Presentation by narendra kumar sisodiya.pptx

narendrasisodiya67 46 views 19 slides May 18, 2024
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

Hii


Slide Content

Summer Training 2023 in Cybersecurity at Cisco Networking Academy   Presented By- Narendra kumar sisodiya (20EJDAI041)

Table of Content  Introduction About the Company About the internship Cybersecurity  Packet tracer tool Project topology Certificate  Conclusion 

Introduction  The primary objective of this presentation is to  provide a comprehensive overview of the valuable experiences and knowledge I have acquired during my entire internship at Cisco Networking Academy. Specifically, I will focus on the domain of cybersecurity and Packet Tracer, the entire duration of  my internship. In this presentation highlighting the new skills I have acquired and the projects I  have completed throughout my internship journey.

About the Company  Cisco networking academy is one of the longest standing IT skills to jobs program in the world. We aim to transform the lives of learners, educators, and communication through the power of technology, education and career  opportunities to power an inclusive future for all. We work to bridge digital divides for underrepresented communities, openings them up to a world of opportunities in the evolving digital economy. Supervisor: Muskan Singh

About the Internship  Interning at Cisco Networking Academy immersed me in cybersecurity fundamentals. Through hands-on experience with Cisco Packet Tracer, I mastered threat detection, risk management, and encryption protocols. I have Also Made an project regarding college network topology using Cisco Packet Tracer.  I have also learned about cybersecurity essential, threat detection and risk management .

What is cybersecurity? Cybersecurity is about safeguarding systems and data from unauthorized access, emphasizing confidentiality and integrity. Key strategies, such as firewalls and encryption, counter evolving risks, ensuring the security and efficiency of digital environments.

Need of cybersecurity In our connected world, cybersecurity is vital to prevent unauthorized access and data breaches, ensuring trust in online interactions and safeguarding information integrity and confidentiality for businesses and individuals alike.

Cybersecurity attacks

Protection from Cyber Attacks

Protection from Cyber Attacks(cont...)

Introduction to Packet Tracer Tool  Packet Tracer is a powerful network simulation tool developed by Cisco Systems to facilitate learning and practical experience in the field of networking. Widely used in educational settings, especially within Cisco Networking Academy courses, Packet Tracer allows users to design, configure, and troubleshoot network infrastructures in a virtual environment. It serves as a comprehensive learning platform, providing a simulated network environment that emulates the behavior of real-world networks without the need for physical hardware.

Workspaces  1. Logical –   Logical workspace shows the logical network topology of the  network the user has built. It also represents the placing, connecting and clustering virtual network devices. 2.Physical –   Physical workspace shows the graphical physical dimension of the logical network. It depicts the scale and placement in how network devices such as routers, switches and hosts would look in a real environment. It also provides geographical representation of networks, including multiple buildings, cities and wiring closets.

Components of Network Topology

Components of Network Topology

Project(Network Topology) Our University network is an example for Star Topology. I have implemented the network for 6 of the buildings.

Testing the Connection To assess network connections, it's necessary to send and measure the packets transmitted and received on any device within the network. Steps to do  First open any device by clicking on it. Then open cmd. Then run "ping <ip_address>"

Certificate 

Conclusion  The outcome of the proposed system will be a fail-safe backbone network infrastructure which meets the requirements for readily available access to information and security of the private network, and also ensures optimized productivity when telecommunication services are accessed. The installed equipment allowed to organize high-speed wired and wireless Internet access throughout the whole complex of hospital buildings as well as providing transfer of all types of data throughout the single optimized network.

Thank You
Tags