENT
Name Of the Student: CHILLARA VENKATESH
Name of the College: Rise Krishna sai prakasam group of institutions University:
JNTU Kakinada
1. Activity Log 25
41
CYBER SECURITY
2. Internship Evaluation 50
3. Oral Presentation 25
Certified by
42
CYBER SECURITY
43