0% found this document useful (0 votes)
73 views

Internship Weekly Report

This weekly report summarizes Harshil Patel's internship at Techdefence covering 8 weeks from December 2021 to February 2022. Over this period, he attended 8 sessions that covered topics in cyber security including fundamentals, threats, ethical hacking phases, and anti-virus. He also completed 3 projects, including building a hacking environment, an automatic clickjacking tool using Python, and an unnamed third project. The report provides details on the tasks and topics covered in each weekly session.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

Internship Weekly Report

This weekly report summarizes Harshil Patel's internship at Techdefence covering 8 weeks from December 2021 to February 2022. Over this period, he attended 8 sessions that covered topics in cyber security including fundamentals, threats, ethical hacking phases, and anti-virus. He also completed 3 projects, including building a hacking environment, an automatic clickjacking tool using Python, and an unnamed third project. The report provides details on the tasks and topics covered in each weekly session.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

WEEKLY REPORT FILE

[HARSHIL PATEL - 200305126025]

[TECHDEFENCE]
Parul Institute of Engineering &
Technology, Internship Report

TECHDEFENCE 1
Parul Institute of Engineering &
Technology, Internship Report
NO SESSION WEEK TASK AND TOPIC
SESSION 1 WEEK 1 1. All About Cyber Security
1 2. What is Cyber Security
(12-15 DECEMBER) 3. Emerging scope of Cyber Security
4. Challenges faced in Implementation
of Cyber Security
5. Case Study: Application of Cyber
Security in Politics

SESSION 2 WEEK 2 1. What are Ransomware Attacks


2 2. Opportunities in Cyber Security
(18-22 DECEMBER)
3. Forms of Cyber Security
4. Global Cyber Attack Analysis
5. Fundamentals of Cyber Security
6. Terminologies in Cyber Security
7. Relevance of CIA in Cyber Security

SESSION 3 WEEK 3 1. Understanding Pillars of Cyber


3 Security
(25-29 DECEMBER) 2. What is Confidentiality
3. Case Study of Coca Cola and
Hospitals
4. Types of threats to Confidentiality
1. Hackers
2. Masqueraders
3. Unauthorized Users
4. Unprotected Downloads
5. Malware
5. What is Integrity
6. Understanding the relevance of
Availibilty
7. Threats to Availibility
8. DoS and DDoS
9. What is Non-Repudiation
10. Importance of Accountability
11. What is AAA and it's Relevance

TECHDEFENCE 2
Parul Institute of Engineering &
Technology, Internship Report
SESSION 4 WEEK 4 1. Cyber Security Domains
4 2. Identity and Access Management
(1-5 JANUARY) (IAM)
3. What is Single SignOn
4. Security Information and Event
Management (SIEM)
5. Threat and Vulnerability Management
(TVM)
6. Tools used in the Domains
7. What is Penetration Testing
8. Cyber Security: Types
9. Critical Infrastructure Security
10. Network Security
11. Information Security
12. End-user Security
13. Application Security
SESSION 5 WEEK 5 1. AntiVirus Fundamentals
5 2. What is a Virus
(8-12 JANUARY) 3. Worms
4. Spyware
5. Trojans
6. Adware
7. Key Loggers
8. Understanding the casestudy of
Pegasus Spyware
9. Relevance and Features of AntiVirus
Softwares
10. Fundamentals of AntiVirus
11. Cyber Security Threats
SESSION 6 WEEK 6 1. Ethical Hacking
6 2. What is Ethical Hacking
(15-19 JANUARY) 3. Goals of Ethical Hacking
4. Types of Hacking
5. Why do we need Ethical Hacking
6. Threats to Ethical Hacking
7. Physical and Non Physical Threats
8. Sources of Vulnerabilities
9. Vulnerability Management
10. Logical Threats
11. Preventive Measure

TECHDEFENCE 3
Parul Institute of Engineering &
Technology, Internship Report
SESSION 7 WEEK 7 1. Phases of Ethical Hacking
7 2. Reconnaissance
(22-26 JANUARY) 3. Grouping on Information
4. Types of Footprinting
5. What is Scanning
6. Port Scanning
7. Vulnerability Scanning
8. Network Mapping
9. Vulnerability Identification Tools
10. What is Operating System
Fingerprinting
11. Gaining Access
12. Maintaining Access
13. Covering Tracks Hacking and
Defenses
SESSION 8 WEEK 8 1. Introduction on MAD
8 2. Install Genymotion shell
(29-2 FEBRUARY) 3. Work On Project

TECHDEFENCE 4
Parul Institute of Engineering &
Technology, Internship Report

 PROJECT 1
1. Build your own Hacking Environment
2. Setting Up your laptop
3. Kali Linux Installation and VMware
4. Kali Linux-Command Execution

 PROJECT 2
1. AUTOMATIC CLICKJACKING TOOL
2. Using Python
3. Which automatically detects clickjacking bug from the website.

 PROJECT 3

TECHDEFENCE 5

You might also like