0% found this document useful (0 votes)
33 views56 pages

RaunakTR103

Uploaded by

agent.irctc62390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views56 pages

RaunakTR103

Uploaded by

agent.irctc62390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

A REPORT OF ONE MONTH TRAINING

AT

INFOSYS SPRINGBOARD

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE

DEGREE OF

BACHELOR OF TECHNOLOGY

(Information Technology)

JUNE-JULY ,2024

SUBMITTED BY

Name :- Raunak Singh


University roll no :-2104559

DEPARTMENT OF INFORMATION TECHNOLOGY

GURU NANAK DEV ENGINEERING COLLEGE LUDHIANA

(An Autonomous College Under UGC ACT)


CERTIFICATES
CANDIDATE’S DECLARATION

I “Raunak Singh” hereby declares that I have undertaken one month industrial training at Infosys

Springboard during a period of June, 2024 to July, 2024 in partial fulfilment of requirements for the

award of degree of B. Tech (Information Technology) at GURU NANAK DEV ENGINEERING

COLLEGE, LUDHIANA. The work which is being presented in the training report submitted to

Department of Information Technology at GURU NANAK DEV ENGINEERING COLLEGE,

LUDHIANA is an authentic record of training work.

Signature of the Student

The one-month industrial training Viva -Voce Examination of has been held on

and accepted.

Signature of Internal Examiner Signature of External Examiner

ii
ABSTRACT
The "Artificial Intelligence Primer Certification and Cyber security" course provides a

comprehensive overview of the fundamental concepts, techniques, and applications in the field of

artificial intelligence (AI) and cyber. This course aims to equip students with a strong foundation in

AI, enabling them to understand the principles behind intelligent systems, machine learning, and

data-driven decision-making. Students will explore topics such as problem-solving, knowledge

representation, natural language processing, computer vision, and robotics. Students gain practical

experience in building AI models, working with data, and solving real-world problems. By the end

of this course, students will have a solid understanding of AI's role in various industries, including

healthcare, finance, and autonomous systems, and be prepared to pursue advanced studies or careers

in AI.

iii
ACKNOWLEDGEMENT

I would like to extend my heartfelt appreciation to both my college and Infosys Springboard for the

exceptional opportunity to participate in the 4-week online training program. This training experience has

been invaluable in enhancing my skills and knowledge in AI and Cyber Security. First and foremost, I am

profoundly grateful to my college for recognizing the importance of providing students with access to such

high-quality training programs. This initiative has enabled me and my fellow students to acquire relevant

skills and stay competitive in the ever-evolving world of technology.

I would like to express my sincere gratitude to the team at Infosys Springboard for their dedication and

commitment in delivering a comprehensive and well-structured training program. The instructors and mentors

demonstrated expertise in their respective fields, making complex concepts accessible and fostering a

conducive learning environment.

The flexibility of the online format allowed me to balance my training with my academic responsibilities and

personal commitments. This convenience was a significant factor in my ability to fully engage with the

training materials and successfully complete the program. This training experience has equipped me with the

skills and knowledge that will undoubtedly benefit my academic and professional pursuits. I am eager to apply

what I have learned to make a positive impact in my field.

Once again, I extend my heartfelt thanks to both my college and Infosys Springboard for this outstanding

learning opportunity

iv
ABOUT THE INDUSTRY
Infosys Springboard is a Digital literacy program launched as part of the Infosys ESG Tech for Good

charter. It aims to enable students and associated communities from early education to lifelong

learners by imparting digital and life skills through curated content & interventions, free of cost.

Infosys Springboard Program is an excellent platform for students or learners who are aspiring to

sharpen their existing skills. Infosys Springboard is providing many advantages to the students from

class 6 to lifelong learners in India. It provides a holistic set of Free Online Courses to interested

students who needs quality education through digital literacy, making them productive and self-

reliant citizens.

v
LIST OF FIGURES

Figure No. Figure name Page no.

2.1 CIA Triad 7

2.2 Firewall 9

2.3 Shared key cryptography 11

2.4 Public key Cryptography 12

2.5 Network 15

2.6 OSI model 17

2.7 Network Topology types 20

vi
LIST OF TABLES

Table No. Table Name Page no.

2.1.1 Recent cyber attack 6

2.1.2 Categories of attack 6

2.4.1 IPv4 Address Classes 22


CONTENTS

Topic Page No.

Certificate by Company/Industry/Institute i
Candidate’s Declaration ii
Abstract iii
Acknowledgement iv
About the Institute v
List of Figures vi
List of Tables vii

CHAPTER 1 INTRODUCTION 1-4


1.1 Overview of AI 1
1.2 Overview of Cyber 1-2
1.3 Features of AI 3
1.4 Features of Cyber 4

CHAPTER 2 TRAINING WORK UNDERTAKEN 5-38


2.1 Fundamental of Information security 5-10
2.1.1 Introduction 5
2.1.2 Why information security 5
2.1.3 What is information security 6
2.1.4 Network security 7-8
2.1.5 Application security 9-10
2.2 Fundamentals of cryptography 10-12
2.2.1 Cryptography fundamentals 10-12
2.3 Introduction to cyber security 12-13
2.3.1 Recent cyber attacks 12
2.3.2 Cyber security concept 13
2.4 Network Fundamentals 14-23
2.4.1 Introduction to network 14-16
2.4.2 Networking Models 16-18
2.4.3 Cables 19-20
2.4.4 Network Topology 20
2.4.5 IP Addressing 21
2.4.6 Protocols and Utilities 22
2.4.7 Introduction to Router 22-23
2.4.8 Router Basics 23
2.5 Introduction to data science 24-25
2.5.1 The Data Revolution 24
2.5.2 Components of Data Science 25
2.6 Introduction to natural language processing 25-28
2.6.1 NLP and its applications 26
2.6.2 Challenges in Natural Language Processing 26
2.6.3 Deep Learning For Natural Language Processing 27
2.6.4 Tools and Platforms for NLP applications 28
2.7 Introduction to artificial intelligence 28-33
2.7.1 Why AI 29-31
2.7.3 AI in Practice 31
2.7.4 AI Platform 32-33
2.8 Introduction to deep learning 33-35
2.8.1 Why Deep Learning 33
2.8.2 Deep Learning Evolution and Business Potential 33
2.8.3 Introduction to Artificial Neural Network 34
2.8.4 Convolutional Neural Networks 34
2.8.5 Recurrent Neural Networks 35
2.8.6 Auto encoders 35
2.9 Computer Vision 101 35-36
2.9.1 Why computer vision 35
2.9.2 Concepts and Techniques in computer vision 36
2.10 Introduction to Robotic Process Automation 37-38
2.10.1 Introducing RPA 37
2.10.2 Business Applications of RPA 38
CHAPTER 3 RESULTS AND DISCUSSION 39-43
3.1 Results of cyber security 39
3.2 Knowledge Acquisition 40
3.3 Practical Skill Development 40
3.4 Ethical Awareness 41
3.5 Interactive Learning 41
3.6 Real-World Application 41
3.7 Certification 42
3.8 Future Learning Opportunities 42
3.9 Industry Relevance 43
CHAPTER 4 CONCLUSION 44-45
REFERENCES 46
CHAPTER 1

INTRODUCTION

1.1 Overview – Artificial Intelligence Primer Certification

The "Artificial Intelligence Primer Certification" offered through Infosys Springboard provides a

comprehensive introduction to the field of Artificial Intelligence (AI). This certification program

is designed to equip participants with foundational knowledge and insights into the key

concepts, principles, and applications of AI.

Throughout the course, participants will embark on a structured learning journey that covers a

wide range of topics. These topics include understanding the history and evolution of AI,

exploring the various subfields and domains within AI, grasping the fundamental principles of

machine learning and neural networks, and delving into real- world AI applications such as

natural language processing, computer vision, and robotics.

1.2 Overview – Foundation of Cybersecurity Certification

The "Foundation of Cyber Security" certification offered by Infosys Springboard likely serves as

an introductory educational program intended to provide participants with a solid understanding

of the fundamental principles and practices within the field

This certification is designed to cover essential topics such as the various types of cyber

threats and attacks, basic security protocols, risk management strategies, incident response

procedures, and the importance of compliance with established security standards and

regulations. It may also encompass the significance of cybersecurity in protecting digital

assets, both for personal and professional contexts. This course typically caters to individuals

new to the field of cybersecurity

or those seeking to establish a foundational knowledge base in this domain.

1
By completing the "Foundation of Cyber Security" certification, individuals can expect to

have a basic understanding of cybersecurity principles, which can serve as a springboard for

further exploration and learning in more advanced areas within the cybersecurity field.

Accessing the certification program directly through the provided link would offer detailed

information on the course structure, curriculum, and specific learning outcomes for a more

comprehensive understanding of what the certification entails.

1.3 Features of Artificial Intelligence

The "Artificial Intelligence Primer Certification" offered through InfySpringboard is

characterized by several key features that make it a valuable and comprehensive learning

experience:

 Foundational Content - The certification provides participants with a solid foundation in

artificial intelligence. It covers a wide array of topics, from the basics of AI to its

subfields, enabling participants to grasp the breadth and depth of the technical

background or someone with more experiences.

 Interactive Learning Materials - The program offers a variety of learning materials,

including video lectures, interactive quizzes, practical exercises, and case studies. These

materials enhance engagement and aid in the understanding of complex concepts.

 Real-world Applications - Participants get insights into the practical applications of AI in

areas like natural language processing, computer vision, robotics, and more.

Understanding how AI is used in the real world enhances its relevance and value.

 Expert Instruction - The certification is likely to be led by experienced

2
instructors and experts in the field of AI. Their guidance ensures that participants receive

accurate and up-to-date information.

 Practical Exercises - Hands-on exercises and projects provide participants with the

opportunity to apply theoretical concepts to real-world scenarios. This hands-on

experience is crucial for reinforcing learning and building practical skills.

 Case Studies - The inclusion of real-world case studies demonstrates the impact of AI

across various industries. This contextual understanding helps participants appreciate the

potential of AI to drive innovation and solve complex challenges.

 Self-paced Learning - The certification may offer a self-paced learning structure,

allowing participants to learn at their own convenience and pace. This is beneficial for

individuals with busy schedules.

 Assessments and Certification - The program likely includes assessments. these

assessments leads to the award of the "Artificial Intelligence Primer Certification," a

verified credential that can be added to your professional.

1.4 Features of Cyber security

The "Foundation of Cyber Security" offered through InfySpringboard is characterized several

key features that make it a valuable and comprehensive learning experience:

 Comprehensive Curriculum: Covering the foundational aspects of cybersecurity,

including threat landscapes, types of cyber threats, security protocols, risk management,

incident response, compliance, and best practices.

 Interactive Learning Materials: Engaging learning materials such as video lectures,

case studies, interactive exercises, and possibly simulations to facilitate practical

understanding.

3
 Expert Instruction: Instruction from experienced cybersecurity professionals or

industry experts providing insights into real-world scenarios and practical applications.

 Assessments and Certifications: Periodic assessments or quizzes to evaluate

understanding, with a certification upon successful completion of the course.

 Flexibility: Often offered in an online, self-paced format to accommodate.

 Networking Opportunities: Access to a community or forum where participants can

interact, discuss concepts, and share knowledge with peers and instructors.

 Career Guidance: Some programs might offer career guidance, resume- building

advice, or job placement support to aid in leveraging the certification for career

opportunities in cybersecurity.

4
CHAPTER 2 TRAINING

UNDER TAKEN

2.1 FUNDAMENTALS OF INFORMATION SECURITY

The "Fundamentals of Information Security" course offered through Infosys Springboard introduces

the learner to the fundamentals concepts of information security such as security objectives -

confidentiality, integrity & availability; security terminology - vulnerability, threat, risk. This course

also introduces the learner to the cyber risks to information, networks, and application software and

some important safeguards that control these risk.

2.1.1 Introduction

• Overview: The "Fundamentals of Information Security" course delves into the foundational

aspects of securing data, systems, and networks. It covers essential principles, practices, and

concepts relevant to information security. By the end of the course you learner be able to

differentiate the objectives of information security – confidentiality, integrity and availability, use

information security jargon in conversations, differentiate symmetric and asymmetric cryptography,

understand generation of digital signatures, understand the functioning of common network

security technologies like firewall, IDS and also understand why input validation is very important

for software applications. You will be able to confidently participate in discussions involving

information security.

2.1.2 Why information Security?

• Recent Cyber-attacks: These attacks highlight the evolving nature and impact of cyber threats,

from supply-chain vulnerabilities to ransomware tactics targeting critical infrastructure and large-

scale corporations. Cyber-attacks[3] continue to pose significant risks to various sectors,

emphasizing the importance of robust cybersecurity measures.

5
Table 2.1.1: Recent Cyber Attacks

• Why information security? : Information security is imperative due to its role in protecting

sensitive data, preserving privacy, and upholding trust. By safeguarding confidential information

from cyber threats such as hacking, malware, and unauthorized access, information security ensures

data integrity, prevents financial losses, and maintains the credibility of individuals and

organizations.

2.1.3 What is information security?

• Categories of attacks: Understanding these categories is essential to create effective defense

mechanisms and strategies against cyber threats, allowing individuals and organizations to better

protect themselves from various types of attacks.

Table 2.2.2: Categories of attacks

6
 Security objectives: Security objectives in the realm of information security revolve around

ensuring the protection, integrity, availability, and confidentiality of data and systems. These

objectives are commonly referred to as the CIA triad. The objectives of confidentiality,

integrity & availability is the foundation of information security. All protection mechanisms aim

to protect one or more of these objectives.

Figure 2.1: CIA Triad

• Information Security Terminology: Information security terminology encompasses a range of

crucial concepts vital for safeguarding digital assets. Encryption involves encoding data for

confidentiality, while firewalls monitor network traffic for protection. Phishing relies on deceptive

messages to trick individuals into revealing sensitive information. Malware, including viruses and

ransomware, poses threats to systems, and vulnerabilities are weaknesses exploitable by attackers.

Two-Factor Authentication requires two forms of validation for access, patches address system

flaws, and social engineering manipulates individuals for data access.

How Information Security is achieved the Big Picture: Information security is achieved through a

multifaceted approach that encompasses policies, technologies, and practices aimed at protecting

digital information from unauthorized access, disruption, or

7
destruction. It involves implementing robust security measures, such as firewalls, encryption,

access controls, and intrusion detection systems, to fortify networks, systems, and data.

2.1.4 Network security

Network security is vital to safeguarding communication networks, systems, and data from

unauthorized access, breaches, and cyber threats. It ensures the confidentiality, integrity, and

availability of information within a network. By implementing various security measures such as

firewalls, intrusion detection systems, encryption, and access controls, network security prevents

unauthorized users from gaining access to sensitive data and protects against cyber attacks,

malware, and other security breaches.

Definition:

“Network security refers to any activity taken to protect the availability of networks and

confidentiality and integrity of data in the network. This security discipline encompasses

various strategies, technologies, and practices such as firewalls, encryption, intrusion

detection systems, access controls, and regular security updates to defend against cyber

attacks, prevent data breaches, and ensure the smooth and secure functioning of

communication networks.”

• Firewall: A firewall is a security system designed to monitor and control incoming and outgoing

network traffic based on predetermined security rules. It acts as a barrier between a trusted internal

network and untrusted external networks, such as the internet.

Firewalls can be hardware, software, or a combination of both and are deployed to prevent

unauthorized access to or from a private network while allowing legitimate communications to

pass through. They analyze incoming and outgoing data packets,

8
determining whether to permit or block them based on defined security rules, helping to safeguard

networks from unauthorized access, cyber threats, and potential attacks.

Figure 2.2: Firewall

• Demilitarized Zone DMZ: A Demilitarized Zone (DMZ) is a segregated network zone that acts as

a middle ground between a trusted internal network and an untrusted external network, typically

the internet. It serves as an intermediary buffer zone that adds an additional layer of security to the

network architecture.

• Intrusion Detection System: An Intrusion Detection System (IDS) is a security technology

designed to detect unauthorized access or malicious activities within a network or computer

system. IDSs help organizations identify and respond to potential security breaches, unauthorized

attempts to access sensitive information, and other cyber threats.

2.1.5 Application Security

Application security is crucial as it focuses on protecting software applications from threats and

vulnerabilities that could compromise their integrity, confidentiality, and availability. It aims to

identify and rectify weaknesses within applications, preventing unauthorized access, data breaches,

and potential cyber attacks.

Application security refers to the practice of securing software applications from potential threats,

vulnerabilities, and unauthorized access. It involves implementing measures and

9
protocols during the development, testing, and deployment phases to prevent data breaches, cyber

attacks, and other security risks

Secure Coding Practice: Secure coding is a practice to avoid introducing security bugs in the

software. Security professionals have analysed previous attacks targeting applications and have

discovered that most vulnerabilities have arisen from common coding errors. As a

developer/tester/code reviewer your objective is to ensure your applications don't have these

common security bugs. These guides provide secure alternatives for each of the errors (for

developers) and tips on how to detect these errors

• Secure design principles: Security design flaws can be avoided by following

established secure design principles:

1. OWASP Security by design principles

2. IEEE Avoiding the Top 10 Software Security Design Flaws

3. SANS Top 25 Dangerous Software Errors

2.2 FUNDAMENTALS OF CRYPTOGRAPHY

2.2.1 Cryptography Fundamentals

Cryptography enables secure communication and storage, protecting data during transmission and while

at rest. It's utilized in various applications, including securing financial transactions, protecting personal

information, enabling secure communication over the internet, and ensuring data privacy in numerous

industries. In essence, cryptography is essential for maintaining the confidentiality and integrity of data

in the digital age, forming the backbone of secure information exchange and storage.

• Shared Key Cryptography: Shared Key Cryptography, also known as symmetric key

cryptography, is a method where the same secret key is used for both encryption and decryption of

data. In this approach, the sender and receiver share an identical secret key,

10
which they use to encode and decode messages. The encryption process involves transforming the

original plaintext message into ciphertext using the shared key. Upon receiving the encrypted

message, the recipient utilizes the same key to decrypt and retrieve the original plaintext. Shared Key

Cryptography offers high-speed processing and is computationally efficient, making it suitable for

securing data transmissions. However, one of its primary challenges lies in securely distributing and

managing the secret keys, as any compromise or interception of the key could lead to a breach in

security.

Figure 2.3: Shared Key Cryptography

 Public Key Cryptography: Public Key Cryptography, also known as asymmetric

cryptography, is a method where a pair of keys is used for encryption and decryption: a public

key and a private key. The public key is widely available and can be shared with anyone, while

the private key is kept secret. Messages encrypted with the public key can only be decrypted by

the corresponding private key and vice versa. This approach provides a secure means of

communication and data protection, as the private key is never shared or revealed. Public Key

Cryptography is widely used for secure communication, digital signatures, and authentication.

11
Figure 2.4: Public Key Cryptography

• Hashing: Hashing is a process that transforms input data of any size into a fixed-size string of

characters using a mathematical algorithm called a hash function. The resulting string is often a

unique, seemingly random sequence of characters that represents the original data. This process

generates a unique digital fingerprint for the input data, making it practically infeasible to reverse

the hash and retrieve the original information. Hash functions are used in various applications,

including data integrity verification, password storage, digital signatures, and verifying the

integrity of transmitted data. They are designed to be fast to compute, deterministic, and produce

unique outputs for different inputs.

• Digital Signature: A digital signature is a cryptographic technique that ensures the authenticity,

integrity, and non-repudiation of digital messages or documents. It involves using a specific

algorithm to generate a unique digital fingerprint of the content, known as a hash, and encrypting

this hash with the sender's private key. The encrypted hash, along with the digital document, forms

the digital signature.

2.3 INTRODUCTION TO CYBER SECURITY

2.3.1 Recent Cyber Attacks

• Today’s Digital World: Online applications these days can be accessed through desktops, laptops,

cell phones, etc. These applications are highly inter-connected. Their ease of

access makes them vulnerable. For instance, using the same cell phone a user can update

12
his status on a social media website and can transfer funds online the next minute. He/she might

also use the same cell phone to access their Aadhaar card details. To top it all, he/she might use the

same email account for registering in various banking, social networking applications etc. A weak

password to this account is a temptation for hackers, as by gaining access to this Gmail account they

might be able to access other applications linked with this account.

• General Conclusion about attacks: Every organization reliant on IT for pursuing their mission –

education, government, military, healthcare, retail etc needs to protect itself from such attacks.

Cyber-attacks have increased to such a large extent that even a minute flaw in the system can cost a

lot as we have seen in some of the discussed attacks. Hackers have keen interest in vulnerabilities

existing in an organization or in any information system.

2.3.2 Cyber Security Concepts

• Why Cyber Security: Cybersecurity is vital as it safeguards digital systems, networks, and data

from cyber threats, unauthorized access, and malicious activities. It ensures the confidentiality,

integrity, and availability of information by implementing measures.

• What is Cyber Security? : Cyber Security is a set of techniques used to protect systems, networks,

and applications from attacks, damage or unauthorized access emerging from internet. These

attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting

money from users; or interrupting normal business processes. With comparatively more devices

than people around, implementation of effective Cyber Security measures is a challenge in today's

world.

13
2.4 NETWORK FUNDAMENTALS

2.4.1 Introduction to Network Network

Basics:

Exchanging of information between sender and receiver is called communication. This can be

achieved with the help of Networking. Few examples are as below.

1. Samson sending an email to Margaret over internet (data)

2. Various teams connecting over conference call (voice)

3. Two users video-chatting over Skype application (video)

Communication system is a collection of systems which are connected together to communication. A

typical communication system consists of the following components.

 Sender - person or Device who sends the data. Example: Computer, Telephone, Radio

Broadcasting station.

 Receiver - person or Device who receives the data. Example: Computer, Telephone, Radio

sets.

 Transmission Media - physical medium through which the message travels from the sender to

the receiver. Example: Optical fibers, Coaxial Cables, Radio waves.

 Protocol - set of rules and regulations agreed upon by both the sender and receiver that govern the

message exchange.

Network is a collection of various devices and end user systems connected with each other to

achieve the purpose of communication. Networking has changed the way we do business and day

to day activities.

14
Networking enables us to exchange data like text, audio and video across geographies. Let us move

ahead in understanding the various components of Network.

Components of a Network:

The major components of a Network are End user devices, Switch, Router and interconnections.

A typical network looks as below.

Figure 2.5:Network

Repeater, Hub, Bridge and Gateway are also components of Network. However components are varied

since every Network does not contain same type of devices.

 End User Devices: These are the end points in the Network. They help the end users to send

and receive messages. Examples: Computers, Servers, Smart Phones, Mobile Phones, Printers

etc.

 Hub: It is typically the least expensive and it is a dumb device. Performs very simple job -

anything that comes in one port is sent out through all the other ports.

 Switch: Switches contains multiple ports. It connects various systems to form a simple local

network. Every switch maintains a database with source and destination information, it is called

as MAC Address table.

 Router: Routers connect multiple networks.


15
Every router maintains a database for source and destination information, it is called as

Routing Table Routers usually connect different networks working in different locations. For

example: One network in a campus might have to communicate with a distant network

connected through fiber optics.

Types of Network

1. LAN (Local Area Network): LAN is used to connect networking devices that are in a very

close geographic area, such as a floor of a building, a building itself, or a campus environment.

Switches and Hubs are the primary devices to build a LAN. We can also build small network using

only Hub.

2. WAN (Wide Area Network): WAN is used to connect Local Area Networks together.

Typically, Wide Area Networks are used to connect Local Area Networks which are separated by a

large distance. Router is the primary device to build a WAN.

3. MAN (Metropolitan Area Network): MAN consists of a computer network across an entire

city, college campus or small region. A MAN is larger than a LAN, which is typically limited to a

single building or site. Depending on the configuration, this type of network can cover an area from

several miles to tens of miles. A MAN is often used to connect several LANs together to form a

bigger network.

2.4.2 Networking Models

• Need for Networking Models: Networking models provide a structured framework essential for the

design, implementation, and understanding of communication protocols within computer networks.

These models, like OSI and TCP/IP, organize network functions into distinct layers, ensuring

standardization, interoperability, and consistent communication

between devices. By offering a layered approach and standardized protocols, these models

16
aid in troubleshooting, simplifying network analysis, and providing a foundational framework for

network administrators and engineers to design and manage complex network infrastructures

effectively.

• OSI Reference Model: OSI stands for Open System Interconnection. OSI means that every system

participating in this model, is open for communicating with other systems. OSI reference model is

developed by an organization called ISO (International Organization for Standardization) which

works on the standardization of protocols. OSI Model is an ideal model that helps us in understanding

how data transfer happens between systems.

How the OSI Model look like?

1. OSI model has been divided in seven separate layers

2. Layer is a logical group of related functionalities

3. Each layer has its own functionality and provides support to other layers

4. All layers work together to move data through a network

Figure 2.6 : OSI Reference Model

17
TCP/IP Model: The TCP/IP model, short for Transmission Control Protocol/Internet Protocol,

is a conceptual framework used for understanding the functions and interact.

 Application Layer: This top layer deals with application-level data exchange, such as file

transfers, email, and web browsing. It encapsulates data into formats recognizable by specific

applications.

 Transport Layer: Responsible for end-to-end communication and managing data flow.

It includes protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol),

ensuring reliable or best-effort delivery.

 Internet Layer: Handles the addressing and routing of data packets across networks. It uses IP

(Internet Protocol) to route data between source and destination devices.

 Network Access Layer: Concerned with the physical transmission of data over the network

medium. It involves hardware-specific protocols and interfaces for transmitting data across the

physical network.

The TCP/IP model is the foundation of the internet and most modern network communication. It

provides a structured approach for data transmission and serves as the basis for the design and

functioning of the internet and many other networks.

2.4.3 Cables

In order for the communication to take place, cables play important role. Cable is the medium through

which information usually moves from one network device to another. There are several types of cable

which are commonly used with LANs. The type of cable chosen for a network is related to the network's

topology, protocol, and size.

Cabling Standards: Cabling standards are established guidelines and specifications that define

the design, installation, and performance characteristics of cabling systems used in data
18
communications and networking. These standards ensure reliability, compatibility, and high performance

networking infrastructure. Some key cabling standards include:

1. Twisted Pair Cabling (such as Category 5e, Category 6, Category 6a): These standards define the

construction, performance, and installation requirements for twisted pair cables used in Ethernet

networks. Categories indicate the cable's performance in terms of bandwidth and data transmission

rates.

2. Fiber Optic Cabling (such as 10GBASE-SR, 10GBASE-LR, 40GBASE-SR4): These standards

specify the types and performance characteristics of fiber optic cables used in high- speed networks.

They define the transmission distance, bandwidth, and other parameters for specific applications.

3. Coaxial Cabling Standards: Standards related to coaxial cables, which are used in various

applications, including cable TV, networking, and some specialized data communication systems.

4. Additional Cabling Considerations

Shielding: Shielded Twisted Pair (STP) and Foiled Twisted Pair (FTP) cabling types provide protection

against electromagnetic interference (EMI) and crosstalk.

Environmental Considerations: Cables are designed for various environments, including indoor,

outdoor, and harsh environments with specific ratings for fire resistance and durability.

2.4.4 Network Topologies

Network Topology Types: The components of a Network are connected with each other based

on certain requirements like cost, area, efficiency, reliability, etc. The way of connecting the

components is termed as topology, in other words topology defines

19
the structure of the network. Arrangement of various devices to design a Network is referred

as Topology. Various types of network topologies are shown b

Figure 2.7: Network Topology types

1. Bus Topology: In this type of topology, one long cable runs through the Network acting as a

Backbone and all the hosts tap the signals from it. As the signal travels through the cable, heat is

generated due to which the signal becomes weaker as it travels further distances. Hence this is limited to

shorter distances. When Hub is used in Star topology, logically it is Bus topology. Because Hub is

dumb device which broadcasts all the frames which receives.

2. Ring Topology: Each device has connection with only other two devices on either side, in Ring

Topology signal passes along only one direction till it reaches the destination. When the device

receives the message intended for another one, it regenerates the bits and forwards it. This topology is

easy to install and configure, however a break in the ring can bring in chaos.

3. Star Topology: In Star Topology, each device is connected to a central device, usually Hub. The

devices communicate with each other only through central device. Central Device.

20
4. Mesh Topology: In this type of topology, every device is connected to every other device.

In other words, every device has a dedicated link to every other device. To accommodate n number of

hosts in mesh topology, we need n(n-1)/2 number of cables. Though this topology offers many

advantages, the main disadvantage is the amount of cabling and the number of ports required. For

example, every telephone exchange is connected to every other telephone exchange in a region.

2.4.5 IP Addressing

• Need for IP Address: IP addresses are fundamental for communication in computer networks.

They provide a unique identifier to each device connected to a network, allowing devices to locate and

communicate with each other. The need for IP addresses arises from the way data is routed across

networks: an IP address enables data packets to be directed to the correct destination. Without IP

addresses, devices would not be identifiable or able to send or receive data. In essence, IP addresses are

essential for establishing connections, enabling seamless communication, and ensuring proper data

routing across the internet and other networks.

• Versions of IP Address: IP Addresses are of two versions based on number of bits:-

1. IPv4: Total length is 32 bits (sequence of 0s and 1s) Binary format of same IPv4 address:

11000000.10101000.00000001.00001000. Each 8-bit octet can be represented in decimal format

called dotted decimal notation which is easy to remember. Value in each octet ranges from 0 – 255.

Decimal Format of IPv4 address: 192.168.1.8. It can support up to 2^32 devices. Sample IPv4 address:

192.168.1.8

2. IPv6: Total length is 128 bits. It can support up to 2^128 devices. Sample IPv6 address:

2001:0db8:85a3:0000:0000:8a2e:0370:7334 .

21
Table 2.4.1: IPv4 Address Classes

2.4.7 Introduction to Router

• Need For a Router: Routers serve as critical network devices that facilitate the forwarding of data

packets between different networks. Their primary function involves analyzing incoming data

packets, determining their destination based on the IP addresses, and then efficiently forwarding

these packets along the most optimal paths to their intended destinations.

• Functions of Router: Routers perform several crucial functions in computer networks:-

1. Packet Switching

2. Establishing inter-network communication

3. Packet Filtering

4. Path Selection

2.4.8 Router Basics

• Components of Router: The router has the following components:

1. Read-Only Memory (ROM): maintains instructions for power-on self-test (POST)

diagnostics.

2. Flash: holds the operating system image (Internetwork Operating System - IOS).

22
3. Random-Access Memory (RAM): maintains a table which helps the device to verify multiple

data packets at the same time dynamically.

4. Non-Volatile RAM (NVRAM): retains content when router is powered down or restarted.

 Booting Process of Router:

The booting process of a Router is as follows:

Step 1: The router is powered on.

Step 2: After the router is powered on, it first runs Power-On Self-Test (POST).

Step 3: Bootstrap program locates the router's operating system (IOS - Internetwork Operating System) and

loads it.

Step 4: After IOS loads, bootstrap program locates startup configuration from NVRAM. The booting

process of a router is represented by a flowchart as follows.

Figure 2.8 Booting process of a Router

23
2.5 INTRODUCTION TO DATA SCIENCE

2.5.1 The Data Revolution

 Overview: Data science is an amalgamation of different scientific methods, algorithms and systems

which enable us to gain insights and derive knowledge from data in various forms. Various

organizations like Google, Facebook, Uber, Netflix, etc. are already leveraging data science to provide

better experiences to their end users. Although data science techniques have been conceptualized and

in use for several decades now, the current demand for data science is fueled by the high availability of

digital data, and resources for computation. Why Data Science? : In the past few years the amount of

data that has been generated is titanic. Right at this moment there is more digital data being generated

every single second than ever before! No wonder we live in a digital world. Data Science is about

handling this data.

 What is Data Science? : Data Science is an interdisciplinary field about processes and systems to

extract knowledge or insights from data in various forms, either structured or unstructured, which is a

continuation of some of the data analysis fields such as statistics, data mining, and analytics . Data

Science is the empirical synthesis of actionable knowledge from raw data through the complete data

lifecycle process.

2.5.2 Components of Data Science

 Probability and Statistics: Probability is a mathematical subject which enables us in determining or

predicting how likely it is that an event will happen. The probability of occurrence is assigned a value

from 0 to 1. When the value assigned is 1, it implies that the event will happen with all certainty. On

the other hand when it is 0, it implies that the event is not likely to take place. Thus, we can be more

certain of an event's occurrence when its probability is higher.

Statistics is another mathematical subject which deals primarily with data. It helps us draw

inferences from data by having procedures in place for collecting, classifying and presenting

24
the data in an organized manner. The analysis and interpretation of the refined data helps in providing

further insights.

 Linear Algebra: Linear Algebra is a mathematical subject the deals with the theory of systems of

linear equations, matrices, vector spaces and linear transformations. Linear Algebra is critically used

in almost all peripheries of science, practically solving most of the problems using linear models.

Most of the complex science problems are converted into problems of vectors and matrices and then

solved using linear models., blurring, and signal processing.

 Machine Learning: Machine Learning is the field of scientific study that concentrates on induction

algorithms and on other algorithms that can be said to "learn".

A computer program is said to learn from experience E with respect to some class of tasks T and

performance measure P if its performance at tasks in T, as measured by P, improves with experience E.

2.6 INTRODUCTION TO NATURAL LANGUAGE PROCESSING

Natural Language Processing (NLP) is a subfield of artificial intelligence (AI) that focuses on

the interaction between computers and human language. It involves the development of

algorithms and models that enable computers to understand, interpret, and generate human

language in a way that is both meaningful and useful. NLP plays a critical role in various

applications where text or speech data needs to be processed and analyzed.

2.6.1 NLP and its applications

NLP has a wide range of applications across various domains, including:

 Sentiment Analysis: Determining the sentiment or emotional tone of a piece of text, often used

for social media monitoring and customer feedback analysis.

25
 Text Classification: Categorizing text documents into predefined categories, such as spam

detection, news article categorization, and content recommendation.

 Named Entity Recognition (NER): Identifying and classifying entities such as names of people,

places, organizations, and dates in text data.

 Machine Translation: Automatically translating text from one language to another, as seen in

tools like Google Translate.

 Speech Recognition: Converting spoken language into text, enabling voice assistants and

transcription services.

 Question Answering: Developing systems that can answer questions posed in natural language,

as demonstrated by chatbots and virtual assistants.

 Information Extraction: Extracting structured information from unstructured text, such as

extracting data from resumes or legal documents.

 Language Generation: Generating human-like text, which can be used for chatbots, content

creation, and even storytelling.

2.6.2 Challenges in Natural Language Processing

NLP faces several challenges due to the complexity and ambiguity of human language:

1. Ambiguity: Words and phrases often have multiple meanings, and the context is crucial for

disambiguation.

2. Syntax and Grammar: Properly parsing and understanding sentence structure is essential.

3. Language Variability: Different languages, dialects, and writing styles introduce variability in

language processing.

4. Contextual Understanding: Capturing the context and nuances in language, especially in long texts or

conversations, can be difficult.

5. Lack of Data: Training NLP models often requires large amounts of annotated data, which may not

always be readily available.

26
2.6.3 Deep Learning for Natural Language Processing

Deep learning has revolutionized NLP by enabling the development of powerful models, such as

recurrent neural networks (RNNs), convolutional neural networks (CNNs), and transformer-

based models (e.g., BERT, GPT). These models have achieved state-of-the-art results in various

NLP tasks, thanks to their ability to capture complex language patterns and context.

2.6.4 Tools and Platforms for NLP applications

Platforms for NLP

1. Platforms/Services provided by Amazon over Amazon Web Services

 Amazon Comprehend: NLP service that sues machine learning to find insights in text.

You can perform language detection, named entity recognition, sentiment analysis, POS tagging,

and topic modelling using this service.

 Amazon Lex: Service for building conversational interfaces using voice or text. Provides automatic

speech recognition and natural language understanding capabilities

 Amazon Polly: Service that converts text into life like speech in 25+ languages

 Amazon Transcribe: Service with automatic speech recognition capabilities that converts speech to

text. Can transcribe speech in real-time as well.

 Amazon Translate: A neural machine translation service that delivers fast, high quality and

affordable machine translation.

 Amazon Textract: A service that automatically extracts text and data from scanned

documents

2. Platforms/Services provided by Google over Google Cloud Platform

 Google Cloud Natural Language: Perform syntax analysis, entity analysis, custom entity

extraction, sentiment analysis, content classification, and build machine learning models

on cloud

27
 Google Cloud Translation: Dynamically translate between multiple languages.

 Google Cloud Speech-to-Text API: Performs speech recognition across 120 different languages

46

 Google Cloud Text-to-Speech API: Synthesize natural sounding speech in 32 different voices

across multiple languages and variants

 DialogFlow: Enables the end-to-end development of conversational interfaces (chatbots) across

devices and platforms

3. Platforms/Services provided by Microsoft over Microsoft Azure

 Microsoft Cognitive Services - Speech Services: Automatic speech-to-text transcription, Natural

text-to-speech, and real time speech translation

 Microsoft Cognitive Services - Text Analytics: Named Entitry Recognition (NER), Key Phrase

Extraction, Sentiment Analysis

 Microsoft Cognitive Services - Translator Text: Automatic language detection and text translation

2.7 INTRODUCTION TO ARTIFICIAL INTELLIGENCE

The "Introduction to Artificial Intelligence" course offered by Infosys Springboard provides a

comprehensive foundation in the field of artificial intelligence (AI), equipping participants with

essential knowledge and insights into the principles, applications, and impact of AI technologies.

This course is designed to cater to individuals with varying levels of familiarity with AI

concepts, making it suitable for both beginners and those seeking to consolidate their

understanding of this transformative field.

2.7.1 Why AI?

28
Artificial Intelligence (AI) holds immense significance and offers a wide range of benefits across

various domains and industries due to its ability to emulate human-like cognitive functions and

decision-making processes.

 Types of AI:

AI can be categorized into Narrow or Weak AI, which is designed for specific tasks, and

General or Strong AI, which possesses human-like cognitive abilities. Narrow AI is

prevalent today and includes systems like virtual assistants and recommendation engines.

 Aspects of AI:

AI comprises various aspects such as problem-solving, learning, perception, and reasoning. These

aspects enable AI systems to understand their environment, learn from data, make decisions, and

improve over time.

 Technical View of AI:

From a technical perspective, AI involves the development of algorithms and models that can process

data, recognize patterns, and make decisions based on learned patterns. Machine learning and deep

learning are key components of AI.

 Supervised Learning:

Supervised learning involves training models with labeled data, where the input-output relationships

are known. The model learns to map inputs to outputs based on the provided examples.

 Types of Supervised Learning:

Classification involves categorizing data into predefined classes. Regression predicts continuous

numerical values based on input features.

 Classification:

29
Classification is a supervised learning task where the model assigns input data to specific categories or

classes. For example, classifying emails as spam or not spam.

 Support Vector Machine (SVM):

SVM is a classification algorithm that finds a hyperplane to best separate different classes in a dataset.

 Decision Tree:

A decision tree is a flowchart-like structure that helps in decision-making by mapping features to

outcomes through a tree-like structure of decisions.

 K-Nearest Neighbors (KNN):

KNN is a simple classification algorithm that classifies a data point based on the majority class of its

k nearest neighbors in the feature space.

 Logistic Regression:

Despite its name, logistic regression is a classification algorithm that estimates the probability of a

data point belonging to a specific class.

 Regression:

Regression is a supervised learning technique used for predicting numerical values based on input

features.

 Deep Learning:

Deep learning is a subset of machine learning that involves neural networks with multiple layers. It

excels in tasks like image and speech recognition due to its ability to automatically learn complex

patterns.

 Types of Artificial Neural Network (ANN):

ANNs include feedforward, convolutional, and recurrent neural networks, each specialized for

different tasks.

 Overfitting and Underfitting:

30
Overfitting occurs when a model learns noise in the data instead of general patterns. Underfitting

happens when the model is too simplistic to capture important patterns.

 Ensemble Method and Random Forest:

Ensemble methods combine multiple models to improve overall performance. Random Forest is an

ensemble algorithm based on decision trees.

 Bias-Variance Tradeoff:

The bias-variance tradeoff balances model complexity (variance) and ability to fit data (bias), crucial

for preventing overfitting or underfitting.

 Unsupervised Learning:

Unsupervised learning involves learning patterns from unlabeled data. It includes clustering and

dimensionality reduction techniques.

 Types of Unsupervised Learning:

Clustering groups similar data points together, while dimensionality reduction reduces the number of

input features while preserving meaningful information.

 Reinforcement Learning:

Reinforcement learning involves an agent learning to take actions in an environment to maximize a

reward. It's used in applications like game-playing and robotics.

 Time Series Forecasting:

Time series forecasting involves predicting future values based on historical data points that are ordered

chronologically. It's used for predicting trends in sequential data like stock prices or weather patterns.

2.7.2 AI in Practice

 Machine Learning Process:

The machine learning process involves several key steps. It starts with data collection and

preprocessing, followed by selecting a suitable algorithm, training the model on the data,

31
evaluating its performance, and fine-tuning parameters to optimize results. Once satisfied, the model

is deployed for making predictions on new, unseen data.

 Machine Learning Use Cases:

Machine learning is employed in various domains and industries. Use cases include image and speech

recognition, fraud detection, recommendation systems, medical diagnosis, autonomous vehicles,

natural language processing, and more, where algorithms learn from data to make predictions or

decisions.

 AI Architecture:

AI architecture refers to the structural design of an AI system. It encompasses data acquisition,

preprocessing, model selection, training, validation, deployment, and feedback loops. AI architecture

ensures a well-organized and effective implementation of AI solutions.

 AI-led Business Process Transformations:

AI-led business process transformations involve leveraging AI technologies to streamline, automate,

and optimize business processes. This can lead to improved efficiency, reduced costs, enhanced

customer experiences, and data-driven decision-making, thereby transforming how businesses operate

and deliver value.

2.7.3 AI Platforms

 AI Ecosystems by Key Market Leaders: Several key market leaders have established

comprehensive AI ecosystems that encompass a range of technologies, tools, and services to drive AI

innovation. Companies like Google, Microsoft, Amazon, IBM, and NVIDIA have developed AI

platforms that offer machine learning frameworks, cloud-based services, pre- trained models, and

developer tools. These ecosystems aim to provide developers, data scientists, and businesses with the

resources needed to build and deploy AI-powered applications and solutions.

32
 Infosys NIA: Infosys NIA (Navigating Intelligent Automation) is an AI platform developed by

Infosys, a global technology consulting and services company. NIA offers a suite of AI and

automation tools designed to enhance business processes, improve operational efficiency, and drive

innovation. It combines AI, analytics, and automation to enable enterprises to make smarter decisions,

automate repetitive tasks, and transform their operations.

These language, tools, and frameworks collectively provide the foundation for AI development,

enabling researchers, developers, and businesses to harness the power of AI and create

innovative solutions.

2.8 INTRODUCTION TO DEEP LEARNING

The "Introduction to Deep Learning" course offered by Infosys Springboard provides a

comprehensive and foundational understanding of deep learning, a subset of machine learning

that focuses on neural network architectures with multiple layers. This course is designed to

introduce participants to the principles, techniques, and applications of deep learning, catering to

both beginners and individuals looking to enhance their knowledge in this cutting-edge field.

2.8.1 Why Deep Learning?

Deep learning has gained immense popularity and importance due to its ability to solve complex

problems in various fields, such as computer vision, natural language processing, and speech

recognition. Here are some reasons why deep learning is widely used:

 Feature Learning: Deep learning algorithms can automatically learn relevant features

from raw data, reducing the need for handcrafted feature engineering.

 Scalability: Deep learning models can scale with large amounts of data, making them

suitable for big data applications.

33
 Performance: Deep learning models have achieved state-of-the-art results in numerous

tasks, outperforming traditional machine learning methods.

 Versatility: Deep learning can be applied to a wide range of tasks, from image and

speech recognition to recommendation systems and autonomous vehicles.

2.8.2 Deep Learning Evolution and Business Potential

Deep learning has evolved significantly over the years, driven by advances in hardware and

algorithms. Its business potential includes:

 Improved Efficiency: Deep learning can automate tasks, reducing human

intervention and increasing efficiency.

 Data Insights: It enables businesses to extract valuable insights from large datasets,

leading to data-driven decision-making.

 Customization: Deep learning allows for personalized recommendations and tailored

services, enhancing customer satisfaction.

 Competitive Advantage: Companies that embrace deep learning can gain a competitive

edge by staying ahead in technology and innovation.

2.8.3 Introduction to Artificial Neural Network

An artificial neural network (ANN) is a computational model inspired by the human brain's

neural structure. It consists of layers of interconnected nodes (neurons) that process information.

ANNs are used in deep learning as the fundamental building blocks for creating deep neural

networks. They can be feedforward (for tasks like classification) or recurrent (for tasks involving

sequential data).

2.8.4 Convolutional Neural Networks (CNNs)

CNNs are a type of deep neural network designed for tasks involving grid-like data, such as

images and video. They use convolutional layers to automatically extract

34
hierarchical features from input data, making them especially effective for image classification,

object detection, and image generation tasks.

2.8.5 Recurrent Neural Networks (RNNs)

RNNs are specialized for sequential data, where the order of input matters. They have recurrent

connections that allow them to maintain memory of previous inputs, making them suitable for

tasks like natural language processing, speech recognition, and time series prediction.

2.8.6 Autoencoders

Autoencoders are neural network architectures used for unsupervised learning and

dimensionality reduction. They consist of an encoder and a decoder, and their primary purpose is

to learn a compressed representation of input data. Autoencoders are used in tasks like image

denoising, anomaly detection, and feature learning.

2.9 COMPUTER VISION 101

Computer vision is a field of artificial intelligence (AI) that focuses on enabling computers to

interpret and understand visual information from the world, much like how humans do with their

eyes and brain. It has numerous applications in various domains, including healthcare,

automotive, robotics, and entertainment.

2.9.1 Why Computer Vision?

Computer vision is essential for several reasons:

 Automation: It enables automation of tasks that require visual perception, such as object

recognition, image analysis, and video understanding.

 Enhanced Safety: In applications like autonomous vehicles and surveillance, computer vision can

improve safety by detecting and responding to potential hazards.

 Efficiency: It can optimize processes by automating quality control, identifying defects in

35
manufacturing, and streamlining workflows.

 Accessibility: Computer vision can enhance accessibility for people with visual impairments through

technologies like image recognition and text-to-speech.

 Innovation: It fosters innovation in areas like augmented reality (AR), virtual reality (VR), and

human-computer interaction.

2.9.2 Concepts and Techniques in Computer Vision

Computer vision involves various fundamental concepts and techniques, including:

 Image Processing: Techniques like filtering, edge detection, and image enhancement are used to

preprocess and improve the quality of images before analysis.

 Feature Extraction: Identifying and extracting important features from images, such as corners,

keypoints, and textures, is crucial for recognition and classification.

 Object Detection: Detecting and locating objects within an image or video stream, often using

techniques like Haar cascades or deep learning-based methods.

 Image Classification: Categorizing images into predefined classes or labels using machine learning

algorithms or deep neural networks.

 Image Segmentation: Dividing an image into meaningful regions, such as identifying objects or

boundaries within an image.

 Deep Learning: The use of convolutional neural networks (CNNs) and other deep learning

architectures for tasks like image classification, object detection, and image generation.

 3D Computer Vision: Extending computer vision to work in three-dimensional space, allowing

for depth perception and 3D object recognition.

2.10 INTRODUCTION TO ROBOTIC PROCESS AUTOMATION

RPA, or Robotic Process Automation, is a technology that uses software robots (bots) to

automate repetitive, rule-based tasks and processes in business

36
operations. RPA bots are designed to mimic human actions when interacting with digital

systems and applications. This automation technology has gained significant traction in

recent years due to its potential to improve efficiency, reduce errors, and free up human

resources for more strategic tasks.

2.10.1 Introducing RPA

RPA involves the use of software robots to perform tasks such as data entry, data extraction,

document processing, and more. Key points about RPA include:

 Non-Invasive: RPA bots do not require changes to existing IT infrastructure or systems. They operate at

the user interface level, just like a human user.

 Rule-Based: RPA bots follow predefined rules and instructions. They are not capable of making

decisions beyond what is explicitly programmed.

 Scalability: RPA implementations can be easily scaled up or down to handle increased or decreased

workloads.

2.10.2 Business Applications of RPA

RPA finds applications across various industries and business functions, including: Data Entry

and Data Migration: Automating data entry tasks and migrating data between systems.

 Finance and Accounting: Streamlining accounts payable/receivable, invoice processing, and financial

report generation.

 Human Resources: Automating employee onboarding, payroll processing, and leave

management.

 Customer Service: Handling routine customer queries, order processing, and ticket routing in call

centers.

 Supply Chain and Logistics: Optimizing order tracking, inventory management, and demand

37
forecasting.

 Healthcare: Assisting with patient data management, claims processing, and appointment scheduling.

 Retail and E-commerce: Automates order processing, returns handling, price comparisons, and

personalized marketing. It also helps streamline backend processes such as supply chain and

inventory management.

 Banking and Insurance: RPA assists in fraud detection, loan processing, policy renewal, and

regulatory compliance. This increases the speed and accuracy of services while reducing

operational risks.

 IT Operations: RPA handles system monitoring, data backups, software updates, and other routine IT

maintenance tasks. It improves system uptime and reduces the workload on IT teams.

38
CHAPTER 3

RESULTS AND DISCUSSION

3.1 Results of Cyber Security

The Foundation of Cyber Security certification program offered by Infosys Springboard is designed to

cover the fundamentals of cybersecurity, including network security, encryption,and risk management. In

the modern world, Information asset is saved in digital form. This valuable asset needs to be protected

from cyber threats like unauthorized deletion oralteration or theft. Security is responsibility of every stake

holder. Hence, it is important that all the IT professionals must learn how to protect information. This

course will help in laying strong foundation of Cyber Security for the learners. This certification covers

essential concepts such as basic security principles, threat landscapes, risk management, cryptography,

network security fundamentals, and an understanding of security protocols.

3.2 Knowledge Acquisition:

The AI training program successfully fostered knowledge acquisition among participants. Over the course

of the program, participants exhibited remarkable progress in understanding fundamental AI concepts and

advanced AI subfields.

• Grasp the history and evolution of AI: Participants developed a comprehensive understanding

of how AI evolved from its inception to its current state. This historical context provided

them with valuable insights into the journey.

• Master machine learning principles: Participants became proficient in machine learning, a

fundamental component of AI. They learned about supervised and unsupervised learning, the

importance of data preprocessing, feature engineering, and model evaluation. This

knowledge empowered them to implement machine learning algorithms effectively.

39
• Excel in deep learning: The deep learning module enabled participants to explore neural

networks in depth. They started with the basics of neural network architecture and then

ventured into advanced topics such as convolutional neural networks (CNNs) for image

analysis, recurrent neural networks (RNNs) for sequential data, and generative adversarial

networks (GANs) for image generation.

• Harness Natural Language Processing (NLP): The NLP segment equipped participants with

the capabilities to analyze and understand textual data. They gained proficiency in text

analysis, sentiment analysis, and chatbot development. These skills enabled them to work

with textual data effectively, extract insights, and create chatbots that can interact with users

in a humanlike manner.

• Explore Computer Vision: Participants delved into computer vision, gaining an understanding

of image classification, object detection, and facial recognition. They learned about the

underlying algorithms and their practical applications.

3.3. Practical Skill Development:

The AI training program was not limited to theoretical knowledge but also placed a strong emphasis on

practical skill development:

• Hands-on Labs: Practical workshops provided participants with the opportunity to apply

theoretical concepts in real-world scenarios. They actively engaged with AI tools,

frameworks, and datasets, honing their practical skills. By building and training AI models,

experimenting with parameters, and interpreting results, they gained hands-on experience

that is 23invaluable for AI projects and applications in various industries.

• Real-World Projects: A pivotal aspect of the program was the involvement of participants in

real-world projects. These projects were designed to mirror actual AI applications, allowing

participants to apply their newly acquired knowledge and

40
skills to address complex problems. By successfully implementing AI solutions in these

projects, participants gained practical experience that directly translated to real-world AI

roles.

3.4. Ethical Awareness:

The training program was forward-thinking in its inclusion of a module dedicated to ethics in AI.

Participants demonstrated an increased awareness of ethical considerations in AI development:

• Participants engaged in thoughtful discussions about fairness, bias mitigation, and responsible

AI. They not only acquired theoretical knowledge but also contemplated the real-world

implications of biased AI systems.

• The program equipped participants with the skills to assess AI systems for potential biases and

provided strategies for making AI systems more equitable.

3.5. Interactive Learning:

The inclusion of instructor-led sessions in the training program facilitated interactive learning and

dynamic engagement:

• Participants had the opportunity to interact with experienced AI professionals in real time. This

direct engagement allowed for deeper understanding and the ability to seek clarifications on

complex AI concepts.

• The interactive Q&A format of the instructor-led sessions enhanced the learning experience,

making the program not only informative but also engaging and responsive to participants'

questions and needs.

3.6. Real-World Application:

The participation in real-world projects was a highlight of the training program:

• These projects allowed participants to move beyond theory and directly apply their AI

knowledge and skills to address practical challenges.

41
• By working on complex problems, implementing AI solutions, and gaining experience in AI

project development, participants were better prepared for real-world AI applications in

diverse industries such as healthcare, finance, manufacturing, and more.

3.7. Certification:

The certification awarded at the end of the program was a significant validation of participants' AI

knowledge and skills:

• The certification not only recognized participants' dedication to learning but also served as a

testament to their readiness for AI-related roles in the job market.

• Employers and organizations recognized the certification as proof of participants' capabilities

and expertise in the field, making them valuable assets in a competitive job market.

3.8. Future Learning Opportunities:

The training program nurtured a culture of continuous learning and encouraged participants to stay

updated with the latest advancements in AI:

• AI is a continuously evolving field, and the program empowered participants to explore

further AI topics and expand their knowledge through online resources, research, and

additional learning opportunities.

3.9. Industry Relevance:

The hands-on experience gained from real-world projects and practical labs ensured that participants were

well-prepared for AI-related roles in industries:

• Their practical skills and real-world project experience made them highly relevant and attractive

candidates for AI roles in sectors such as healthcare, finance, manufacturing, and more. In

summary, the AI training program delivered

42
significant knowledge acquisition, practical skill development, ethical awareness, and

interactive learning.

43
CHAPTER-4

CONCLUSION

In conclusion, the Foundation of Cyber Security Certification from Infosys Springboard is designed to

provide participants with a foundational understanding of Cyber Security and related concepts . This

certification tests your knowledge and skills in real-life scenarios, Information Security, Cryptography,

Cyber Security, and Networking within a 60-minute examination. Successful completion of this

certification indicates that you have achieved the following:

1. Understood the importance of Cyber Security

2. Knowledge of basic terminologies and concepts in Cyber Security

3. Importance objectives of Cyber Security

4. To identify various layers of security: System elements, risks, and controls.

Upon achieving this certification, I received a formal certificate from Infosys Springboard, which serves as

a valuable credential to showcase Cyber Security expertise on professional resume and profile.Artificial

Intelligence (AI) has come a long way from its inception as a scientific concept to becoming a powerful

and transformative force in the modern world. Its influence is palpable across various industries,

redefining the ways we work, communicate, and even receive medical care. In healthcare, AI aids in the

early detection of diseases, personalizes treatment plans, and accelerates drug discovery. In finance, it

automates trading strategies, manages risks, and identifies fraudulent activities. Autonomous vehicles,

guided by AI, promise safer and more efficient transportation systems, while virtual assistants

recommendation systems, and natural language processing applications have become integral to our daily

interactions with technology. However, the rapid advancement of AI is accompanied by profound ethical

and societal considerations. The prevalence of algorithmic bias, concerns over data privacy, and the

potential for job displacement all necessitate close individual rights and societal well-being is a key

44
challenge in the ongoing AI journey. Looking to the future, the scope of AI is incredibly promising.

Advancements in machine learning, including deep learning, will con6nue, enabling AI systems to tackle

increasingly complex tasks with higher accuracy. In healthcare, AI will play an even more significant role,

potentially transforming patent care through early disease prediction and drug development. Education

will benefit from AI-driven personalized learning experiences, while AI can aid in environmental

conservation through climate modelling and resource management. The intersection of quantum

computing and AI holds the promise of solving complex problems that were previously computationally

infeasible. In augmented reality (AR) and virtual reality (VR), AI will enhance immersive experiences,

while cybersecurity will benefit from AI-driven threat detection and prevention.

45
REFERENCES

[1] Introduction to Data Science:

https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_0134898743771545602_

shared/overview

[2] Introduction to Natural Language Processing:

https://infyspringboard.onwingspan.com/web/en/app/toc/lex_12666306402263577000

_shar ed/overview

[3] Introduction to Artificial Intelligence:

https://infyspringboard.onwingspan.com/web/en/app/toc/lex_8840337130015322000_

shar ed/overview

[4] Introduction to Deep Learning:

https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012782105116811

26 4219_shared/overview

[5] Computer Vision 101:

https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012952007096016 89

6334_shared/overview

[6] Introduction to Robotic Process Automation:

https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012988484517273

60053 5_shared/overview

[7] Cyber Security, NIST - National Institute of Standards and Technology,

https://www.nist.gov/cyberframework

[8] SANS Institute- SysAdmin, Audit, Network, and Security,

https://www.sans.org/in_en/

[9] Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole

46

You might also like