RaunakTR103
RaunakTR103
AT
INFOSYS SPRINGBOARD
DEGREE OF
BACHELOR OF TECHNOLOGY
(Information Technology)
JUNE-JULY ,2024
SUBMITTED BY
I “Raunak Singh” hereby declares that I have undertaken one month industrial training at Infosys
Springboard during a period of June, 2024 to July, 2024 in partial fulfilment of requirements for the
COLLEGE, LUDHIANA. The work which is being presented in the training report submitted to
The one-month industrial training Viva -Voce Examination of has been held on
and accepted.
ii
ABSTRACT
The "Artificial Intelligence Primer Certification and Cyber security" course provides a
comprehensive overview of the fundamental concepts, techniques, and applications in the field of
artificial intelligence (AI) and cyber. This course aims to equip students with a strong foundation in
AI, enabling them to understand the principles behind intelligent systems, machine learning, and
representation, natural language processing, computer vision, and robotics. Students gain practical
experience in building AI models, working with data, and solving real-world problems. By the end
of this course, students will have a solid understanding of AI's role in various industries, including
healthcare, finance, and autonomous systems, and be prepared to pursue advanced studies or careers
in AI.
iii
ACKNOWLEDGEMENT
I would like to extend my heartfelt appreciation to both my college and Infosys Springboard for the
exceptional opportunity to participate in the 4-week online training program. This training experience has
been invaluable in enhancing my skills and knowledge in AI and Cyber Security. First and foremost, I am
profoundly grateful to my college for recognizing the importance of providing students with access to such
high-quality training programs. This initiative has enabled me and my fellow students to acquire relevant
I would like to express my sincere gratitude to the team at Infosys Springboard for their dedication and
commitment in delivering a comprehensive and well-structured training program. The instructors and mentors
demonstrated expertise in their respective fields, making complex concepts accessible and fostering a
The flexibility of the online format allowed me to balance my training with my academic responsibilities and
personal commitments. This convenience was a significant factor in my ability to fully engage with the
training materials and successfully complete the program. This training experience has equipped me with the
skills and knowledge that will undoubtedly benefit my academic and professional pursuits. I am eager to apply
Once again, I extend my heartfelt thanks to both my college and Infosys Springboard for this outstanding
learning opportunity
iv
ABOUT THE INDUSTRY
Infosys Springboard is a Digital literacy program launched as part of the Infosys ESG Tech for Good
charter. It aims to enable students and associated communities from early education to lifelong
learners by imparting digital and life skills through curated content & interventions, free of cost.
Infosys Springboard Program is an excellent platform for students or learners who are aspiring to
sharpen their existing skills. Infosys Springboard is providing many advantages to the students from
class 6 to lifelong learners in India. It provides a holistic set of Free Online Courses to interested
students who needs quality education through digital literacy, making them productive and self-
reliant citizens.
v
LIST OF FIGURES
2.2 Firewall 9
2.5 Network 15
vi
LIST OF TABLES
Certificate by Company/Industry/Institute i
Candidate’s Declaration ii
Abstract iii
Acknowledgement iv
About the Institute v
List of Figures vi
List of Tables vii
INTRODUCTION
The "Artificial Intelligence Primer Certification" offered through Infosys Springboard provides a
comprehensive introduction to the field of Artificial Intelligence (AI). This certification program
is designed to equip participants with foundational knowledge and insights into the key
Throughout the course, participants will embark on a structured learning journey that covers a
wide range of topics. These topics include understanding the history and evolution of AI,
exploring the various subfields and domains within AI, grasping the fundamental principles of
machine learning and neural networks, and delving into real- world AI applications such as
The "Foundation of Cyber Security" certification offered by Infosys Springboard likely serves as
This certification is designed to cover essential topics such as the various types of cyber
threats and attacks, basic security protocols, risk management strategies, incident response
procedures, and the importance of compliance with established security standards and
assets, both for personal and professional contexts. This course typically caters to individuals
1
By completing the "Foundation of Cyber Security" certification, individuals can expect to
have a basic understanding of cybersecurity principles, which can serve as a springboard for
further exploration and learning in more advanced areas within the cybersecurity field.
Accessing the certification program directly through the provided link would offer detailed
information on the course structure, curriculum, and specific learning outcomes for a more
characterized by several key features that make it a valuable and comprehensive learning
experience:
artificial intelligence. It covers a wide array of topics, from the basics of AI to its
subfields, enabling participants to grasp the breadth and depth of the technical
including video lectures, interactive quizzes, practical exercises, and case studies. These
areas like natural language processing, computer vision, robotics, and more.
Understanding how AI is used in the real world enhances its relevance and value.
2
instructors and experts in the field of AI. Their guidance ensures that participants receive
Practical Exercises - Hands-on exercises and projects provide participants with the
Case Studies - The inclusion of real-world case studies demonstrates the impact of AI
across various industries. This contextual understanding helps participants appreciate the
allowing participants to learn at their own convenience and pace. This is beneficial for
including threat landscapes, types of cyber threats, security protocols, risk management,
understanding.
3
Expert Instruction: Instruction from experienced cybersecurity professionals or
industry experts providing insights into real-world scenarios and practical applications.
interact, discuss concepts, and share knowledge with peers and instructors.
Career Guidance: Some programs might offer career guidance, resume- building
advice, or job placement support to aid in leveraging the certification for career
opportunities in cybersecurity.
4
CHAPTER 2 TRAINING
UNDER TAKEN
The "Fundamentals of Information Security" course offered through Infosys Springboard introduces
the learner to the fundamentals concepts of information security such as security objectives -
confidentiality, integrity & availability; security terminology - vulnerability, threat, risk. This course
also introduces the learner to the cyber risks to information, networks, and application software and
2.1.1 Introduction
• Overview: The "Fundamentals of Information Security" course delves into the foundational
aspects of securing data, systems, and networks. It covers essential principles, practices, and
concepts relevant to information security. By the end of the course you learner be able to
differentiate the objectives of information security – confidentiality, integrity and availability, use
security technologies like firewall, IDS and also understand why input validation is very important
for software applications. You will be able to confidently participate in discussions involving
information security.
• Recent Cyber-attacks: These attacks highlight the evolving nature and impact of cyber threats,
from supply-chain vulnerabilities to ransomware tactics targeting critical infrastructure and large-
5
Table 2.1.1: Recent Cyber Attacks
• Why information security? : Information security is imperative due to its role in protecting
sensitive data, preserving privacy, and upholding trust. By safeguarding confidential information
from cyber threats such as hacking, malware, and unauthorized access, information security ensures
data integrity, prevents financial losses, and maintains the credibility of individuals and
organizations.
mechanisms and strategies against cyber threats, allowing individuals and organizations to better
6
Security objectives: Security objectives in the realm of information security revolve around
ensuring the protection, integrity, availability, and confidentiality of data and systems. These
objectives are commonly referred to as the CIA triad. The objectives of confidentiality,
integrity & availability is the foundation of information security. All protection mechanisms aim
crucial concepts vital for safeguarding digital assets. Encryption involves encoding data for
confidentiality, while firewalls monitor network traffic for protection. Phishing relies on deceptive
messages to trick individuals into revealing sensitive information. Malware, including viruses and
ransomware, poses threats to systems, and vulnerabilities are weaknesses exploitable by attackers.
Two-Factor Authentication requires two forms of validation for access, patches address system
How Information Security is achieved the Big Picture: Information security is achieved through a
multifaceted approach that encompasses policies, technologies, and practices aimed at protecting
7
destruction. It involves implementing robust security measures, such as firewalls, encryption,
access controls, and intrusion detection systems, to fortify networks, systems, and data.
Network security is vital to safeguarding communication networks, systems, and data from
unauthorized access, breaches, and cyber threats. It ensures the confidentiality, integrity, and
firewalls, intrusion detection systems, encryption, and access controls, network security prevents
unauthorized users from gaining access to sensitive data and protects against cyber attacks,
Definition:
“Network security refers to any activity taken to protect the availability of networks and
confidentiality and integrity of data in the network. This security discipline encompasses
detection systems, access controls, and regular security updates to defend against cyber
attacks, prevent data breaches, and ensure the smooth and secure functioning of
communication networks.”
• Firewall: A firewall is a security system designed to monitor and control incoming and outgoing
network traffic based on predetermined security rules. It acts as a barrier between a trusted internal
Firewalls can be hardware, software, or a combination of both and are deployed to prevent
8
determining whether to permit or block them based on defined security rules, helping to safeguard
• Demilitarized Zone DMZ: A Demilitarized Zone (DMZ) is a segregated network zone that acts as
a middle ground between a trusted internal network and an untrusted external network, typically
the internet. It serves as an intermediary buffer zone that adds an additional layer of security to the
network architecture.
system. IDSs help organizations identify and respond to potential security breaches, unauthorized
Application security is crucial as it focuses on protecting software applications from threats and
vulnerabilities that could compromise their integrity, confidentiality, and availability. It aims to
identify and rectify weaknesses within applications, preventing unauthorized access, data breaches,
Application security refers to the practice of securing software applications from potential threats,
9
protocols during the development, testing, and deployment phases to prevent data breaches, cyber
Secure Coding Practice: Secure coding is a practice to avoid introducing security bugs in the
software. Security professionals have analysed previous attacks targeting applications and have
discovered that most vulnerabilities have arisen from common coding errors. As a
developer/tester/code reviewer your objective is to ensure your applications don't have these
common security bugs. These guides provide secure alternatives for each of the errors (for
Cryptography enables secure communication and storage, protecting data during transmission and while
at rest. It's utilized in various applications, including securing financial transactions, protecting personal
information, enabling secure communication over the internet, and ensuring data privacy in numerous
industries. In essence, cryptography is essential for maintaining the confidentiality and integrity of data
in the digital age, forming the backbone of secure information exchange and storage.
• Shared Key Cryptography: Shared Key Cryptography, also known as symmetric key
cryptography, is a method where the same secret key is used for both encryption and decryption of
data. In this approach, the sender and receiver share an identical secret key,
10
which they use to encode and decode messages. The encryption process involves transforming the
original plaintext message into ciphertext using the shared key. Upon receiving the encrypted
message, the recipient utilizes the same key to decrypt and retrieve the original plaintext. Shared Key
Cryptography offers high-speed processing and is computationally efficient, making it suitable for
securing data transmissions. However, one of its primary challenges lies in securely distributing and
managing the secret keys, as any compromise or interception of the key could lead to a breach in
security.
cryptography, is a method where a pair of keys is used for encryption and decryption: a public
key and a private key. The public key is widely available and can be shared with anyone, while
the private key is kept secret. Messages encrypted with the public key can only be decrypted by
the corresponding private key and vice versa. This approach provides a secure means of
communication and data protection, as the private key is never shared or revealed. Public Key
Cryptography is widely used for secure communication, digital signatures, and authentication.
11
Figure 2.4: Public Key Cryptography
• Hashing: Hashing is a process that transforms input data of any size into a fixed-size string of
characters using a mathematical algorithm called a hash function. The resulting string is often a
unique, seemingly random sequence of characters that represents the original data. This process
generates a unique digital fingerprint for the input data, making it practically infeasible to reverse
the hash and retrieve the original information. Hash functions are used in various applications,
including data integrity verification, password storage, digital signatures, and verifying the
integrity of transmitted data. They are designed to be fast to compute, deterministic, and produce
• Digital Signature: A digital signature is a cryptographic technique that ensures the authenticity,
algorithm to generate a unique digital fingerprint of the content, known as a hash, and encrypting
this hash with the sender's private key. The encrypted hash, along with the digital document, forms
• Today’s Digital World: Online applications these days can be accessed through desktops, laptops,
cell phones, etc. These applications are highly inter-connected. Their ease of
access makes them vulnerable. For instance, using the same cell phone a user can update
12
his status on a social media website and can transfer funds online the next minute. He/she might
also use the same cell phone to access their Aadhaar card details. To top it all, he/she might use the
same email account for registering in various banking, social networking applications etc. A weak
password to this account is a temptation for hackers, as by gaining access to this Gmail account they
• General Conclusion about attacks: Every organization reliant on IT for pursuing their mission –
education, government, military, healthcare, retail etc needs to protect itself from such attacks.
Cyber-attacks have increased to such a large extent that even a minute flaw in the system can cost a
lot as we have seen in some of the discussed attacks. Hackers have keen interest in vulnerabilities
• Why Cyber Security: Cybersecurity is vital as it safeguards digital systems, networks, and data
from cyber threats, unauthorized access, and malicious activities. It ensures the confidentiality,
• What is Cyber Security? : Cyber Security is a set of techniques used to protect systems, networks,
and applications from attacks, damage or unauthorized access emerging from internet. These
attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting
money from users; or interrupting normal business processes. With comparatively more devices
than people around, implementation of effective Cyber Security measures is a challenge in today's
world.
13
2.4 NETWORK FUNDAMENTALS
Basics:
Exchanging of information between sender and receiver is called communication. This can be
Sender - person or Device who sends the data. Example: Computer, Telephone, Radio
Broadcasting station.
Receiver - person or Device who receives the data. Example: Computer, Telephone, Radio
sets.
Transmission Media - physical medium through which the message travels from the sender to
Protocol - set of rules and regulations agreed upon by both the sender and receiver that govern the
message exchange.
Network is a collection of various devices and end user systems connected with each other to
achieve the purpose of communication. Networking has changed the way we do business and day
to day activities.
14
Networking enables us to exchange data like text, audio and video across geographies. Let us move
Components of a Network:
The major components of a Network are End user devices, Switch, Router and interconnections.
Figure 2.5:Network
Repeater, Hub, Bridge and Gateway are also components of Network. However components are varied
End User Devices: These are the end points in the Network. They help the end users to send
and receive messages. Examples: Computers, Servers, Smart Phones, Mobile Phones, Printers
etc.
Hub: It is typically the least expensive and it is a dumb device. Performs very simple job -
anything that comes in one port is sent out through all the other ports.
Switch: Switches contains multiple ports. It connects various systems to form a simple local
network. Every switch maintains a database with source and destination information, it is called
Routing Table Routers usually connect different networks working in different locations. For
example: One network in a campus might have to communicate with a distant network
Types of Network
1. LAN (Local Area Network): LAN is used to connect networking devices that are in a very
close geographic area, such as a floor of a building, a building itself, or a campus environment.
Switches and Hubs are the primary devices to build a LAN. We can also build small network using
only Hub.
2. WAN (Wide Area Network): WAN is used to connect Local Area Networks together.
Typically, Wide Area Networks are used to connect Local Area Networks which are separated by a
3. MAN (Metropolitan Area Network): MAN consists of a computer network across an entire
city, college campus or small region. A MAN is larger than a LAN, which is typically limited to a
single building or site. Depending on the configuration, this type of network can cover an area from
several miles to tens of miles. A MAN is often used to connect several LANs together to form a
bigger network.
• Need for Networking Models: Networking models provide a structured framework essential for the
These models, like OSI and TCP/IP, organize network functions into distinct layers, ensuring
between devices. By offering a layered approach and standardized protocols, these models
16
aid in troubleshooting, simplifying network analysis, and providing a foundational framework for
network administrators and engineers to design and manage complex network infrastructures
effectively.
• OSI Reference Model: OSI stands for Open System Interconnection. OSI means that every system
participating in this model, is open for communicating with other systems. OSI reference model is
works on the standardization of protocols. OSI Model is an ideal model that helps us in understanding
3. Each layer has its own functionality and provides support to other layers
17
TCP/IP Model: The TCP/IP model, short for Transmission Control Protocol/Internet Protocol,
Application Layer: This top layer deals with application-level data exchange, such as file
transfers, email, and web browsing. It encapsulates data into formats recognizable by specific
applications.
Transport Layer: Responsible for end-to-end communication and managing data flow.
It includes protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol),
Internet Layer: Handles the addressing and routing of data packets across networks. It uses IP
Network Access Layer: Concerned with the physical transmission of data over the network
medium. It involves hardware-specific protocols and interfaces for transmitting data across the
physical network.
The TCP/IP model is the foundation of the internet and most modern network communication. It
provides a structured approach for data transmission and serves as the basis for the design and
2.4.3 Cables
In order for the communication to take place, cables play important role. Cable is the medium through
which information usually moves from one network device to another. There are several types of cable
which are commonly used with LANs. The type of cable chosen for a network is related to the network's
Cabling Standards: Cabling standards are established guidelines and specifications that define
the design, installation, and performance characteristics of cabling systems used in data
18
communications and networking. These standards ensure reliability, compatibility, and high performance
1. Twisted Pair Cabling (such as Category 5e, Category 6, Category 6a): These standards define the
construction, performance, and installation requirements for twisted pair cables used in Ethernet
networks. Categories indicate the cable's performance in terms of bandwidth and data transmission
rates.
specify the types and performance characteristics of fiber optic cables used in high- speed networks.
They define the transmission distance, bandwidth, and other parameters for specific applications.
3. Coaxial Cabling Standards: Standards related to coaxial cables, which are used in various
applications, including cable TV, networking, and some specialized data communication systems.
Shielding: Shielded Twisted Pair (STP) and Foiled Twisted Pair (FTP) cabling types provide protection
Environmental Considerations: Cables are designed for various environments, including indoor,
outdoor, and harsh environments with specific ratings for fire resistance and durability.
Network Topology Types: The components of a Network are connected with each other based
on certain requirements like cost, area, efficiency, reliability, etc. The way of connecting the
19
the structure of the network. Arrangement of various devices to design a Network is referred
1. Bus Topology: In this type of topology, one long cable runs through the Network acting as a
Backbone and all the hosts tap the signals from it. As the signal travels through the cable, heat is
generated due to which the signal becomes weaker as it travels further distances. Hence this is limited to
shorter distances. When Hub is used in Star topology, logically it is Bus topology. Because Hub is
2. Ring Topology: Each device has connection with only other two devices on either side, in Ring
Topology signal passes along only one direction till it reaches the destination. When the device
receives the message intended for another one, it regenerates the bits and forwards it. This topology is
easy to install and configure, however a break in the ring can bring in chaos.
3. Star Topology: In Star Topology, each device is connected to a central device, usually Hub. The
devices communicate with each other only through central device. Central Device.
20
4. Mesh Topology: In this type of topology, every device is connected to every other device.
In other words, every device has a dedicated link to every other device. To accommodate n number of
hosts in mesh topology, we need n(n-1)/2 number of cables. Though this topology offers many
advantages, the main disadvantage is the amount of cabling and the number of ports required. For
example, every telephone exchange is connected to every other telephone exchange in a region.
2.4.5 IP Addressing
• Need for IP Address: IP addresses are fundamental for communication in computer networks.
They provide a unique identifier to each device connected to a network, allowing devices to locate and
communicate with each other. The need for IP addresses arises from the way data is routed across
networks: an IP address enables data packets to be directed to the correct destination. Without IP
addresses, devices would not be identifiable or able to send or receive data. In essence, IP addresses are
essential for establishing connections, enabling seamless communication, and ensuring proper data
1. IPv4: Total length is 32 bits (sequence of 0s and 1s) Binary format of same IPv4 address:
called dotted decimal notation which is easy to remember. Value in each octet ranges from 0 – 255.
Decimal Format of IPv4 address: 192.168.1.8. It can support up to 2^32 devices. Sample IPv4 address:
192.168.1.8
2. IPv6: Total length is 128 bits. It can support up to 2^128 devices. Sample IPv6 address:
2001:0db8:85a3:0000:0000:8a2e:0370:7334 .
21
Table 2.4.1: IPv4 Address Classes
• Need For a Router: Routers serve as critical network devices that facilitate the forwarding of data
packets between different networks. Their primary function involves analyzing incoming data
packets, determining their destination based on the IP addresses, and then efficiently forwarding
these packets along the most optimal paths to their intended destinations.
1. Packet Switching
3. Packet Filtering
4. Path Selection
diagnostics.
2. Flash: holds the operating system image (Internetwork Operating System - IOS).
22
3. Random-Access Memory (RAM): maintains a table which helps the device to verify multiple
4. Non-Volatile RAM (NVRAM): retains content when router is powered down or restarted.
Step 2: After the router is powered on, it first runs Power-On Self-Test (POST).
Step 3: Bootstrap program locates the router's operating system (IOS - Internetwork Operating System) and
loads it.
Step 4: After IOS loads, bootstrap program locates startup configuration from NVRAM. The booting
23
2.5 INTRODUCTION TO DATA SCIENCE
Overview: Data science is an amalgamation of different scientific methods, algorithms and systems
which enable us to gain insights and derive knowledge from data in various forms. Various
organizations like Google, Facebook, Uber, Netflix, etc. are already leveraging data science to provide
better experiences to their end users. Although data science techniques have been conceptualized and
in use for several decades now, the current demand for data science is fueled by the high availability of
digital data, and resources for computation. Why Data Science? : In the past few years the amount of
data that has been generated is titanic. Right at this moment there is more digital data being generated
every single second than ever before! No wonder we live in a digital world. Data Science is about
What is Data Science? : Data Science is an interdisciplinary field about processes and systems to
extract knowledge or insights from data in various forms, either structured or unstructured, which is a
continuation of some of the data analysis fields such as statistics, data mining, and analytics . Data
Science is the empirical synthesis of actionable knowledge from raw data through the complete data
lifecycle process.
predicting how likely it is that an event will happen. The probability of occurrence is assigned a value
from 0 to 1. When the value assigned is 1, it implies that the event will happen with all certainty. On
the other hand when it is 0, it implies that the event is not likely to take place. Thus, we can be more
Statistics is another mathematical subject which deals primarily with data. It helps us draw
inferences from data by having procedures in place for collecting, classifying and presenting
24
the data in an organized manner. The analysis and interpretation of the refined data helps in providing
further insights.
Linear Algebra: Linear Algebra is a mathematical subject the deals with the theory of systems of
linear equations, matrices, vector spaces and linear transformations. Linear Algebra is critically used
in almost all peripheries of science, practically solving most of the problems using linear models.
Most of the complex science problems are converted into problems of vectors and matrices and then
Machine Learning: Machine Learning is the field of scientific study that concentrates on induction
A computer program is said to learn from experience E with respect to some class of tasks T and
Natural Language Processing (NLP) is a subfield of artificial intelligence (AI) that focuses on
the interaction between computers and human language. It involves the development of
algorithms and models that enable computers to understand, interpret, and generate human
language in a way that is both meaningful and useful. NLP plays a critical role in various
Sentiment Analysis: Determining the sentiment or emotional tone of a piece of text, often used
25
Text Classification: Categorizing text documents into predefined categories, such as spam
Named Entity Recognition (NER): Identifying and classifying entities such as names of people,
Machine Translation: Automatically translating text from one language to another, as seen in
Speech Recognition: Converting spoken language into text, enabling voice assistants and
transcription services.
Question Answering: Developing systems that can answer questions posed in natural language,
Language Generation: Generating human-like text, which can be used for chatbots, content
NLP faces several challenges due to the complexity and ambiguity of human language:
1. Ambiguity: Words and phrases often have multiple meanings, and the context is crucial for
disambiguation.
2. Syntax and Grammar: Properly parsing and understanding sentence structure is essential.
3. Language Variability: Different languages, dialects, and writing styles introduce variability in
language processing.
4. Contextual Understanding: Capturing the context and nuances in language, especially in long texts or
5. Lack of Data: Training NLP models often requires large amounts of annotated data, which may not
26
2.6.3 Deep Learning for Natural Language Processing
Deep learning has revolutionized NLP by enabling the development of powerful models, such as
recurrent neural networks (RNNs), convolutional neural networks (CNNs), and transformer-
based models (e.g., BERT, GPT). These models have achieved state-of-the-art results in various
NLP tasks, thanks to their ability to capture complex language patterns and context.
Amazon Comprehend: NLP service that sues machine learning to find insights in text.
You can perform language detection, named entity recognition, sentiment analysis, POS tagging,
Amazon Lex: Service for building conversational interfaces using voice or text. Provides automatic
Amazon Polly: Service that converts text into life like speech in 25+ languages
Amazon Transcribe: Service with automatic speech recognition capabilities that converts speech to
Amazon Translate: A neural machine translation service that delivers fast, high quality and
Amazon Textract: A service that automatically extracts text and data from scanned
documents
Google Cloud Natural Language: Perform syntax analysis, entity analysis, custom entity
extraction, sentiment analysis, content classification, and build machine learning models
on cloud
27
Google Cloud Translation: Dynamically translate between multiple languages.
Google Cloud Speech-to-Text API: Performs speech recognition across 120 different languages
46
Google Cloud Text-to-Speech API: Synthesize natural sounding speech in 32 different voices
Microsoft Cognitive Services - Text Analytics: Named Entitry Recognition (NER), Key Phrase
Microsoft Cognitive Services - Translator Text: Automatic language detection and text translation
comprehensive foundation in the field of artificial intelligence (AI), equipping participants with
essential knowledge and insights into the principles, applications, and impact of AI technologies.
This course is designed to cater to individuals with varying levels of familiarity with AI
concepts, making it suitable for both beginners and those seeking to consolidate their
28
Artificial Intelligence (AI) holds immense significance and offers a wide range of benefits across
various domains and industries due to its ability to emulate human-like cognitive functions and
decision-making processes.
Types of AI:
AI can be categorized into Narrow or Weak AI, which is designed for specific tasks, and
prevalent today and includes systems like virtual assistants and recommendation engines.
Aspects of AI:
AI comprises various aspects such as problem-solving, learning, perception, and reasoning. These
aspects enable AI systems to understand their environment, learn from data, make decisions, and
From a technical perspective, AI involves the development of algorithms and models that can process
data, recognize patterns, and make decisions based on learned patterns. Machine learning and deep
Supervised Learning:
Supervised learning involves training models with labeled data, where the input-output relationships
are known. The model learns to map inputs to outputs based on the provided examples.
Classification involves categorizing data into predefined classes. Regression predicts continuous
Classification:
29
Classification is a supervised learning task where the model assigns input data to specific categories or
SVM is a classification algorithm that finds a hyperplane to best separate different classes in a dataset.
Decision Tree:
KNN is a simple classification algorithm that classifies a data point based on the majority class of its
Logistic Regression:
Despite its name, logistic regression is a classification algorithm that estimates the probability of a
Regression:
Regression is a supervised learning technique used for predicting numerical values based on input
features.
Deep Learning:
Deep learning is a subset of machine learning that involves neural networks with multiple layers. It
excels in tasks like image and speech recognition due to its ability to automatically learn complex
patterns.
ANNs include feedforward, convolutional, and recurrent neural networks, each specialized for
different tasks.
30
Overfitting occurs when a model learns noise in the data instead of general patterns. Underfitting
Ensemble methods combine multiple models to improve overall performance. Random Forest is an
Bias-Variance Tradeoff:
The bias-variance tradeoff balances model complexity (variance) and ability to fit data (bias), crucial
Unsupervised Learning:
Unsupervised learning involves learning patterns from unlabeled data. It includes clustering and
Clustering groups similar data points together, while dimensionality reduction reduces the number of
Reinforcement Learning:
Time series forecasting involves predicting future values based on historical data points that are ordered
chronologically. It's used for predicting trends in sequential data like stock prices or weather patterns.
2.7.2 AI in Practice
The machine learning process involves several key steps. It starts with data collection and
preprocessing, followed by selecting a suitable algorithm, training the model on the data,
31
evaluating its performance, and fine-tuning parameters to optimize results. Once satisfied, the model
Machine learning is employed in various domains and industries. Use cases include image and speech
natural language processing, and more, where algorithms learn from data to make predictions or
decisions.
AI Architecture:
preprocessing, model selection, training, validation, deployment, and feedback loops. AI architecture
and optimize business processes. This can lead to improved efficiency, reduced costs, enhanced
customer experiences, and data-driven decision-making, thereby transforming how businesses operate
2.7.3 AI Platforms
AI Ecosystems by Key Market Leaders: Several key market leaders have established
comprehensive AI ecosystems that encompass a range of technologies, tools, and services to drive AI
innovation. Companies like Google, Microsoft, Amazon, IBM, and NVIDIA have developed AI
platforms that offer machine learning frameworks, cloud-based services, pre- trained models, and
developer tools. These ecosystems aim to provide developers, data scientists, and businesses with the
32
Infosys NIA: Infosys NIA (Navigating Intelligent Automation) is an AI platform developed by
Infosys, a global technology consulting and services company. NIA offers a suite of AI and
automation tools designed to enhance business processes, improve operational efficiency, and drive
innovation. It combines AI, analytics, and automation to enable enterprises to make smarter decisions,
These language, tools, and frameworks collectively provide the foundation for AI development,
enabling researchers, developers, and businesses to harness the power of AI and create
innovative solutions.
that focuses on neural network architectures with multiple layers. This course is designed to
introduce participants to the principles, techniques, and applications of deep learning, catering to
both beginners and individuals looking to enhance their knowledge in this cutting-edge field.
Deep learning has gained immense popularity and importance due to its ability to solve complex
problems in various fields, such as computer vision, natural language processing, and speech
recognition. Here are some reasons why deep learning is widely used:
Feature Learning: Deep learning algorithms can automatically learn relevant features
from raw data, reducing the need for handcrafted feature engineering.
Scalability: Deep learning models can scale with large amounts of data, making them
33
Performance: Deep learning models have achieved state-of-the-art results in numerous
Versatility: Deep learning can be applied to a wide range of tasks, from image and
Deep learning has evolved significantly over the years, driven by advances in hardware and
Data Insights: It enables businesses to extract valuable insights from large datasets,
Competitive Advantage: Companies that embrace deep learning can gain a competitive
An artificial neural network (ANN) is a computational model inspired by the human brain's
neural structure. It consists of layers of interconnected nodes (neurons) that process information.
ANNs are used in deep learning as the fundamental building blocks for creating deep neural
networks. They can be feedforward (for tasks like classification) or recurrent (for tasks involving
sequential data).
CNNs are a type of deep neural network designed for tasks involving grid-like data, such as
34
hierarchical features from input data, making them especially effective for image classification,
RNNs are specialized for sequential data, where the order of input matters. They have recurrent
connections that allow them to maintain memory of previous inputs, making them suitable for
tasks like natural language processing, speech recognition, and time series prediction.
2.8.6 Autoencoders
Autoencoders are neural network architectures used for unsupervised learning and
dimensionality reduction. They consist of an encoder and a decoder, and their primary purpose is
to learn a compressed representation of input data. Autoencoders are used in tasks like image
Computer vision is a field of artificial intelligence (AI) that focuses on enabling computers to
interpret and understand visual information from the world, much like how humans do with their
eyes and brain. It has numerous applications in various domains, including healthcare,
Automation: It enables automation of tasks that require visual perception, such as object
Enhanced Safety: In applications like autonomous vehicles and surveillance, computer vision can
35
manufacturing, and streamlining workflows.
Accessibility: Computer vision can enhance accessibility for people with visual impairments through
Innovation: It fosters innovation in areas like augmented reality (AR), virtual reality (VR), and
human-computer interaction.
Image Processing: Techniques like filtering, edge detection, and image enhancement are used to
Feature Extraction: Identifying and extracting important features from images, such as corners,
Object Detection: Detecting and locating objects within an image or video stream, often using
Image Classification: Categorizing images into predefined classes or labels using machine learning
Image Segmentation: Dividing an image into meaningful regions, such as identifying objects or
Deep Learning: The use of convolutional neural networks (CNNs) and other deep learning
architectures for tasks like image classification, object detection, and image generation.
RPA, or Robotic Process Automation, is a technology that uses software robots (bots) to
36
operations. RPA bots are designed to mimic human actions when interacting with digital
systems and applications. This automation technology has gained significant traction in
recent years due to its potential to improve efficiency, reduce errors, and free up human
RPA involves the use of software robots to perform tasks such as data entry, data extraction,
Non-Invasive: RPA bots do not require changes to existing IT infrastructure or systems. They operate at
Rule-Based: RPA bots follow predefined rules and instructions. They are not capable of making
Scalability: RPA implementations can be easily scaled up or down to handle increased or decreased
workloads.
RPA finds applications across various industries and business functions, including: Data Entry
and Data Migration: Automating data entry tasks and migrating data between systems.
Finance and Accounting: Streamlining accounts payable/receivable, invoice processing, and financial
report generation.
management.
Customer Service: Handling routine customer queries, order processing, and ticket routing in call
centers.
Supply Chain and Logistics: Optimizing order tracking, inventory management, and demand
37
forecasting.
Healthcare: Assisting with patient data management, claims processing, and appointment scheduling.
Retail and E-commerce: Automates order processing, returns handling, price comparisons, and
personalized marketing. It also helps streamline backend processes such as supply chain and
inventory management.
Banking and Insurance: RPA assists in fraud detection, loan processing, policy renewal, and
regulatory compliance. This increases the speed and accuracy of services while reducing
operational risks.
IT Operations: RPA handles system monitoring, data backups, software updates, and other routine IT
maintenance tasks. It improves system uptime and reduces the workload on IT teams.
38
CHAPTER 3
The Foundation of Cyber Security certification program offered by Infosys Springboard is designed to
cover the fundamentals of cybersecurity, including network security, encryption,and risk management. In
the modern world, Information asset is saved in digital form. This valuable asset needs to be protected
from cyber threats like unauthorized deletion oralteration or theft. Security is responsibility of every stake
holder. Hence, it is important that all the IT professionals must learn how to protect information. This
course will help in laying strong foundation of Cyber Security for the learners. This certification covers
essential concepts such as basic security principles, threat landscapes, risk management, cryptography,
The AI training program successfully fostered knowledge acquisition among participants. Over the course
of the program, participants exhibited remarkable progress in understanding fundamental AI concepts and
advanced AI subfields.
• Grasp the history and evolution of AI: Participants developed a comprehensive understanding
of how AI evolved from its inception to its current state. This historical context provided
fundamental component of AI. They learned about supervised and unsupervised learning, the
39
• Excel in deep learning: The deep learning module enabled participants to explore neural
networks in depth. They started with the basics of neural network architecture and then
ventured into advanced topics such as convolutional neural networks (CNNs) for image
analysis, recurrent neural networks (RNNs) for sequential data, and generative adversarial
• Harness Natural Language Processing (NLP): The NLP segment equipped participants with
the capabilities to analyze and understand textual data. They gained proficiency in text
analysis, sentiment analysis, and chatbot development. These skills enabled them to work
with textual data effectively, extract insights, and create chatbots that can interact with users
in a humanlike manner.
• Explore Computer Vision: Participants delved into computer vision, gaining an understanding
of image classification, object detection, and facial recognition. They learned about the
The AI training program was not limited to theoretical knowledge but also placed a strong emphasis on
• Hands-on Labs: Practical workshops provided participants with the opportunity to apply
frameworks, and datasets, honing their practical skills. By building and training AI models,
experimenting with parameters, and interpreting results, they gained hands-on experience
• Real-World Projects: A pivotal aspect of the program was the involvement of participants in
real-world projects. These projects were designed to mirror actual AI applications, allowing
40
skills to address complex problems. By successfully implementing AI solutions in these
roles.
The training program was forward-thinking in its inclusion of a module dedicated to ethics in AI.
• Participants engaged in thoughtful discussions about fairness, bias mitigation, and responsible
AI. They not only acquired theoretical knowledge but also contemplated the real-world
• The program equipped participants with the skills to assess AI systems for potential biases and
The inclusion of instructor-led sessions in the training program facilitated interactive learning and
dynamic engagement:
• Participants had the opportunity to interact with experienced AI professionals in real time. This
direct engagement allowed for deeper understanding and the ability to seek clarifications on
complex AI concepts.
• The interactive Q&A format of the instructor-led sessions enhanced the learning experience,
making the program not only informative but also engaging and responsive to participants'
• These projects allowed participants to move beyond theory and directly apply their AI
41
• By working on complex problems, implementing AI solutions, and gaining experience in AI
3.7. Certification:
The certification awarded at the end of the program was a significant validation of participants' AI
• The certification not only recognized participants' dedication to learning but also served as a
and expertise in the field, making them valuable assets in a competitive job market.
The training program nurtured a culture of continuous learning and encouraged participants to stay
further AI topics and expand their knowledge through online resources, research, and
The hands-on experience gained from real-world projects and practical labs ensured that participants were
• Their practical skills and real-world project experience made them highly relevant and attractive
candidates for AI roles in sectors such as healthcare, finance, manufacturing, and more. In
42
significant knowledge acquisition, practical skill development, ethical awareness, and
interactive learning.
43
CHAPTER-4
CONCLUSION
In conclusion, the Foundation of Cyber Security Certification from Infosys Springboard is designed to
provide participants with a foundational understanding of Cyber Security and related concepts . This
certification tests your knowledge and skills in real-life scenarios, Information Security, Cryptography,
Cyber Security, and Networking within a 60-minute examination. Successful completion of this
Upon achieving this certification, I received a formal certificate from Infosys Springboard, which serves as
a valuable credential to showcase Cyber Security expertise on professional resume and profile.Artificial
Intelligence (AI) has come a long way from its inception as a scientific concept to becoming a powerful
and transformative force in the modern world. Its influence is palpable across various industries,
redefining the ways we work, communicate, and even receive medical care. In healthcare, AI aids in the
early detection of diseases, personalizes treatment plans, and accelerates drug discovery. In finance, it
automates trading strategies, manages risks, and identifies fraudulent activities. Autonomous vehicles,
guided by AI, promise safer and more efficient transportation systems, while virtual assistants
recommendation systems, and natural language processing applications have become integral to our daily
interactions with technology. However, the rapid advancement of AI is accompanied by profound ethical
and societal considerations. The prevalence of algorithmic bias, concerns over data privacy, and the
potential for job displacement all necessitate close individual rights and societal well-being is a key
44
challenge in the ongoing AI journey. Looking to the future, the scope of AI is incredibly promising.
Advancements in machine learning, including deep learning, will con6nue, enabling AI systems to tackle
increasingly complex tasks with higher accuracy. In healthcare, AI will play an even more significant role,
potentially transforming patent care through early disease prediction and drug development. Education
will benefit from AI-driven personalized learning experiences, while AI can aid in environmental
conservation through climate modelling and resource management. The intersection of quantum
computing and AI holds the promise of solving complex problems that were previously computationally
infeasible. In augmented reality (AR) and virtual reality (VR), AI will enhance immersive experiences,
while cybersecurity will benefit from AI-driven threat detection and prevention.
45
REFERENCES
https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_0134898743771545602_
shared/overview
https://infyspringboard.onwingspan.com/web/en/app/toc/lex_12666306402263577000
_shar ed/overview
https://infyspringboard.onwingspan.com/web/en/app/toc/lex_8840337130015322000_
shar ed/overview
https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012782105116811
26 4219_shared/overview
https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012952007096016 89
6334_shared/overview
https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_012988484517273
60053 5_shared/overview
https://www.nist.gov/cyberframework
https://www.sans.org/in_en/
[9] Cyber Security: Understanding Cyber Crimes- Sunit Belapure Nina Godbole
46