Valli Summer Intern Report
Valli Summer Intern Report
Valli Summer Intern Report
Submitted by
BOKKA SRI VALLI
216N1A6107
(2024-2025)
SRINIVASA INSTITUTE OF ENGINEERING AND TECHNOLOGY
(Accredited by NAAC with 'A' Grade; Recognised by UGC under sections 2(f) & 12(B))
CERTIFICATE
This is to certify that B.SRI VALLI Reg. No. 216N1A6107 has completed his/her Internship
in AICTE Eduskills on Palo Alto Cybersecurity as a part of partial fulfillment of the requirement for
the Degree of Bachelor of Technology in the Department of Artificial Intelligence and Machine
Learning for the academic year 2024-2025.
Principal
TABLE OF CONTENTS
S.NO CONTENTS
1 CERTIFICATE OF INTERNSHIP
2 ACKNOWLEDGEMENT
3 ABSTARCT
4 INTERNSHIP ACTIVITES
WEEK-1
WEEK-2
WEEK-3
WEEK-4
WEEK-5
WEEK-6
WEEK-7
WEEK-8
I would like to extend my sincere gratitude to Sarvanan Rajagopal, Training Partner Manager, APAC
Palo Alto Networks, Shri Buddha Chandrasekhar, Chief Coordinating Officer NEAT Cell, AICTE and
Dr. Satya Ranjan Biswal, Chief Technology Officer, Eduskills for their invaluable support throughout my
Palo Alto Cybersecurity Virtual Internship. This opportunity provided me with practical insights into network
security and threat analysis, significantly enhancing my technical skills and professional growth. Your leadership
was key to making this learning experience truly impactful.
I sincerely appreciate AWS Academy for the comprehensive curriculum in my Palo Alto Cybersecurity
Virtual Internship. It provided invaluable insights into network security and significantly enhanced my
technical capabilities for future challenges.
Our sincere gratitude goes to Chaitanya, our Internship Coordinator, whose constant support, valuable feedback,
andmotivating presence steered us through the challenges we encountered during the project. His leadership
played a critical role in the successful completion of our internship.
I am deeply indebted to Dr. R.Srinivas, Head of the Department, for his guidance and for ensuring we had
access tothe necessary resources and support throughout the internship. His encouragement has been a driving
force in our progress.
My sincere thanks also go to M.Sreenivasa Kumar, Principal, for providing us with the opportunity to embark
on thisjourney, as well as for the continuous support extended during this period.
Finally, I would like to express my appreciation to our College Management, faculty, lab technicians, non-
teaching staff, and friends, who have played an essential role in helping us complete the internship. Their timely
support, bothdirect and indirect, contributed greatly to our success.
ABSTRACT
The internship report provides an overview of the Cybersecurity Virtual Internship conducted by
Palo Alto Networks, powered by Beacon. The internship offered an in-depth understanding of
cybersecurity principles, network security, and threat detection techniques. Through a series of
hands on exercises and real-world simulations, participants were introduced to industry-standard
practices for protecting digital infrastructures against cyber threats.
As the cybersecurity landscape becomes more complex, Palo Alto Networks Education Services has
taken steps to align with industry standards following the NIST/NICE (National Institute of Standards
and Technology/National Initiative for Cybersecurity Education) workforce framework.
The program covered essential topics, including firewalls, intrusion detection systems, cloud security,
and endpoint protection, enabling participants to develop critical skills in analyzing and mitigating
security vulnerabilities.
Participants engaged in hands-on labs, exploring tools like firewalls, VPNs, and security operations
centers (SOCs) to detect, prevent, and respond to cyber threats. This report highlights the key learnings
from the internship, along with the practical applications and challenges encountered throughout the
program. It also reflects on how this experience has enriched my knowledge and prepared me for future
roles in the cybersecurity field.
WEEK – 1,2
Topics
• Cyber Security Landscape
• Cyberattack Types
• Cyberattack Techniques
• APTs and Wi-Fi Vulnerabilities
• Security Models
Cyberattack Types:
Attackers use a variety of techniques and attack types to achieve their objectives. Malware and
exploits are integral to the modern cyberattack strategy. This lesson describes the different
malware types and properties, the relationship between vulnerabilities and exploits, and how
modern malware plays a central role in a coordinated attack against a target. This lesson also
explains the timeline of eliminating a vulnerability.
Malware Types:
Cyberattack Techniques :
Attackers use a variety of techniques and attack types to achieve their objectives.
Spamming and phishing are commonly employed techniques to deliver malware and
exploits to an endpoint via an email executable or a web link to a malicious website.
Once an endpoint is compromised, an attacker typically installs back doors, remote
access Trojans (RATs), and other malware to ensure persistence. This lesson
describes spamming and phishing techniques, how bots and botnet’s function, and
the different types of botnets.
Topics
• The Connected Globe
• Addressing and Encapsulation
• Network Security Technologies
• Endpoint Security and Protection
In this lesson, we will discuss how hundreds of millions of routers deliver Transmission
Control Protocol/Internet Protocol (TCP/IP) packets using various routing protocols across
local-area networks and wide-area networks. We also will discuss how the Domain Name
System (DNS) enables internet addresses, such as www.paloaltonetworks.com, to be
translated into routable IP addresses.
In the 1960s, the U.S. defence Advanced Research Projects Agency (DARPA) created
ARPANET, the precursor to the modern internet. ARPANET was the first packet-
switched network. A packet- switched network breaks data into small blocks (packets),
transmits each individual packet from node to node toward its destination, and then
reassembles the individual packets in the correct order at the destination.
Introduction to Subnetting :
Endpoint Protection :
Advanced malware and script-based attacks can bypass traditional antivirus solutions
with ease and potentially wreak havoc on your business.
Prevention-First’ Architecture :
Simplifying your security posture allows you to reduce operational costs and
infrastructure while increasing your ability to prevent threats to your organization.
Next-Generation Firewall :
The Palo Alto Networks Next-Generation Firewall is the foundation of our product
portfolio. The firewall is available in physical, virtual, and cloud-delivered
deployment options
WEEK – 5,6
Topics :
• Cloud Computing
• Cloud Native Responsibilites
• Cloud Native Technologies
• Four C’s
Cloud Computing :
The move toward cloud computing not only brings cost and operational benefits but
also technology benefits. Data and applications are easily accessed by users no matter
where they reside, projects can scale easily, and consumption can be tracked
effectively.
Definition:
Cloud computing is not a location but rather a pool of resources that can be rapidly
provisioned in an automated, on-demand manner. Read the quote below for the
definition of cloud computing according to the U.S. National Institute of Standards
and Technology.
Cloud Computing Ecosystem :
The cloud computing ecosystem consists of service models, deployment models,
responsibilities, and security challenges.
Service Models, Deployment Models, and Responsibilities :
Virtualization is a critical component of a cloud computing architecture that, when
combined with software orchestration and management tools that are covered in this
course, allows you to integrate disparate processes so that they can be automated,
easily replicated, and offered on an as-needed basis.
Cloud Security Responsibilities :
In general terms, the cloud provider is responsible for security of the cloud, including
the physical security of the cloud data centers, and foundational networking, storage,
compute, and virtualization services.
In the cloud, you can have hundreds or even thousands of instances of an application,
presenting exponentially greater opportunities for attack and data theft.
Securing Kubernetes clusters requires securing both the configurable cluster components and
the applications that run in the cluster.
Containers :
Securing the container layer includes container vulnerability scanning and OS
dependency scanning, container image signing and enforcement, and
implementing least privilege access.
Code :
The application code itself must be secured. Security best practices for securing code
include requiring TLS for access, limiting communication port ranges, scanning
third-party libraries for known security vulnerabilities, and performing static and
dynamic code analysis.
WEEK-7,8
• Fundamentals of SOC
• Day in the Life of a SOC Analyst
• Employee Utilization
• SOAR
Fundamentals of SOC :
The Fundamentals of Security Operations Centre training is a high-level introduction to the
general concepts of SOC and SecOps. It will introduce the Security Operations framework, people,
processes, and technology aspects required to support the business, the visibility that is required
to defend the business, and the interfaces needed with other organizations outside of the SOC.
Employee Utilization:
Methods should be developed to maximize the efficiency of a Security Operations team
specific to the existing staff. Security Operations staff are prone to burnout due to
console burn out and extreme workloads. To avoid this, team members should be
assigned different tasks throughout the day. These tasks should be structured and may
include:
• Shift turnover stand up meeting (beginning of shift)
• Event triage
• Incident response
• Project work
• Training
• Reporting
Training :
Proper training of staff will create consistency within an organization. Consistency
drives effectiveness and reduces risk. Use of a formal training program will also enable
the organization to bring on new staff quickly. Some organizations resort to on-the-job
or shadow training for new hires, which is not recommended on its own. While
shadowing other analysts during initial employment in the SOC is important, it should
not be the only means of training.
Technology :
The beginning of our scenario has been mitigated. Erik now needs to work with SOC team members
and other teams to determine if the current network technology can be used to automate a process
or response to automatically remediate this issue, or similar issues that may arise. The
Technology pillar includes tools and technology to increase our capabilities to prevent or greatly
minimize attempts to infiltrate your network.
SOAR :
Scale is one of the biggest challenges for SOCs. We stepped through each pillar to
mitigate a threat, but while Erik was working on one threat, alerts and incidents
continued to pour in. The number of incidents that each member of the SOC team must
respond to is greater than what can be managed through human intervention.
The only reasonable long-term solution is to empower existing resources with a
combination of innovative orchestration, artificial intelligence, and machine learning
technologies to automate many of the manual processes that a SOC team faces each
data.
RESULTS:
Firewall Configuration and Management: One of the primary hands-on activities was
configuring Palo Alto Networks firewalls. Participants learned how to manage firewall rules,
monitor traffic, and secure networks from potential threats. This exercise improved my
understanding of traffic control, packet filtering, and creating security policies.
Threat Detection and Mitigation: The internship involved working with Security Information
and Event Management (SIEM) systems to identify, analyze, and respond to security incidents. I
developed skills in threat hunting, using logs to detect anomalies, and implementing mitigation
strategies to counter real-time attacks.
Endpoint Security: Practical exercises emphasized securing endpoints using tools like Global
Protect. Participants were introduced to key strategies for protecting systems from malware,
phishing, and other forms of cyberattacks, highlighting the importance of endpoint security in
protecting an organization’s overall network.
Cloud Security Fundamentals: The internship covered cloud security and best practices for
securing cloud environments. Through exercises on virtualized infrastructure, I gained insights
into how cloud based applications and services are secured from various types of threats,
particularly focusing
Incident Response: A significant part of the internship focused on incident response
workflows, where participants practiced responding to simulated cyberattacks. This
process involved identifying the breach, containing it, and implementing remediation
actions.
DISCUSSIONS:
The internship provided practical experience with real-world cybersecurity scenarios,
which enhanced my theoretical knowledge with hands-on learning. The configuration
and management of firewalls improved my technical skills, while the exercises in
threat detection and response allowed me to understand how cybersecurity teams
operate in a corporate setting.
The cloud security module was particularly valuable, as more organizations are
adopting cloud services, and understanding cloud security fundamentals is crucial
for protecting these environments. The insights gained from these exercises have
prepared me to handle future cybersecurity challenges with confidence. Overall, the
internship not only helped develop technical skills but also improved problem-
solving abilities, critical thinking, and the ability to respond effectively to
cybersecurity incidents.
CONCLUSION:
The Cybersecurity Virtual Internship provided by Palo Alto Networks, powered by Beacon,
has been a highly rewarding and educational experience. The internship offered a solid
foundation in key cybersecurity principles, including network security, threat detection,
firewall configuration, incident response, and cloud security. Through a combination of
theoretical knowledge and practical, hands-on exercises, I gained valuable insights into real-
world cybersecurity challenges and how to effectively address them. These experiences have
deepened my understanding of how modern organizations protect themselves from a constantly
evolving threat landscape.
The structured approach of the internship helped me apply theoretical concepts to real-world
scenarios, improving my problem-solving abilities and technical proficiency. Furthermore, the
exposure to both network security and cloud environments has prepared me to tackle the
cybersecurity challenges of today’s increasingly connected digital world.
The experience of configuring firewalls, analyzing network traffic, and mitigating cyber threats
has enhanced both my technical skills and my understanding of how cybersecurity teams
operate to protect organizations from evolving threats. Additionally, the cloud security and
endpoint protection modules have prepared me for the increasing shift towards cloud-based
infrastructures and remote working environments.
Overall, this internship has strengthened my cybersecurity knowledge, sharpened my problem-
solving abilities, and increased my readiness to contribute to the cybersecurity industry. In
conclusion, this
internship has been a transformative learning experience, equipping me with the tools and
confidence to further pursue opportunities in cybersecurity. I am now better prepared to
contribute to the field and face emerging threats with a proactive and informed approach.