CISCO AICTE SUMMER INTERNSHIP 2022
Hi Everyone, Recently Bennett University’s placement cell presented me with this amazing opportunity to Intern with Cisco, learn and apply cybersecurity concepts through my 2 months virtual journey with Cisco. Here on, I would like to share my experience through the blog.
Cisco Networking Academy offers Virtual Internship Program to second and third year engineering students to bridge the gap between industry and academia. This time Cisco had decided to conduct this program virtually through a collaboration between the industry and Government AICTE portal.
The internship was divided into three parts which needs to be mandatorily completed before moving forward. The schedule included daily 1–2 Hours of Training on the cybersecurity modules and technologies which were assessed through Cisco Networking Academy.
Module 1 : Introduction to Cybersecurity
It’s fair to say that today’s age relies heavily on the internet, and most internet users have little to no idea how those innocuous 1s and 0s make their way safely to our computers. It’s the perfect time to be a hacker. Black hat hackers are having a very difficult time finding vulnerabilities and developing malicious software for them because there are so many access points, public IP addresses, continual traffic, and loads of data to attack. Ig smarter and mon addition, cyberattacks are developing daily. Many people still don’t understand how hackers get around firewalls and virus scanners even though their software is getting inventive.
During the course, we were taught how the fundamentals of cybersecurity are important and what it is all about. We also learned about different type of hackers and what are the motive behind attacks and slight idea of ways to protect systems from such attacks.
Module 2 : Cybersecurity Essentials
There are many methods for putting cybersecurity into practice, but there are three key phases for resolving a security-related problem.
Recognizing the issue that is creating the security issue is the first step. For instance, we must determine whether a man-in-the-middle attack or a denial of service assault is taking place. The problem must next be assessed and examined. We must ensure that all the data and information that might have been exposed during the attack is isolated. The last step after assessing and studying the issue is to create a patch that really fixes it and returns the organization to a functioning state. Three principles are kept in mind for various computations when spotting, assessing, and treating a cyber attack. These are Vulnerability, Threat and Risk.
This course developed foundational understanding of cybersecurity and how it relates to information and network security. The motive behind going through this course was to understand characteristics of cyber crime, security principles and procedures to defend attacks in depth.
Module 3 : Introduction to Packet Tracer
Packet tracer is a breakthrough tool which can be leveraged to design and test networks. It is important to have an outlook of how a network will perform before actually implementing it, This is exactly where packet tracer marks it importance. We were taught to connect systems and visualize how computers communicate with each other on a network.
After completing the trainings and coursework, Every student was assigned a project to demonstrate the skills learned throughout the internship and showcase their talent. I was assigned to design a network for the university campus and connect the systems locally so every computer in the university could communicate with each other on the university network.
Having completed all the milestones and project, This was the end of my 2 month journey with Cisco AICTE Internship Program 2022. Feel free to reach out to me in case of any doubts.
I would like to thank Bennett University and my mentors for this wonderful opportunity and Mr. Sushit Soni for his constant guidance throughout the internship.
Sumit Savaliya | LinkedIn