You are on page 1of 18

VIVEKANAND EDUCATION SOCIETY’S

POLYTECHNIC

INDUSTRIAL TRAINING
REPORT
(22049)
(Internship)
Academic Year: 2021 - 2022
Program: Computer Engineering
Semester: Fifth
Name of Industry/Online platform: Insys Technologies
Industry Mentor: Mr. Sandeep Jaiswar
Institute Mentor: Mrs. Meena Talele
Submitted by: Pranav Dileep Mhatre
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Certificate

This is to certify that Mr. Pranav Mhatre with Enrollment No. 1900040064 has
successfully completed Industrial Training (22409) in Cyber Security from 02nd August
2021 to 10th September 2021 for partial fulfillment towards completion of Diploma in
Computer Technology from VES Polytechnic Institute Code 0004

Place: Chembur Enrollment No: 1900040064

Date: ……………………… Exam Seat No:101960

Subject Teacher Head of the Department Principal

Seal of Institution

2
3
Abstract

➢ The Internship was for 6 weeks.

➢ We were taught many topics related to cyber security like Ethical hacking,
SQL Injection, IDS, Firewall and Honeypot, Cloud computing etc.

➢ The supervisor took lectures before lunch break and after lunch break,
we were told to perform the practical.

➢ We learnt Cyber Security using various tools like Kali Linux and
VMware.

➢ During the end of the internship, we were given projects which we were
supposed to do in a group or individually.

➢ We learnt many skills like timely submission, discipline, concentration,


hard work, etc.

4
ACKNOWLEDGEMENT

I would like to thank all those people who helped in the successful completion of the
industrial training.

I would like to thank Mr. Vikrant Joshi, Principal of V.E.S Polytechnic for his immense
support and motivation.

I would like to thank Mr. Sanjay Wankhade, IC, Head of Department, Computer
Engineering of V.E.S Polytechnic, for his guidance. I am wholeheartedly thankful to him for
giving me his valuable time attention for providing a systematic way for completing the
projects in time.

I would like to thank Mrs. Meena Talele, our industrial mentor for her guidance. I have
learnt so many things from her and she motivated and strengthened my confidence in doing
this internship. I express my deepest gratitude for her valuable suggestions and constant
motivation that greatly helped the internship to successfully complete. Throughout the
internship, her useful suggestions, constant encouragement has given us a right direction to
shape our learning.

I would like to give special thanks to Mr. Sandeep Jaiswar, my industrial supervisor for his
great support and motivation throughout this training. He has been a guiding light in this
entire training period making me aware with lots of new technologies. His way of explaining
things have left a great impact on me. I express my deepest gratitude for his precious time,
suggestions, teaching, mistake corrections and constant support. Throughout the Internship,
his valuable suggestions, constant encouragement has given a right direction for completing
the goal that this training was aimed for.

I would also like to thank all the faculty members who have been a constant source of
encouragement during the entire course of our study in this college

5
CONTENT
Sr.no Topic Page no

1. Organizational structure of Industry/Organization and General Layout 7

2. Introduction of organization 8
3. Types of Major Equipment Machine Used in Industry with their 9
Specification & Specific Use

4. Working Process 10
5. Major Material Handling Product 11
6. Safety Procedures Followed During Course 12
7. Practical Experience in Industry/Organization 13
8. Description of the Project 14
9. Special Challenges Encountered During Training 17

6
Chapter 1: Organizational Structure of Industry

➢ Insys Technologies is Technical Education center and pioneer in providing IT training


to Domestic & international professionals.

➢ Insys Technologies has been providing a learning platform through job-oriented


IT courses and making candidates skilled and employable based on changing industry
requirements.

➢ Some of the IT training programs offered at Insys Technologies– IT Infra


Management/Networking, Cloud Computing, Data Science, Big Data & Hadoop, Artificial
Intelligence, Machine Learning, Web App Development, Android App Development, R
Programming, Python, Java, Dot net etc.

➢ Modular courses– AWS, AZURE, VMWare, OpenStack, CCNA, CCNP, MCSA, Red Hat
Linux, Hyper V etc. They have catered their training services to many of the renowned
companies.

➢ Training provided by Globally certified industry experts. 100% Placement Assistance


helping Students find the right job. We have 24*7 Labs with the latest infrastructure.

7
Chapter 2: Introduction of organization

➢ Insys Technologies is Technical Education centre and pioneer in providing IT training


to Domestic & international professionals.

➢ Insys Technologies has been providing a learning platform through job-oriented IT


courses and making candidates skilled and employable based on changing industry
requirements.

➢ Some of the IT training programs offered at Insys Technologies– IT Infra


Management/Networking, Cloud Computing, Data Science, Big Data & Hadoop, Artificial
Intelligence, Machine Learning, Web App Development, Android App Development, R
Programming, Python, Java, Dot net etc.

➢ Modular courses– AWS, AZURE, VMWare, OpenStack, CCNA, CCNP, MCSA, Red Hat
Linux, Hyper V etc. They have catered their training services to many of the renowned
companies.

➢ Training provided by Globally certified industry experts. 100% Placement Assistance


helping Students find the right job. We have 24*7 Labs with the latest infrastructure.

8
Chapter 3: Types of Major Equipment Machine Used in
Industry with their Specification & Specific Use

Following table shows the list of Major Equipment with their specifications and uses:

Type of Equipment Specification Used for

Processor Intel Core i5 8th Gen Practical

Laptop HP Pavilion Practical

Operating System VMware Kali Linux

Google Classroom Notes

9
Chapter 4: Working Process

Following are the control methods and planning done by team during the internship:

➢ Gathering information.

➢ Presentation planning

➢ Selection and installation of Operating System for some practical.

➢ Notes for development of presentation.

➢ Weekly test.

➢ Revision Lecture.

➢ Creating & preparing the presentation.

10
Chapter 5: Major Material Handling Product

➢ CEH modules were used to learn and get information.

➢ Installed & Used Kali Linux operating system with help of VMware.

➢ google.com was used for searching the information of the project on internet.

➢ PowerPoint was used for making the presentation.

➢ Made presentation with the help of group members and submitted it to our mentor.

11
Chapter 6: Safety Procedures Followed During Course

➢ Avoided threats to the computer.

➢ Less load was given to the computer regarding the space and ram on the computer for
making the software.

➢ Laptop kept on for a limited time to stop from overheating.

➢ Saving the work done on the laptop before shutting it down

12
Chapter 7: Practical Experience in Industry/Organization

➢ Time management.

➢ Being punctual.

➢ Following safety precautions.

➢ Innovation.

➢ Learnt about different Operating System.

➢ Co-ordination.

➢ Team Work.

➢ Team interaction

➢ Got knowledge how to secure our system.

13
Chapter 8: Description of the Project

➢ The name of my topic is “Social Engineering”.

➢ The main objective of this presentation is to create an awareness about how the
social engineering is caused and also how to prevent it.

➢ Using this information, the user can spread awareness about Social Engineering.

➢ The presentation is developed with the help of Group Members, Google, PowerPoint,
Kaspersky, etc.

➢ The presentation contains total 50 slides which include: – introduction, summary, history
and evolution, types and prevention, etc.

➢ Feedback is must to help us to improve and make the presentations more presentable
and understandable.

➢ The first page tells us about the topic and following page in the presentation talks about
the topics & members of our group.

14
Title and Group Members Index

Introduction

Traits of Social Engineering Attacks

Summary History of attacks

15
Types Of Social Engineering Cycle of Social Engineering

Tips to prevent Social Engineering Thank You

16
Chapter 9: Special Challenges Encountered During Training

As it was our first internship working on the projects was a stressful job.

It was difficult to install and setup Kali Linux.

Selecting local websites for practical was quite challenging.

It was quite confusing to select topic for project.

17
References/Bibliography

➢ https://resources.infosecinstitute.com/

➢ https://www.avast.com/https:/

➢ /www.geeksforgeeks.org/

➢ https://www.wikipedia.org/

➢ https://www.kaspersky.co.in

18

You might also like