CYBERSECURITY VIRTUAL
INTERNSHIP
Supported by paloalto from September 2023 to November 2023
B. SUVARNA LAKSHMI
216W1A0574
ISTS Womens Engineering College
An Internship Report on
(Title of the Internship)
Submitted in accordance with the requirements for the degree of
______________________________________
Under the faculty Guideship of
_____________________________
(Name of the faculty Guide)
Department of
______________________________
(Name of the College)
Submitted by:
____________________________
(Name of the Student)
Reg No. ___________________
CYBERSECURITY VIRTUAL
INTERNSHIP PROGRAM
Summary
Cyber security is a current and serious
problem
o Open a newspaper or business magazine
o Pervasive digital technologies
Cyber security affects individuals,
organizations, society and government
o The landscape of threats spread across units
Privacy issues, data protection issues
o policy angles, operational and management
angles, as well as
o technology angles
Triple role of technology
o Source of threat, asset to protect and defense
weapon
Cyber security
Cyber security often used interchangeably with
the term information security.
However, incidents of cyber-bullying, damage
to equipment, media piracy, or cyber terrorism
etc occur in cyber space, beyond information
assets i.e. it includes humans as sources and
targets of security
Cybersecurity is the collection of tools, policies, security
concepts, security safeguards, guidelines, risk
management approaches, actions, training, best practices,
assurance and technologies that can be used to protect
the cyber environment and organization and user’s assets.
Organization and user’s assets include connected
computing devices, personnel, infrastructure,
applications, services, telecommunications systems, and
the totality of transmitted and/or stored information in
the cyber environment. Cyber security strives to ensure
the attainment and maintenance of the security
properties of the organization and user’s assets against
relevant security risks in the cyber environment.
The general security objectives comprise the
following:
Availability, Integrity, which may include authenticity and
Non-repudiation and Confidentiality (ITU, 2008)
To complete this course we completed 4 sub domains
named
Cybersecurity Fundamentals
Network Security Fundamentals
Cloud Security Fundamentals
Security Operations Fundamentals
1.In Cybersecurity Fundamentals we discussed
about:
Cybersecurity landscape
Cyberthreats
Attack Techniques
Security Models
Security Operating Platform
2.In Network Security Fundamentals we discussed
about:
The Connected Globe
Networking and Addressing
Endpoint Security
Network Security
Palo Alto Network Strata
3.In Cloud security Fundamentals we discussed
about:
Fundamentals of Cloud Security:Cloud
Native Technologies
Cloud Computing overview
Cloud Security Operations
Cloud Application Protection Platform
Prisma Cloud
4.In Security Operations Fundamentals we
discussed about:
Elements and Processes
Infrastructure and Automation
Advanced Endpoint Protection
Threat Prevention and Intelligence
The Cortex Platform
Cybersecurity Fundamentals
These courses offer a comprehensive understanding of
the modern cybersecurity landscape, SaaS challenges, security
regulations, standards, threats, attacker profiles, and cyberattack
lifecycle steps. They provide insights into malware and ransomware
types, objectives, properties, and the relationship between
vulnerabilities and exploits. The courses discuss current attack
methods, defense strategies, public Wi-Fi risks, and protection
measures. They delve into security models, focusing on perimeter-
based and Zero Trust models, and explore the evolving landscape of
cybercrime, organizational challenges, and employee roles in
maintaining security. Lastly, the courses describe Palo Alto
Networks' prevention architecture, its role in addressing
cybersecurity challenges, and the key capabilities required for
preventing successful cyberattacks.
Network Security Fundamentals
These courses cover network security fundamentals, including
connected devices, routing, area networks, and protocols. They also
introduce IP addressing, subnetting, TCP/IP and OSI models, packet
lifecycle, and encapsulation. The courses teach endpoint security
prevention for threats like malware, viruses, ransomware, and
phishing attacks. They delve into network security fundamentals for
home networks and critical infrastructure, and present Palo Alto
Networks network-security solutions
Cloud Security Fundamentals
These courses cover the core technologies used in cloud
computing, such as virtual machines and containers, development
operations teams, and the CI/CD pipeline. They provide an overview
of cloud computing models, shared responsibility, best practices, and
hybrid cloud computing. The courses discuss the models and
processes organizations use for cloud technologies, common
software development models, and the supporting teams. They
explain how cloud-native application protection platforms (CNAPP)
offer comprehensive protection with integrated security and
compliance capabilities for cloud-native applications in development
and production. Lastly, the courses provide insights into how the
Prisma Cloud platform prevents and detects security risks using a
cloud-native application protection platform.
Security Operations
Fundamentals
These courses cover the daily life of a SecOps analyst, the six
elements of security operations, and how SOAR technology simplifies
cybersecurity response and prevention. They introduce endpoint
protection with the Cortex XDR agent, which combines behavioral
protection and AI-based analysis to stop advanced attacks. The
courses provide a high-level overview of Cortex XSOAR Threat
Intelligence Management (TIM), a security solution for automating
and streamlining threat intelligence processes, including native
threat intelligence, data sources, incident enrichment, and threat
intel reports. Finally, the courses introduce the products in the Palo
Alto Networks Cortex platform: Cortex XSOAR, Cortex XDR, Cortex
XSOAR TIM, and Cortex XSIAM.