KEMBAR78
Fortinet Network Security Final Document | PDF | Security | Computer Security
0% found this document useful (0 votes)
138 views34 pages

Fortinet Network Security Final Document

The document outlines the details of a short-term virtual internship completed by Gorrela Krishnaveni at EduSkills, focusing on Network Security. It includes a student's declaration, official certification, acknowledgments, and a comprehensive activity log detailing weekly learning outcomes and objectives. The internship aimed to bridge the gap between academia and industry, enhancing job readiness and practical skills in cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views34 pages

Fortinet Network Security Final Document

The document outlines the details of a short-term virtual internship completed by Gorrela Krishnaveni at EduSkills, focusing on Network Security. It includes a student's declaration, official certification, acknowledgments, and a comprehensive activity log detailing weekly learning outcomes and objectives. The internship aimed to bridge the gap between academia and industry, enhancing job readiness and practical skills in cybersecurity.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

PROGRAM BOOK FOR

SHORT -TERM INTERNSHIP


(Onsite / Virtual)

GADE BHAVYASRI

SRK INSTITUTE OF TECHNOLOGY

21X41A4412

MAY JULY

: EDUSKILLS

JNTUK University
UNIVERSITY 2023-2024
Student’s Declaration

I, GORRELA KRISHNAVENI student of NETWORK SECURITY PROFESSIONAL


VIRTUAL INTERNSHIP Programme, Reg. No. 22X45A0428 of the Department of
Electronics and Communication Engineering, SRK Institute of Technology do hereby declare
that I have completed the mandatory internship from 30.04.2024 To 30.06.2024 in Edu skills
cohort-8 Virtual Internship under the Faculty Guide ship of Ms K Noha Namratha,
Department of Electronics and Communication Engineering, SRK Institute of Technology.

(Signature and Date)


Official Certification

This is to certify that GORRELA KRISHNAVENI Registration No:22X45A0428 has


completed his/her Internship in Edu skills on NETWORK SECURITY PROFESSIONAL
VIRTUAL INTERNSHIP under my supervision as a part of partial fulfilment of the
requirement for the Degree of B. TECH, Electronics and Communication Engineering in the
Department of SRK Institute of Technology. This is accepted for evaluation.

(Signatory with Date and Seal)

Endorsements

Faculty Guide

Head of Department

Principal
Certificate from Intern Organization
Acknowledgements

First of all,I would like to convey my sincere thanks to the Almighty for the blessings on me
to carry on this internship without any disruption.

I am extremely thankful to, Ms K Noha Namratha internship Guide who guided me


throughout the internship. I am thankful to her for giving me the most independence and
freedom throughout various phases of the internship.

I am very much thankful to Dr. S.SRI GOWRI, H.O.D of ECE Department, for her valuable
guidance which helps me to make our internship successful. Details of the internship. Her
Experience and patience guidance paved a way for completing my internship with the sense of
satisfaction and pleasure.

I am very much thankful to our respected principal Dr.M. Ekambaram Naidu for his kind
support and facilities provided at our campus which helped me to bring out this internship
successfully.

I am very much thankful to Eduskills and Fortinet collaborated with Eduskills who guided me
throughout the internship and for giving me the most independence and freedom throughout
the various phases of the internship.

Finally. I would like to convey my heartful thanks to all technical staff, for their guidance and
support in every step of this internship .I convey my sincere thanks to all the faculty and friends
who directly or indirectly helped me for the successful completion of this internship.
Contents

CHAPTER: 1
EXECUTIVE SUMMARY
CHAPTER: 2
OVERVIEW OF THE ORGANIZATION
CHAPTER: 3
INTERNSHIP PART
CHAPTER: 4
ACTIVITY LOG FOR THE WEEKS
CHAPTER: 5
OUTCOMES DESCRIPTION
EVALUATIONS

PageNo:
CHAPTER 1: EXECUTIVE SUMMARY

In this internship we had learn the new and emerging technologies that are been used in the
industries and its job oriented. From this internship we can be able to get ready for the job and
we can be able to know the environment of the industry and how are the requirements of the
industry.

Explore career alternatives prior to graduation. Integrate theory and practice. Assess interests
and abilities in their field of study.

Learn to appreciate work and its function in the economy. Develop work habits and attitudes
necessary for job success.

Develop communication, interpersonal and other critical skills in the job interview process.

Build a record of work experience. Acquire employment contacts leading directly to a full-time
job following graduation from college.

Identify, write down, and carry out performance objectives (mutually agreed upon by the
employer, the MCC experiential learning supervisor, and the student) related to their job
assignment.
CHAPTER 2: OVERVIEW OF THE ORGANIZATION

Suggestive contents
A. Introduction of the Organization

EduSkills is a Non-profit organization which enables Industry 4.0 ready digital


workforce in India.

B. Vision
• Our vision is to fill the gap between Academia and Industry by ensuring world class
curriculum access to faculties and students.

• To benefit the education ecosystem by providing 360o degree holistic solutions to all
the stakeholder
C. Mission
• We want to completely disrupt the teaching methodologies and ICT based education
system in India.
• We work closely with all the important stakeholders in the ecosystem (Students,
Faculties, Education Institution and Central/State Governments) by bringing them
together through our skilling interventions.
D. Values of the Organization
A. Students will get opportunities to participate in all National Level competitions &
events organized by the corporates.
B. As an Academy student gain access to innovative learning tools, a global support
community, and resources to help them to launch their career.
C. Mentoring by industry experts and IT leaders
E. Future Plans of the Organization.
To positively impact 1 million beneficiaries by 2025
CHAPTER 3: INTERNSHIP PART

Equipment used:

System/Laptop and virtual software provided by the organization to complete the internship.

i
CHAPTER-4
ACTIVITY LOG FOR THE FIRST WEEK

Day Person
Brief description of the daily
& Learning Outcome In-Charge
activity
Date Signature

NSE 1 THE THREAT I have learnt that desiging to


LANDSCAPE: identify the gaps present in an
organization current reliability
Day-1 BAD Actors Quiz strategy by analyzing unplanned
(30/04/2024) failures based on impact of each
failure on maintanance cost and
plant downtime.

I have learnt that managing


CIO Perspectives technical projects, launching
Day-2 system and using technology to
(01/05/2024) increase efficiency and productivity
and cut.

I have learnt that restricting each


Day-3 Data security perspectives other to the minimum required to
(02/05/2024) quiz perform their jobs.

I have learnt that securing agile


Day-4 CISO Perspectives network, optimizing applications,
(03/05/2024) experiencing end-to-end security.

I have learnt that personalizing key


Day-5
(04/05/2024)
Password perspectives quiz to computer system.

I have learnt that chief financial


Day-6 CFO and quiz officers holds the top financial
(05/05/2024) position in an organization.
WEEKLY REPORT
WEEK – 1 (From: 30-04-2024 To 06-05-2024)

Objective of the Activity Done:


Understanding the threat landscape and how the attackers are and from where can
the data get corrupted.
BAD Actors, CIO Perspectives, Data security perspectives, CISO Perspectives, Password
perspectives, CFO.

Detailed Report:
The designing to identify the gaps present in an organization current reliability strategies by
analysing unplanned failures based on impact of each failure on maintenance cost and plant
downtime. Secure, Agile Networks, Hybrid Work, Optimized Application Experiences , End-
to-End Security , Internet for the Future, and Capabilities at the Edge. A password is your
personal key to a computer system. Passwords help to ensure that only authorized individuals
access computer systems. Passwords also help to determine accountability for all transactions
and other changes made to system resources, including data. Chief financial officers hold the
top financial position in an organization. They are responsible for forecasting the organization's
financial standing based on financial and operational data and reports provided by the finance
and accounting teams and advising the CEO and board on strategic direction.The three basic
goals of data security are confidentiality, integrity and availability, which are often collective
called CIA or the CIA triad. Confidentiality is based on the principle of the least privilege —
restricting each user's access to the minimum required to perform their jobs.s
ACTIVITY LOG FOR THE SECOND WEEK

Day Person
Brief description of the daily
& Learning Outcome In-Charge
activity
Date Signature

I have learnt that


Day-1 configuring email
(07/05/2024) Internet threat perspectives accounts.

I have used my
Day-2
Insider threat perspectives and quiz knowledge I gained from
(08/05/2024
the before chapters here .

NSE -1 EXAM I have given my best in


the exam and it consists
Day-3
many questions about the
(09/05/2024
topics I have learnt in the
chapters before.

NSE 2 SOAR I have learnt that


SOAR QUIZ configuring consult
Day-4
(10/05/2024
people from all areas and
levels of business.

I have learnt that focuses


on how to implement
Day-5 Cloud security policies, processes, and
(11/05/2024 Cloud security quiz technologies together so
they ensure data
protection.
I have learnt that enabling
organization to securely
SD WAN connect users, applications
Day-6
SD WAN QUIZ and data across multiple
(12/05/2024
locations while providing
improved impotence.
WEEKLY REPORT

WEEK – 2 (From Dt 07-05-2024 to Dt 13-05-2024)

Objective of the Activity Done:


Learn about how data is using nowadays and what type of data is more using and learn about
collecting of data and analyzing the data in big data. Internet threat perspectives, Insider threat
perspectives, SOAR, Cloud security, SD WAN

Detailed Report:
Web-based threats, or online threats, are a category of cybersecurity risks that may cause an
undesirable event or action via the internet. Web threats are made possible by end-user
vulnerabilities, web service developers/operators, or web services themselves. Insider threats
can cause a data breach, sensitive data leakage, production loss, and organization reputation
damage. Due to all these factors, the organization's image is negatively affected in an investor's
mind. SOAR encourages you to consult people from all areas and levels of your business. Cloud
security mainly focuses on how to implement policies, processes, and technologies together so
they ensure data protection. SD WAN enables organizations to securely connect users,
applications and data across multiple locations while providing improved performance,
reliability and scalability
ACTIVITY LOG FOR THE THIRD WEEK

Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature

I have learnt that primary


END POINT
Day-1 outcome being measured
(14/05/2024 by a clinical trial.
END POINT QUIZ

I have learnt that


reduction of IT
complexity by identifying
Day-2
Threat Information Services and quiz unnecessary endpoints,
(15/05/2024
software, or resources that
can be eliminated.

I have learnt that


Threat Information Services and quiz protection against outside
Day-3
(16/05/2024 cyber attackers by
shielding your computer .

I have learnt that ensure of


Day-4 Firewall and quiz users only authenticated
(17/05/2024 and devices.

I have learnt that


Day-5 Network access control complition with security
(18/05/2024 policies.

I have learnt that shaping


the metaverse, allowing
Day-6 Network access control quiz people worldwide to
(19/05/2024 access opportunities of
web 3.0.
WEEKLY REPORT
WEEK –3 (From Dt 14-5-2024 to Dt 20-05-2024)

Objective of the Activity Done:

In this stage explained about how threats occur and how to prevent them and identify them .
Threat Information Services, Firewall, Network access control, Sandbox
,
Detailed Report:

An endpoint is the primary outcome that is being measured by a clinical trial. Threat
information services helps reduce IT complexity by identifying unnecessary endpoints,
software, or resources that can be eliminated. Web application firewall helps protect a
company's web applications by inspecting and filtering traffic between each web application
and the internet. Network access control ensures that only users who are authenticated and
devices that are authorized and compliant with security policies can enter the network. The
Sandbox is not only shaping the metaverse but also democratizing it, allowing people
worldwide to access the opportunities of Web 3.0
ACTIVITY LOG FOR THE FORTH WEEK

Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature

I have learnt that shaping


the metaverse, allowing
Day-1 Sandbox and quiz people worldwide to
(21/05/2024 access opportunities of
web 3.0.

I have learnt that email


protection helps to block
Day-2
(22/05/2024
Secure email gateway malware, phishing attacks,
spam mails.

I have learnt that


protection of a company's
Secure email gateway web application by
Day-3
(23/05/2024
inspecting and filtering
traffic between each web
application.

I have learnt about


Day-4 SIEM security information and
(24/05/2024 event management.

I have learnt that


protection of a company's
web application by
Day-5 Web application firewall quiz inspecting and filtering
(25/05/2024 traffic between each web
application and writtwn a
quiz.

I have learnt that


WAF protection of web
Day-6 application from a variety
(26/05/2024 of application layer
attacks such as (XSS).
WEEKLY REPORT
WEEK – 4 (From 21-05-2024 To 27-05-2024)

Objective of the Activity Done:

Working with secure email gateway and firewall and their uses.
Secure email gateway, SIEM, Web application firewall, WAF, Web filter.

Detailed Report:

Email gateway protection helps to block malware, phishing attacks, spam emails, and a host of
other unwanted email-borne threats from reaching recipients and compromising their devices,
user credentials, email systems, or sensitive data. Web application firewall
helps protect a company's web applications by inspecting and filtering traffic between each web
application and the internet. Web filtering software monitors and manages the locations where
users are browsing on the Internet, enabling an organization to either allow or block web traffic
in order to protect against potential threats and enforce corporate policy.
ACTIVITY LOG FOR THE FIFTH WEEK

Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature

I have learnt organizatoin


of allowing and blocking
Web filter web traffic in ordere to
Day-1
protect against potential
(28/05/2024
threads and enforce
corporate policy.
I have learnt that wifi is a
Day-2 wire less networking
(29/05/2024 Web filter technology .

I have learnt that wifi


allows divices and other
Day-3
(30/05/2024
Web filter quiz equipments to interface
with the internet.

I have learnt that wifi is a


Day-4 wire less networking
(31/05/2024 WIFI technology .

I have learnt that wifi


allows divices and other
Day-5
(01/06/2024
WIFI equipments to interface
with the internet.

I have used my knowledge


Day-6 WIFI quiz
I gained from the before
(02/06/2024
chapters here .
WEEKLY REPORT
WEEK – 5 (From 28-05-2024 to 03-06-2024)

Objective of the Activity Done:


I have learnt about web filter and forti ADC.

Detailed Report:
Web filtering software monitors and manages the locations where users are browsing on the
Internet, enabling an organization to either allow or block web traffic in order to protect against
potential threats and enforce corporate policy.
Wi-Fi is a wireless networking technology that allows devices such as computers (laptops and
desktops), mobile devices (smart phones and wearables), and other equipment (printers and
video cameras) to interface with the Internet. FortiADC provides centralized user authentication
and authorization services to web applications
ACTIVITY LOG FOR THE SIXTH WEEK

Day Person
Brief description of the daily
& Learning Outcome InCharge
activity
Date Signature

I have prepared for the


exam and reviewed my
Day-1
(04/06/2024
NSE -2 EXAM preparation notes of before chapters
for the upcoming exam.

I have given my best in


NSE -2 EXAM the exam and it consists
Day-2
many questions about the
(05/06/2024)
topics. I have learnt in the
chapters before.
NSE-3 I have learnt that
centralized user
Day-3 FortiADC authentication and
(06/06/2024 authorization services to
web applications.

I have learnt that offers


automated security
Day-4 Forti Authenticator operations in a
(07/06/2024 consolidated cybersecurity
platform.

I have learnt that offers


automated security
Day-5 Forti Authenticator operations in a
(08/05/2024 consolidated cybersecurity
platform.

I have learnt that


Day-6 Security driven networking ecomplision of five
(09/05/2024 critical network elements.
WEEKLY REPORT
WEEK – 6(From 04-06-2024 To 10-06-2024)

Objective of the Activity Done:


I have learnt about Forti Authenticator , FortiADC, Security driven networking.

Detailed Report:
Fortinet offers centralized user authentication and authorization services to web applications.
We reduce cyber risk and attack impact by speeding both detection and response.
Outstanding network security, performance, and manageability.
Single-pane-of-glass management through tight integration with the FortiGate architecture.
ACTIVITY LOG FOR THE SEVENTH WEEK

Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature

I have given my best in the


Security driven networking quiz exam and it consists
Day-1
(11/06/2024)
questions about the topic I
have learnt in the chapter
before.
I have learnt that ecomplision
Day-2 Forti switch of five critical network
(12/06/2024 elements.

I have learnt outstanding


Forti switch network security,
Day-3
(13/06/2024
performance and
manageability.

I have learnt that Limit


access to only the private apps
each user needs.
Day-4 Zero trust access Secure access to private apps
(14/06/2024 from BYOD and unmanaged
devices, including
Chromebooks, Linux and IoT.

I have given my best in the


Zero trust access quiz exam and it consists
Day-5
(15/06/2024
questions about the topic I
have learnt in the chapter
before.
I have learnt that unified
Forti voice communivation and
collaboration as services offer
Day-6
(16/06/2024
simplified management in
both centralized and
distributed environment.
WEEKLY REPORT
WEEK – 7(From 11-06-2024 To 17-06-2024)

Objective of the Activity Done:


I have learnt about Forti switch, Zero trust access , Forti voice.

Detailed Report:
Fortinet offers Limit access to only the private apps each user needs.
Secure access to private apps from BYOD and unmanaged devices, including Chromebooks,
Linux and IoT.Secure remote access to IT network tools and on-premises applications.
Keep data secure with best-in-class DLP and malware protections.
SASE-Ready with CASB and SWG Services Available.
Fortinet utilizes artificial intelligence (AI) of varying types, in various locations for
complementary purposes. From the global threat intelligence in our FortiGuard Labs, to inline
security controls deployed throughout the organization, and centralized advanced threat
detection and response in the SOC.
ACTIVITY LOG FOR THE EIGTH WEEK

Day Person
Brief description of the daily
& Learning Outcome In Charge
activity
Date Signature

I have learnt that


communivation and
Day-1
(18/06/2024
Adaptive cloud security collaboration as services
offer simplified
management .

I have given my best in


the exam and it consists
Day-2 Adaptive cloud security quiz
(19/06/2024
questions about the topic I
have learnt in the chapter
before.

I have learnt that FORTI


Day-3 Forti Web web improve security and
(20/06/2024 reduce administrative
overhead
I have learnt Fortinet
utilizes artificial
intelligence (AI) of
varying types, in various
Day-4
(21/06/2024
Security operations quiz locations for
complementary purposes.
From the global threat
intelligence in our
FortiGuard Labs
I have prepared for the
exam and reviewed my
Day-5
(22/06/2024
NSE-3 exam preparation notes of before chapters
for the upcoming exam.

I have given my best in


the exam and it consists
Day-3
(23/06/2024
NSE-3 EXAM many questions about the
topics I have learnt in the
chapters before.
WEEKLY REPORT
WEEK – 8(From 18-06-2024 To 24-06-2024)

Objective of the Activity Done:


The practice questions in fortinet used to develop our skill in this network security.

Detailed Report:
Fortinet offers automated security operations in a consolidated cybersecurity platform. We
reduce cyber risk and attack impact by speeding both detection and response.
Outstanding network security, performance, and manageability.
Single-pane-of-glass management through tight integration with the FortiGate architecture.
FORTI web improve security and reduce administrative overhead
Learned how to harden the security of your network by using the most common FortiGate
features. Through demos and interactive simulations, you will learn how to perform basic
operation tasks on FortiGate.
CHAPTER 5: OUTCOMES DESCRIPTION

In this we totally acquired software working environment structure and how can work in the
server by accessing . Forti Authenticator, Forti gate, Forti Adc many more have learnt.
The labs in the whole session learnt about new things in what a real time done in the software
field,
It make me more efficient working in the this Network security virtual internship provided by
Eduskills.
Expertise in at least one high-level programming language Skills for developing, deploying &
debugging network security applications Skills in API usage, command line interface and
SDKs for writing applications Knowledge of key features of network security Providers.
Understanding of application lifecycle management. Ability to use continuous integration and
distribution pipelines to deploy applications
Ability to code to implement essential security measures. Skills in writing, correcting, and
debugging code modules. Code writing skills for serverless applications. Understanding in
the use of containers in development processes.
Student Self Evaluation of the Short-Term Internship

Student Name: GORRELA KRISHNAVENI


Registration No: 22X45A0428
Term of Internship: 2 MONTHS From: 30-04-204 To 30-06-2024

Organization Name & Address: EDUSKILLS

Please rate your performance in the following areas:

Rating Scale: Letter grade of CGPA calculation to be provided

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5

Date: Signature of the Student


Evaluation by the Supervisor of the Intern Organization

Student Name: GORRELA KRISHNAVENI


Registration No: 22X45A0428
Term of Internship: 2 MONTHS From: 30-04-2024 To 30-06-2024

Date of Evaluation:

Organization Name & Address: EDUSKILLS

Name & Address of the Supervisor: Ms k Noha


Namratha

Please rate the student’s performance in the following areas:

Please note that your evaluation shall be done independent of the Student’s self evaluation

Rating Scale: 1 is lowest and 5 is highest rank

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5

Date: Signature of the Supervisor


PHOTOS & VIDEO LINK
MARKS STATEMENT
(To be used by the Examiners)
t/Principal

You might also like