Fortinet Network Security Final Document
Fortinet Network Security Final Document
GADE BHAVYASRI
21X41A4412
MAY JULY
: EDUSKILLS
JNTUK University
UNIVERSITY 2023-2024
Student’s Declaration
Endorsements
Faculty Guide
Head of Department
Principal
Certificate from Intern Organization
Acknowledgements
First of all,I would like to convey my sincere thanks to the Almighty for the blessings on me
to carry on this internship without any disruption.
I am very much thankful to Dr. S.SRI GOWRI, H.O.D of ECE Department, for her valuable
guidance which helps me to make our internship successful. Details of the internship. Her
Experience and patience guidance paved a way for completing my internship with the sense of
satisfaction and pleasure.
I am very much thankful to our respected principal Dr.M. Ekambaram Naidu for his kind
support and facilities provided at our campus which helped me to bring out this internship
successfully.
I am very much thankful to Eduskills and Fortinet collaborated with Eduskills who guided me
throughout the internship and for giving me the most independence and freedom throughout
the various phases of the internship.
Finally. I would like to convey my heartful thanks to all technical staff, for their guidance and
support in every step of this internship .I convey my sincere thanks to all the faculty and friends
who directly or indirectly helped me for the successful completion of this internship.
Contents
CHAPTER: 1
EXECUTIVE SUMMARY
CHAPTER: 2
OVERVIEW OF THE ORGANIZATION
CHAPTER: 3
INTERNSHIP PART
CHAPTER: 4
ACTIVITY LOG FOR THE WEEKS
CHAPTER: 5
OUTCOMES DESCRIPTION
EVALUATIONS
PageNo:
CHAPTER 1: EXECUTIVE SUMMARY
In this internship we had learn the new and emerging technologies that are been used in the
industries and its job oriented. From this internship we can be able to get ready for the job and
we can be able to know the environment of the industry and how are the requirements of the
industry.
Explore career alternatives prior to graduation. Integrate theory and practice. Assess interests
and abilities in their field of study.
Learn to appreciate work and its function in the economy. Develop work habits and attitudes
necessary for job success.
Develop communication, interpersonal and other critical skills in the job interview process.
Build a record of work experience. Acquire employment contacts leading directly to a full-time
job following graduation from college.
Identify, write down, and carry out performance objectives (mutually agreed upon by the
employer, the MCC experiential learning supervisor, and the student) related to their job
assignment.
CHAPTER 2: OVERVIEW OF THE ORGANIZATION
Suggestive contents
A. Introduction of the Organization
B. Vision
• Our vision is to fill the gap between Academia and Industry by ensuring world class
curriculum access to faculties and students.
• To benefit the education ecosystem by providing 360o degree holistic solutions to all
the stakeholder
C. Mission
• We want to completely disrupt the teaching methodologies and ICT based education
system in India.
• We work closely with all the important stakeholders in the ecosystem (Students,
Faculties, Education Institution and Central/State Governments) by bringing them
together through our skilling interventions.
D. Values of the Organization
A. Students will get opportunities to participate in all National Level competitions &
events organized by the corporates.
B. As an Academy student gain access to innovative learning tools, a global support
community, and resources to help them to launch their career.
C. Mentoring by industry experts and IT leaders
E. Future Plans of the Organization.
To positively impact 1 million beneficiaries by 2025
CHAPTER 3: INTERNSHIP PART
Equipment used:
System/Laptop and virtual software provided by the organization to complete the internship.
i
CHAPTER-4
ACTIVITY LOG FOR THE FIRST WEEK
Day Person
Brief description of the daily
& Learning Outcome In-Charge
activity
Date Signature
Detailed Report:
The designing to identify the gaps present in an organization current reliability strategies by
analysing unplanned failures based on impact of each failure on maintenance cost and plant
downtime. Secure, Agile Networks, Hybrid Work, Optimized Application Experiences , End-
to-End Security , Internet for the Future, and Capabilities at the Edge. A password is your
personal key to a computer system. Passwords help to ensure that only authorized individuals
access computer systems. Passwords also help to determine accountability for all transactions
and other changes made to system resources, including data. Chief financial officers hold the
top financial position in an organization. They are responsible for forecasting the organization's
financial standing based on financial and operational data and reports provided by the finance
and accounting teams and advising the CEO and board on strategic direction.The three basic
goals of data security are confidentiality, integrity and availability, which are often collective
called CIA or the CIA triad. Confidentiality is based on the principle of the least privilege —
restricting each user's access to the minimum required to perform their jobs.s
ACTIVITY LOG FOR THE SECOND WEEK
Day Person
Brief description of the daily
& Learning Outcome In-Charge
activity
Date Signature
I have used my
Day-2
Insider threat perspectives and quiz knowledge I gained from
(08/05/2024
the before chapters here .
Detailed Report:
Web-based threats, or online threats, are a category of cybersecurity risks that may cause an
undesirable event or action via the internet. Web threats are made possible by end-user
vulnerabilities, web service developers/operators, or web services themselves. Insider threats
can cause a data breach, sensitive data leakage, production loss, and organization reputation
damage. Due to all these factors, the organization's image is negatively affected in an investor's
mind. SOAR encourages you to consult people from all areas and levels of your business. Cloud
security mainly focuses on how to implement policies, processes, and technologies together so
they ensure data protection. SD WAN enables organizations to securely connect users,
applications and data across multiple locations while providing improved performance,
reliability and scalability
ACTIVITY LOG FOR THE THIRD WEEK
Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature
In this stage explained about how threats occur and how to prevent them and identify them .
Threat Information Services, Firewall, Network access control, Sandbox
,
Detailed Report:
An endpoint is the primary outcome that is being measured by a clinical trial. Threat
information services helps reduce IT complexity by identifying unnecessary endpoints,
software, or resources that can be eliminated. Web application firewall helps protect a
company's web applications by inspecting and filtering traffic between each web application
and the internet. Network access control ensures that only users who are authenticated and
devices that are authorized and compliant with security policies can enter the network. The
Sandbox is not only shaping the metaverse but also democratizing it, allowing people
worldwide to access the opportunities of Web 3.0
ACTIVITY LOG FOR THE FORTH WEEK
Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature
Working with secure email gateway and firewall and their uses.
Secure email gateway, SIEM, Web application firewall, WAF, Web filter.
Detailed Report:
Email gateway protection helps to block malware, phishing attacks, spam emails, and a host of
other unwanted email-borne threats from reaching recipients and compromising their devices,
user credentials, email systems, or sensitive data. Web application firewall
helps protect a company's web applications by inspecting and filtering traffic between each web
application and the internet. Web filtering software monitors and manages the locations where
users are browsing on the Internet, enabling an organization to either allow or block web traffic
in order to protect against potential threats and enforce corporate policy.
ACTIVITY LOG FOR THE FIFTH WEEK
Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature
Detailed Report:
Web filtering software monitors and manages the locations where users are browsing on the
Internet, enabling an organization to either allow or block web traffic in order to protect against
potential threats and enforce corporate policy.
Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and
desktops), mobile devices (smart phones and wearables), and other equipment (printers and
video cameras) to interface with the Internet. FortiADC provides centralized user authentication
and authorization services to web applications
ACTIVITY LOG FOR THE SIXTH WEEK
Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature
Detailed Report:
Fortinet offers centralized user authentication and authorization services to web applications.
We reduce cyber risk and attack impact by speeding both detection and response.
Outstanding network security, performance, and manageability.
Single-pane-of-glass management through tight integration with the FortiGate architecture.
ACTIVITY LOG FOR THE SEVENTH WEEK
Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature
Detailed Report:
Fortinet offers Limit access to only the private apps each user needs.
Secure access to private apps from BYOD and unmanaged devices, including Chromebooks,
Linux and IoT.Secure remote access to IT network tools and on-premises applications.
Keep data secure with best-in-class DLP and malware protections.
SASE-Ready with CASB and SWG Services Available.
Fortinet utilizes artificial intelligence (AI) of varying types, in various locations for
complementary purposes. From the global threat intelligence in our FortiGuard Labs, to inline
security controls deployed throughout the organization, and centralized advanced threat
detection and response in the SOC.
ACTIVITY LOG FOR THE EIGTH WEEK
Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature
Detailed Report:
Fortinet offers automated security operations in a consolidated cybersecurity platform. We
reduce cyber risk and attack impact by speeding both detection and response.
Outstanding network security, performance, and manageability.
Single-pane-of-glass management through tight integration with the FortiGate architecture.
FORTI web improve security and reduce administrative overhead
Learned how to harden the security of your network by using the most common FortiGate
features. Through demos and interactive simulations, you will learn how to perform basic
operation tasks on FortiGate.
CHAPTER 5: OUTCOMES DESCRIPTION
In this we totally acquired software working environment structure and how can work in the
server by accessing . Forti Authenticator, Forti gate, Forti Adc many more have learnt.
The labs in the whole session learnt about new things in what a real time done in the software
field,
It make me more efficient working in the this Network security virtual internship provided by
Eduskills.
Expertise in at least one high-level programming language Skills for developing, deploying &
debugging network security applications Skills in API usage, command line interface and
SDKs for writing applications Knowledge of key features of network security Providers.
Understanding of application lifecycle management. Ability to use continuous integration and
distribution pipelines to deploy applications
Ability to code to implement essential security measures. Skills in writing, correcting, and
debugging code modules. Code writing skills for serverless applications. Understanding in
the use of containers in development processes.
Student Self Evaluation of the Short-Term Internship
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5
Date of Evaluation:
Please note that your evaluation shall be done independent of the Student’s self evaluation
1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5