SUMMER TRAINING 2023
IN CYBERSECURITY AT CISCO NETWORKING
ACADEMY
PRESENTED BY- NARENDRA KUMAR
SISODIYA
(20EJDAI041)
TABLE OF CONTENT
• INTRODUCTION
• ABOUT THE COMPANY
• ABOUT THE INTERNSHIP
• CYBERSECURITY
• PACKET TRACER TOOL
• PROJECT TOPOLOGY
• CERTIFICATE
• CONCLUSION
INTRODUCTION
• THE PRIMARY OBJECTIVE OF THIS PRESENTATION IS
TO PROVIDE A COMPREHENSIVE OVERVIEW OF THE
VALUABLE EXPERIENCES AND KNOWLEDGE I
HAVE ACQUIRED DURING MY ENTIRE INTERNSHIP AT
CISCO NETWORKING ACADEMY. SPECIFICALLY, I WILL
FOCUS ON THE DOMAIN OF CYBERSECURITY AND PACKET
TRACER, THE ENTIRE DURATION OF MY INTERNSHIP. IN
THIS PRESENTATION HIGHLIGHTING THE NEW SKILLS I
HAVE ACQUIRED AND THE PROJECTS I HAVE COMPLETED
THROUGHOUT MY INTERNSHIP JOURNEY.
ABOUT THE COMPANY
• CISCO NETWORKING ACADEMY IS ONE OF
THE LONGEST STANDING IT SKILLS TO JOBS
PROGRAM IN THE WORLD. WE AIM TO
TRANSFORM THE LIVES OF LEARNERS,
EDUCATORS, AND COMMUNICATION THROUGH
THE POWER OF TECHNOLOGY, EDUCATION
AND CAREER OPPORTUNITIES TO POWER AN
INCLUSIVE FUTURE FOR ALL. WE WORK TO
BRIDGE DIGITAL DIVIDES FOR
UNDERREPRESENTED COMMUNITIES,
OPENINGS THEM UP TO A WORLD OF
OPPORTUNITIES IN THE EVOLVING DIGITAL
ECONOMY.
• SUPERVISOR: MUSKAN SINGH
ABOUT THE
INTERNSHIP
• INTERNING AT CISCO NETWORKING ACADEMY
IMMERSED ME IN CYBERSECURITY
FUNDAMENTALS.
• THROUGH HANDS-ON EXPERIENCE WITH CISCO
PACKET TRACER, I MASTERED THREAT
DETECTION, RISK MANAGEMENT, AND
ENCRYPTION PROTOCOLS.
• I HAVE ALSO MADE AN PROJECT REGARDING
COLLEGE NETWORK TOPOLOGY USING CISCO
PACKET TRACER.
• I HAVE ALSO LEARNED ABOUT CYBERSECURITY
ESSENTIAL, THREAT DETECTION AND RISK
MANAGEMENT.
WHAT IS
CYBERSECURITY?
• CYBERSECURITY IS ABOUT SAFEGUARDING SYSTEMS
AND DATA FROM UNAUTHORIZED ACCESS,
EMPHASIZING CONFIDENTIALITY AND INTEGRITY. KEY
STRATEGIES, SUCH AS FIREWALLS AND ENCRYPTION,
COUNTER EVOLVING RISKS, ENSURING THE SECURITY
AND EFFICIENCY OF DIGITAL ENVIRONMENTS.
NEED OF
CYBERSECURITY
• IN OUR CONNECTED WORLD, CYBERSECURITY IS VITAL TO
PREVENT UNAUTHORIZED ACCESS AND DATA BREACHES,
ENSURING TRUST IN ONLINE INTERACTIONS AND SAFEGUARDING
INFORMATION INTEGRITY AND CONFIDENTIALITY FOR
BUSINESSES AND INDIVIDUALS ALIKE.
CYBERSECURITY ATTACKS
• Definition: Malicious software designed to harm or exploit systems.
• Examples: Viruses, worms, trojans, ransomware.
Malware:
• Definition: Deceptive attempts to acquire sensitive information by posing as a
trustworthy entity.
• Examples: Email phishing, spear phishing, social engineering.
Phishing:
• Definition: Overloading a system or network to disrupt its availability.
• Examples: Distributed Denial-of-Service (DDoS) attacks.
Denial-of-Service
(DoS) Attacks:
• Definition: Intercepting and possibly altering communication between two parties
without their knowledge.
• Examples: Eavesdropping, session hijacking.
Man-in-the-Middle
(MitM) Attacks:
PROTECTION
FROM CYBER
ATTACKS
• Implement and maintain firewalls to monitor and control incoming
and outgoing network traffic, acting as a barrier between a trusted
network and untrusted external networks.
Firewalls:
• Keep all software, including operating systems and applications,
up to date with the latest security patches to address
vulnerabilities that attackers might exploit.
Regular Software Updates:
• Install and regularly update antivirus and anti-malware software to
detect and remove malicious programs, providing an additional
layer of defense against various threats.
Antivirus and Anti-Malware Software:
• Enforce strong password policies and consider implementing
multi-factor authentication (MFA) to enhance access control and
protect against unauthorized access.
Strong Authentication:
PROTECTION FROM
CYBER
ATTACKS(CONT...)
• Conduct regular cybersecurity awareness training
for employees to educate them about potential
threats, phishing attacks, and best practices for
maintaining a secure work environment.
Employee Training:
• Encrypt sensitive data, both in transit and at rest, to
protect it from unauthorized access even if a
network or device is compromised.
Data Encryption:
• Divide networks into segments to limit the lateral
movement of attackers within a network. This helps
contain breaches and prevents attackers from
accessing sensitive areas.
Network Segmentation:
INTRODUCTION TO PACKET TRACER TOOL
• PACKET TRACER IS A POWERFUL NETWORK
SIMULATION TOOL DEVELOPED BY CISCO
SYSTEMS TO FACILITATE LEARNING AND
PRACTICAL EXPERIENCE IN THE FIELD OF
NETWORKING. WIDELY USED IN EDUCATIONAL
SETTINGS, ESPECIALLY WITHIN CISCO
NETWORKING ACADEMY COURSES, PACKET
TRACER ALLOWS USERS TO DESIGN, CONFIGURE,
AND TROUBLESHOOT NETWORK
INFRASTRUCTURES IN A VIRTUAL ENVIRONMENT. IT
SERVES AS A COMPREHENSIVE LEARNING
PLATFORM, PROVIDING A SIMULATED NETWORK
ENVIRONMENT THAT EMULATES THE BEHAVIOR OF
REAL-WORLD NETWORKS WITHOUT THE NEED FOR
PHYSICAL HARDWARE.
WORKSPACES
1.LOGICAL –
• LOGICAL WORKSPACE SHOWS THE LOGICAL NETWORK
TOPOLOGY OF THE NETWORK THE USER HAS BUILT. IT
ALSO REPRESENTS THE PLACING, CONNECTING AND
CLUSTERING VIRTUAL NETWORK DEVICES.
2.PHYSICAL –
• PHYSICAL WORKSPACE SHOWS THE GRAPHICAL
PHYSICAL DIMENSION OF THE LOGICAL NETWORK. IT
DEPICTS THE SCALE AND PLACEMENT IN
HOW NETWORK DEVICES SUCH AS ROUTERS,
SWITCHES AND HOSTS WOULD LOOK IN A REAL
ENVIRONMENT. IT ALSO PROVIDES
GEOGRAPHICAL REPRESENTATION OF NETWORKS,
INCLUDING MULTIPLE BUILDINGS, CITIES AND WIRING
CLOSETS.
COMPONENTS OF NETWORK TOPOLOGY
Switches: Switches operate at the data link layer (Layer 2) of the OSI model, connecting devices
through packet switching. With multiple ports for connected computers, switches efficiently
forward data frames based on destination addresses, supporting unicast, multicast, and broadcast
communications in a network.
Router: A router connects and manages traffic between networks, forwarding data to intended IP
addresses. It enables multiple devices to share an Internet connection, often linking local area
networks (LANs) and wide area networks (WANs), with one router typically sufficient for a LAN.
COMPONENTS OF NETWORK TOPOLOGY
Server: a server is a computer or system that provides services or stores data. It is a
prime target for cyber attacks. Security measures include access controls,
encryption, regular patching, intrusion detection, and incident response planning.
Servers play a critical role in network security and data protection.
Access Point: an access point is a device that allows wireless devices to connect to
a wired network. Securing access points is crucial to prevent unauthorized access
and protect against potential security threats in wireless networks.
PROJECT(NETWORK
TOPOLOGY)
• OUR UNIVERSITY
NETWORK IS AN EXAMPLE
FOR STAR TOPOLOGY.
• I HAVE IMPLEMENTED THE
NETWORK FOR 6 OF THE
BUILDINGS.
TESTING THE
CONNECTION
TO ASSESS NETWORK
CONNECTIONS, IT'S NECESSARY
TO SEND AND MEASURE THE
PACKETS TRANSMITTED AND
RECEIVED ON ANY DEVICE WITHIN
THE NETWORK.
STEPS TO DO
 FIRST OPEN ANY DEVICE BY
CLICKING ON IT.
 THEN OPEN CMD.
 THEN RUN "PING <IP_ADDRESS>"
CERTIFICATE
CONCLUSION
• THE OUTCOME OF THE PROPOSED
SYSTEM WILL BE A FAIL-SAFE BACKBONE
NETWORK INFRASTRUCTURE WHICH
MEETS THE REQUIREMENTS FOR
READILY AVAILABLE ACCESS TO
INFORMATION AND SECURITY OF THE
PRIVATE NETWORK, AND ALSO ENSURES
OPTIMIZED PRODUCTIVITY WHEN
TELECOMMUNICATION SERVICES ARE
ACCESSED. THE INSTALLED EQUIPMENT
ALLOWED TO ORGANIZE HIGH-SPEED
WIRED AND WIRELESS INTERNET
ACCESS THROUGHOUT THE WHOLE
COMPLEX OF HOSPITAL BUILDINGS AS
WELL AS PROVIDING TRANSFER OF ALL
TYPES OF DATA THROUGHOUT THE
SINGLE OPTIMIZED NETWORK.
THANK YOU

Presentation by narendra kumar sisodiya.pptx

  • 1.
    SUMMER TRAINING 2023 INCYBERSECURITY AT CISCO NETWORKING ACADEMY PRESENTED BY- NARENDRA KUMAR SISODIYA (20EJDAI041)
  • 2.
    TABLE OF CONTENT •INTRODUCTION • ABOUT THE COMPANY • ABOUT THE INTERNSHIP • CYBERSECURITY • PACKET TRACER TOOL • PROJECT TOPOLOGY • CERTIFICATE • CONCLUSION
  • 3.
    INTRODUCTION • THE PRIMARYOBJECTIVE OF THIS PRESENTATION IS TO PROVIDE A COMPREHENSIVE OVERVIEW OF THE VALUABLE EXPERIENCES AND KNOWLEDGE I HAVE ACQUIRED DURING MY ENTIRE INTERNSHIP AT CISCO NETWORKING ACADEMY. SPECIFICALLY, I WILL FOCUS ON THE DOMAIN OF CYBERSECURITY AND PACKET TRACER, THE ENTIRE DURATION OF MY INTERNSHIP. IN THIS PRESENTATION HIGHLIGHTING THE NEW SKILLS I HAVE ACQUIRED AND THE PROJECTS I HAVE COMPLETED THROUGHOUT MY INTERNSHIP JOURNEY.
  • 4.
    ABOUT THE COMPANY •CISCO NETWORKING ACADEMY IS ONE OF THE LONGEST STANDING IT SKILLS TO JOBS PROGRAM IN THE WORLD. WE AIM TO TRANSFORM THE LIVES OF LEARNERS, EDUCATORS, AND COMMUNICATION THROUGH THE POWER OF TECHNOLOGY, EDUCATION AND CAREER OPPORTUNITIES TO POWER AN INCLUSIVE FUTURE FOR ALL. WE WORK TO BRIDGE DIGITAL DIVIDES FOR UNDERREPRESENTED COMMUNITIES, OPENINGS THEM UP TO A WORLD OF OPPORTUNITIES IN THE EVOLVING DIGITAL ECONOMY. • SUPERVISOR: MUSKAN SINGH
  • 5.
    ABOUT THE INTERNSHIP • INTERNINGAT CISCO NETWORKING ACADEMY IMMERSED ME IN CYBERSECURITY FUNDAMENTALS. • THROUGH HANDS-ON EXPERIENCE WITH CISCO PACKET TRACER, I MASTERED THREAT DETECTION, RISK MANAGEMENT, AND ENCRYPTION PROTOCOLS. • I HAVE ALSO MADE AN PROJECT REGARDING COLLEGE NETWORK TOPOLOGY USING CISCO PACKET TRACER. • I HAVE ALSO LEARNED ABOUT CYBERSECURITY ESSENTIAL, THREAT DETECTION AND RISK MANAGEMENT.
  • 6.
    WHAT IS CYBERSECURITY? • CYBERSECURITYIS ABOUT SAFEGUARDING SYSTEMS AND DATA FROM UNAUTHORIZED ACCESS, EMPHASIZING CONFIDENTIALITY AND INTEGRITY. KEY STRATEGIES, SUCH AS FIREWALLS AND ENCRYPTION, COUNTER EVOLVING RISKS, ENSURING THE SECURITY AND EFFICIENCY OF DIGITAL ENVIRONMENTS.
  • 7.
    NEED OF CYBERSECURITY • INOUR CONNECTED WORLD, CYBERSECURITY IS VITAL TO PREVENT UNAUTHORIZED ACCESS AND DATA BREACHES, ENSURING TRUST IN ONLINE INTERACTIONS AND SAFEGUARDING INFORMATION INTEGRITY AND CONFIDENTIALITY FOR BUSINESSES AND INDIVIDUALS ALIKE.
  • 8.
    CYBERSECURITY ATTACKS • Definition:Malicious software designed to harm or exploit systems. • Examples: Viruses, worms, trojans, ransomware. Malware: • Definition: Deceptive attempts to acquire sensitive information by posing as a trustworthy entity. • Examples: Email phishing, spear phishing, social engineering. Phishing: • Definition: Overloading a system or network to disrupt its availability. • Examples: Distributed Denial-of-Service (DDoS) attacks. Denial-of-Service (DoS) Attacks: • Definition: Intercepting and possibly altering communication between two parties without their knowledge. • Examples: Eavesdropping, session hijacking. Man-in-the-Middle (MitM) Attacks:
  • 9.
    PROTECTION FROM CYBER ATTACKS • Implementand maintain firewalls to monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted network and untrusted external networks. Firewalls: • Keep all software, including operating systems and applications, up to date with the latest security patches to address vulnerabilities that attackers might exploit. Regular Software Updates: • Install and regularly update antivirus and anti-malware software to detect and remove malicious programs, providing an additional layer of defense against various threats. Antivirus and Anti-Malware Software: • Enforce strong password policies and consider implementing multi-factor authentication (MFA) to enhance access control and protect against unauthorized access. Strong Authentication:
  • 10.
    PROTECTION FROM CYBER ATTACKS(CONT...) • Conductregular cybersecurity awareness training for employees to educate them about potential threats, phishing attacks, and best practices for maintaining a secure work environment. Employee Training: • Encrypt sensitive data, both in transit and at rest, to protect it from unauthorized access even if a network or device is compromised. Data Encryption: • Divide networks into segments to limit the lateral movement of attackers within a network. This helps contain breaches and prevents attackers from accessing sensitive areas. Network Segmentation:
  • 11.
    INTRODUCTION TO PACKETTRACER TOOL • PACKET TRACER IS A POWERFUL NETWORK SIMULATION TOOL DEVELOPED BY CISCO SYSTEMS TO FACILITATE LEARNING AND PRACTICAL EXPERIENCE IN THE FIELD OF NETWORKING. WIDELY USED IN EDUCATIONAL SETTINGS, ESPECIALLY WITHIN CISCO NETWORKING ACADEMY COURSES, PACKET TRACER ALLOWS USERS TO DESIGN, CONFIGURE, AND TROUBLESHOOT NETWORK INFRASTRUCTURES IN A VIRTUAL ENVIRONMENT. IT SERVES AS A COMPREHENSIVE LEARNING PLATFORM, PROVIDING A SIMULATED NETWORK ENVIRONMENT THAT EMULATES THE BEHAVIOR OF REAL-WORLD NETWORKS WITHOUT THE NEED FOR PHYSICAL HARDWARE.
  • 12.
    WORKSPACES 1.LOGICAL – • LOGICALWORKSPACE SHOWS THE LOGICAL NETWORK TOPOLOGY OF THE NETWORK THE USER HAS BUILT. IT ALSO REPRESENTS THE PLACING, CONNECTING AND CLUSTERING VIRTUAL NETWORK DEVICES. 2.PHYSICAL – • PHYSICAL WORKSPACE SHOWS THE GRAPHICAL PHYSICAL DIMENSION OF THE LOGICAL NETWORK. IT DEPICTS THE SCALE AND PLACEMENT IN HOW NETWORK DEVICES SUCH AS ROUTERS, SWITCHES AND HOSTS WOULD LOOK IN A REAL ENVIRONMENT. IT ALSO PROVIDES GEOGRAPHICAL REPRESENTATION OF NETWORKS, INCLUDING MULTIPLE BUILDINGS, CITIES AND WIRING CLOSETS.
  • 13.
    COMPONENTS OF NETWORKTOPOLOGY Switches: Switches operate at the data link layer (Layer 2) of the OSI model, connecting devices through packet switching. With multiple ports for connected computers, switches efficiently forward data frames based on destination addresses, supporting unicast, multicast, and broadcast communications in a network. Router: A router connects and manages traffic between networks, forwarding data to intended IP addresses. It enables multiple devices to share an Internet connection, often linking local area networks (LANs) and wide area networks (WANs), with one router typically sufficient for a LAN.
  • 14.
    COMPONENTS OF NETWORKTOPOLOGY Server: a server is a computer or system that provides services or stores data. It is a prime target for cyber attacks. Security measures include access controls, encryption, regular patching, intrusion detection, and incident response planning. Servers play a critical role in network security and data protection. Access Point: an access point is a device that allows wireless devices to connect to a wired network. Securing access points is crucial to prevent unauthorized access and protect against potential security threats in wireless networks.
  • 15.
    PROJECT(NETWORK TOPOLOGY) • OUR UNIVERSITY NETWORKIS AN EXAMPLE FOR STAR TOPOLOGY. • I HAVE IMPLEMENTED THE NETWORK FOR 6 OF THE BUILDINGS.
  • 16.
    TESTING THE CONNECTION TO ASSESSNETWORK CONNECTIONS, IT'S NECESSARY TO SEND AND MEASURE THE PACKETS TRANSMITTED AND RECEIVED ON ANY DEVICE WITHIN THE NETWORK. STEPS TO DO  FIRST OPEN ANY DEVICE BY CLICKING ON IT.  THEN OPEN CMD.  THEN RUN "PING <IP_ADDRESS>"
  • 17.
  • 18.
    CONCLUSION • THE OUTCOMEOF THE PROPOSED SYSTEM WILL BE A FAIL-SAFE BACKBONE NETWORK INFRASTRUCTURE WHICH MEETS THE REQUIREMENTS FOR READILY AVAILABLE ACCESS TO INFORMATION AND SECURITY OF THE PRIVATE NETWORK, AND ALSO ENSURES OPTIMIZED PRODUCTIVITY WHEN TELECOMMUNICATION SERVICES ARE ACCESSED. THE INSTALLED EQUIPMENT ALLOWED TO ORGANIZE HIGH-SPEED WIRED AND WIRELESS INTERNET ACCESS THROUGHOUT THE WHOLE COMPLEX OF HOSPITAL BUILDINGS AS WELL AS PROVIDING TRANSFER OF ALL TYPES OF DATA THROUGHOUT THE SINGLE OPTIMIZED NETWORK.
  • 19.