You are on page 1of 50

PROGRAM BOOK FOR

SHORT-TERM INTERNSHIP
(Onsite / Virtual)

Name of the Student:

Name of the college:

Registration Number:

Period of internship : From : To :

Name & Address of the Intern Organization :

_ University
Year
An Internship Report on

Submitted in accordance with the requirement for the degree of

Under the Faculty Guideship of

Department of

Submitted by:

Reg.No:

Department of
Student’s Declaration
I, a student of Program, Reg. No. of the Department
of College do hereby declare that I have
completed the mandatory internship from to
in (Name of the intern organization) under the Faculty Guideship
of (Name of the Faculty Guide), Department of

(Name of the College)

(Signature and Date)


Official Certification
This is to certify that______________________(Name of the student)
Reg.No. has completed his/her Internship in
on (Title of the Internship) under my
supervision as a part of partial fulfillment of the requirement for the
Degree of In the Department of
(Name of the College).

This is accepted for evaluation.

(Signatory with Date and Seal)

Endorsements

Faculty Guide

Head of the Department

Principal
Certificate from Intern Organization

This is to certify that (Name of the intern)


Reg. No ____________________ of
(Name of the College)
underwent internship in (Name of
the Intern Organization) from to___________

The overall performance of the intern during his/her internship is found to be


Satisfactory (Satisfactory/Not Satisfactory).

Authorized Signatory with Date and Seal


Acknowledgements

We have thanks to many people who helped and supported and suggested us in every step. We
are glad for having the support of our principal Dr. J. Lakshmi Narayana who inspired us
with his words filled with dedication and discipline toward work.
We express our gratitude towards Mrs. P. Sri Silpa, HOD of CSE(IoT & CS incl BCT) for
extending his support through training classes which had been the major source to carrying
out our project.
We are very much thankful to Mrs.M.Nikitha Assistant Professor for various documents of
ours with attention and care. She has taken pain to go through the project and make necessary
corrections as and when needed.
Finally, we thank one and all who directly and indirectly helped us to complete our project
successfully.

Project Associate

G.Naga Vamsi Krishna (20KT1A4719)


Contents

S.NO TOPI PAGE NO


C

1 EXECUTIVE SUMMARY 1

2 OVERVIEW OF THE 2
ORGANIZATION

3 INTERNSHIP PART 3-4

4 WEEKLY REPORT 5-20

5 OUTCOMES DESCRIPTION 21-33


CHAPTER 1: EXECUTIVE SUMMARY
I completed a Cyber Security internship in “SUPRAJA Technologies”. The major focus is to
teach the fundamentals in cyber security ,introduces phases of hacking ,need of cyber security
in our lives ,how some one attacks the system and many more. The internship program is an
offline based program. To know the cyber security concepts first I understood the concepts like
basic terminologies, types of hackers, CIA.

Objectives:
1. About CyberSecurity and Basic Terminologies in cyber security.
2. To know how hackers attacks the system.
3. Protection of our systems from malicious software(malware ,viruses)
4. Gaining knowledge on different tools
5. To know the cyber laws and cyber attacks.

Outcomes:
1. I learned the basic concepts in cyber security.
2. I learned the phases involved while hacking the system it may be ethical or unethical.
3. I understood the some tools used in phases of hacking(stegenography,wireshark,Advanced
port scanner,Colo soft pick builder,Proxy switcher)
4. I perfromed attacks on Sunset,Evm. Entered into sunset and evm without knowing
passwords.
5. I gained knowledge on hunter card skimmer detector.

Page No:
1
CHAPTER 2: OVERVIEW OF THE ORGANIZATION

Supraja Technologies is a leading Knowledge and Technical Solutions Provider and pioneer
leader in IT industry, is operating based out of Vijayawada, Guntur, Visakhapatnam, Hyderabad.

About Supraja Technologies:


Supraja Technologies (a unit of CHSMRLSS Technologies Pvt. Ltd.) with its foundation
pillars as Innovation, Information and Intelligence is exploring indefinitely as a Technology
Service Provider and as a Training Organization as well.
Supraja Technologies CEO Mr. Santosh Chaluvadi is an Alumni of Potti Sriramulu
Chalavadi Mallikarjuna Rao College of Engineering and Technology, Vijayawada.
With our CEO this college conducted/organized a 50 hours Nonstop Marathon Training
Workshop on Ethical Hacking & Cyber Security for which this respective college and our
CEO both holds their name in “LIMCA BOOK OF RECORDS 2017”
We are very happy to inform you all that our company, Supraja Technologies has been shortlisted
for "Top 50 Tech Companies" award 2019, conferred at InterCon - Dubai, UAE.
Supraja Technologies is one out of thousands of start-up companies that were initially screened by
InterCon team of 45+ research analysts over a period of three months and the final shortlist includes
150+ firms and we are very proud to inform you all that our company Supraja Technologies also
happens to be a part of the same.

HONORS & AWARDS:


● CPEH: Certified Professional Ethical Hacker
● CPTE: Certified Penetration Testing Engineer
● CHFI: Certified Hacking Forensics Investigator
● RHCE: Red Hat Certified Engineer
● Worked as a core member for National Information Security Summit 2017
● Appreciation from E-HACK
● Appreciation Certification from National Cyber Safety & Security Standards
● Appreciation for finding out Vulnerabilities in websites like Sony, Intel etc

Mission
To create new levels of excellence in the field of Cyber Security and Digital Marketing by
delivering services and solutions of highest quality and reliability on time.
1. Policy audit
Policy Audit service are deals with auditing of security policies. With our experience in dealing with
various diverse systems and policies, we offer a unique combination of audit as well as technology skills.
Policy Audits helps clients to recognizes their weaknesses and strengths as formulated in their policies
and take adequate measures to reach standards prevalent elsewhere in this area.
2,network security audit
Network security audit service audits the security of the network. This service looks into the areas of
confidentiality, authentication and data integrity. Supraja Technologies team is capable of building these
features on any network using standard protocols. Supraja Technologies also helps clients in proper
selection of network security appliances like Firewalls, IDS's, Antivirus software and PKI solutions.
.

Page No:
2
CHAPTER 3: INTERNSHIP PART

Description of the Activities/Responsibilities in the Intern Organization during Internship,


which shall include - details of working conditions, weekly work schedule, equipment used,
and tasks performed. This part could end by reflecting on what kind of skills the intern
acquired.

An internship can provide a student with paid professional work experience in a safe and
structured environment with help from experts .Typically an intern will be assigned a worksite
mentor and school based internship co-ordinator. The worksite mentor will help train a student
and advise him or her on how to navigate a particular worksite culture and interact with other
workers. The school internship coordinator helps the mentor and student build a strong
relationship that will help the intern have positive outcomes from their internship experience.
The internship coordinator can also help the student learn how to manage their expectations
and implement successful work habits.
1. Wireshark
Formerly known as Ethereal, Wireshark is open-source network software that can efficiently
analyze network protocols and enhance security in real time. Since it is a console-based password
auditing and packet sniffer tool, you can use this security software to sniff the network and
monitor your network traffic in real time. Security professionals use this efficient software to
capture data packets and inspect the features that particular data packets exhibit, which further
helps to identify the weaknesses in network security.
2. Kali Linux
Kali Linux is one of the organizations’ most excellent penetration testing tools to scan their IT
systems and networks for vulnerabilities. This cybersecurity tool contains around 300 different
software used for security auditing. Most of these tools are executable, which simply means that
the users can monitor and maintain their network security systems with a single click. The most
common characteristic of Kali Linux is that all types of users, from experienced to newbies, can
use it to reinforce their security in networking. It does not need any specific set of expertise or
degree to function.
3. John the Ripper
Professionals use John the Ripper for testing password strength. This tool can quickly look for
complex ciphers, encrypted logins, and hash-type passwords and identify weak passwords, which
can be a big threat to a protected system. The software can efficiently work with Windows, DOS,
OpenVMS systems, and Unix environments.
4. Metasploit
Metasploit is one of the best security software that contains various tools for executing
penetration testing services. Professionals use this tool to attain varying security goals, such as
discovering vulnerabilities in the system, strengthening computer system security, weaving cyber
defense strategies, and maintaining complete security assessments. These penetration testing
tools can examine different security systems, including web-based apps, servers, networks, and
so on. Metasploit can instantly identify all the new security vulnerabilities as soon as they occur,
thus maintaining top-notch security all the time.
5. Burp Suite
Burp Suite is a robust tool used in the field of Cyber Security that allows organizations to

Page No:
3
enhance their network security. Security experts use Burp Suite to perform real-time scans on
systems focusing on identifying vital vulnerabilities that can have a large impact on the
company’s security. Moreover, it simulates attacks to find the different ways in which these
threats can weaken and compromise the security of the network.
6. Nmap
Also known as Network Mapper, Nmap is a free network discovery and security auditing tool
professionals use to scan single hosts and large networks. Its key features include detecting
unidentified devices and identifying network issues for testing security vulnerabilities.

SUPRAJA TECHNOLOGIES-KEY TRAINER


Krishna Chaitanya is a Chief Technology Officer and Chief Trainer at Supraja technologies
I learn in this internship a lot .
Some of the main skills are
I learn is how attackers attacks a particular organization or a specific person.Kind of tools they
use to attack a person.
Types of hackers in detailed.
Phases of Hacking defines steps to hack the system.
How to protect our system from hackers without hacking the system by user authentication.
Kind of tools using at each phase of hacking.
Various commands used to attack a system.
Learned in detail about various uses of nmap
Attacking various machines through kali linux.cracking EVM through kali.
Using kali linux we can enter into sunset without knowing password.
Windows bypass

Page No:
4
ACTIVITY LOG FOR THE FIRST WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
5
WEEKLY REPORT
WEEK – 1 (From Dt………..….. to Dt..................... )
Objective of the Activity Done:

Detailed Report:

Page No:
6
ACTIVITY LOG FOR THE SECOND WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
7
WEEKLY REPORT
WEEK – 2 (From Dt………..….. to Dt..................... )
Objective of theActivityDone:

Detailed Report:

Page No:
8
ACTIVITY LOG FOR THE THIRD WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
9
WEEKLY REPORT
WEEK – 3 (From Dt………..….. to Dt..................... )
Objective of theActivityDone:

Detailed Report:

Page No:
10
ACTIVITY LOG FOR THE FORTH WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
11
WEEKLY REPORT
WEEK – 4 (From Dt………..….. to Dt..................... )

Objective of theActivityDone:

Detailed Report:

Page No:
12
ACTIVITY LOG FOR THE FIFTH WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
13
WEEKLY REPORT
WEEK – 5 (From Dt………..….. to Dt..................... )
Objective of theActivityDone:

Detailed Report:

Page No:
14
ACTIVITY LOG FOR THE SIXTH WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
15
WEEKLY REPORT
WEEK – 6 (From Dt………..….. to Dt..................... )

Objective of theActivityDone:

Detailed Report:

Page No:
16
ACTIVITY LOG FOR THE SEVENTH WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
17
WEEKLY REPORT
WEEK – 7 (From Dt………..….. to Dt..................... )

Objective of theActivityDone:

Detailed Report:

Page No:
18
ACTIVITY LOG FOR THE EIGHT WEEK

Day Person In-


Brief description of the daily
& Learning Outcome Charge
activity
Date Signature

Day – 1

Day - 2

Day – 3

Day – 4

Day – 5

Day –6

Page No:
19
WEEKLY REPORT
WEEK – 8 (From Dt………..….. to Dt..................... )

Objective of theActivityDone:

Detailed Report:

Page No:
20
CHAPTER 5: OUTCOMES DESCRIPTION

Describe the work environment you have experienced

Our Internship is in offline mode. It helps me a lot .If I have any doubts I asked mentors they
clarrify my doubts .Our progress is maintained through weekly tasks and mock quizs .It helps
us to understand which topic is not clearly understand. The curriculum designed for us is also
well understandable manner.
The first week they told about basic concepts in cybersecurity. Second week about installation
of virtual box,sunset,evm,windows7 and many more. Third week is about windows bypass and
kali linux bypass. Fourth week about scanning tools like wireshark , advanced port scanner and
nmap scans .Fifth week about Burpsuit. Sixth week about Email phishing done by creating fake
emails,etc.
An internship can provide a student with paid professional work experience in a safe and
structured environment with help from experts. Typically an intern will be assigned a worksite
mentor and school based internship coordinator. The worksite mentor will help train a student
and advise him or her on how to navigate a particular worksite culture and interact with other
workers. The school internship coordinator helps the mentor and student build a strong
relationship that will help the intern have positive outcomes from their internship experience.
The internship coordinator can also help the student learn how to manage their expectations and
implement successful work habits.

Page No:
21
Describe the real time technical skills you have acquired

Basic concepts in cyber security includes types of hackers, types of laws, basic terminologies,
CIA,IOS layers ,port numbers, security commands. I understood how to run multiple machines in
virtual box .I clearly understand how attackers attack a system by sending links to gmail or any
methods.
CIA Triad:
C stands confidentiality means only limited persons and authorized users can see or use it.
I stands Integrity means no one can modify the data present in it. These measures include file
permissions and user access controls.
A stands for availability .This principle ensures systems, applications and data are available and
accessible to authorized users when they need them. Networks, systems and applications must
be constantly up and running to ensure critical business processes are uninterrupted.
Confidentiality, integrity and availability together are considered the three most important
concepts within information security .Considering these three principles together within the
framework of the "triad" can help guide the development of security policies for organizations.
Phases of Hacking
First step in phases of hacking is Information Gathering .In this step The information should be
collected from various resources like Instagram, Facebook social apps about their bio data or
Social Engineering.
Next step is Scanning by using security commands like ping whether the ip address is responding
or not.later perform nmap scans to know detail information about the system.
Gaining Access here the system is under the control of hacker.
Maintain Access and Clearing tracks.
Some tasks done in Supraja internship are
Entering to sunset without knowing password through kali.
Windows Bypass
Kali Bypass
Hunter card skimmer detector.
Types of Testing like White Box, Black Box, Grey Box Testing.

Page No:
22
Describe the managerial skills you have acquired
An internship position in cyber security can vary depending on the enterprise with whom a
student interns and the products or services that the company offers. Cyber security
internships can include both fundamental administrative work connected to technology and data
security, according to the educational and job-search portal Cyber Intern Academy. Reading and
responding to emails, organizing documents or other digital resources, investigating and
assessing the company's current IT regulations, and exploring new security products and tactics
are all examples of this type of work.

Interns may also participate in projects that are more focused on cyber security. Assisting in the
development of a new digital system or platform, maintaining the network, engaging in or
helping to lead security awareness training, and system audits are all examples of this type of
employment.

Students in an internship program might profit from administrative tasks as well as cyber security
projects. Interns can strengthen their professional communication skills while working on
operational information systems with industry professionals. In Cyber Security the intern may
perform any role Security management,Network , management,Security , analyst,Security
assurance ,application security etc.

A cybersecurity manager uses their advanced level of knowledge about information security,
information assurance and security operations to create and implement security protocols,
policies and procedures. They also manage a team of other IT security professionals and work
together to identify security gaps, design firewalls, create proactive solutions and provide
security reports. If a company has a data breach, the cybersecurity manager monitors the
situation, helps with the forensic investigation and talks with law enforcement agencies and
attorneys.

Page No:
23
Describe how you could improve your communication skills

It’s important to remember that cyber security does not exist in isolation. There is a very strong
human factor involved – look how many breaches are initiated by a phishing exercise. As a cyber
security professional, you must be able to effectively interact with all levels and departments
within the organization and educate staff about cyber security threats.

Companies hiring people to work in this field are looking for more than just technical skills; they
want cybersecurity professionals with a complete set of capabilities that will add value to the
team. Those with problem-solving skills, attention to detail, a desire to learn, adaptability, and
communication skills have a greater chance of capturing a recruiter’s attention.

1- Speak the Same Language as Everyone Else

Most people don’t understand what cybersecurity terms such as “privacy,” “security controls,” or
“network defense” mean. For your communication to be effective, you need to learn to speak in a
way that anyone understands.

For example, if you are going to talk with the Board of Executives of your organization, you
should put yourself in their shoes, understand the real priorities of the business, and address the
impact cybersecurity can have on them. That way, you can remove confusion and achieve better
results.

2. Use Tools and Vivsual Aids:The first thing you need to do is center your conversation in
relevant data, find out what really matters to your audience, and focus mainly on that. To help
them understand what you are talking about, it is a great idea to include visual aids in your
presentation.

3. Bring the Risk Closer to your Organization

For example, explain the different scenarios that can happen to your organization if there is no
firewall in place or what can happen if there is not working from home policy. Include the
financial and reputation impact, statistics, and examples of organizations similar to yours that
have been victims of these types of cyber risks.

It is important to do the same when talking to coworkers, but do it on a personal level. Please
focus your comments on what can happen to them, their loved ones, and their data. Let them
know what the risk is on a personal level of clicking a phishing link or how they can protect their
data with two-factor authentication.

Communicating with different roles within your organization will open the doors to having a
well-trained staff, new security projects, and a more resilient organization.

Page No:
24
Describe how could you could enhance your abilities in group discussions, participation
in teams, contribution as a team member, leading a team/activity.

The success of the team is for the large part, dependent on the contribution of each team member.
Here are 9 ways you can contribute more effectively to make the teams you work with more
successful, regardless of your specific role.

1. Understand the end goal. Since a project has a defined ending, it is important that
each contributor to the effort knows the desired end result. Stephen Covey teaches to
"begin with the end in mind." This is clearly important to project team members. By
understanding the desired result, you can make better individual decisions and reduce
confusion and re-work.
2. Have knowledge of your role .Each person is an important piece in the overall project
puzzle. Know your role and the roles of others. Make sure you take the time to get an
understanding of your role and the role of your colleagues in your team. Ask questions
until you really understand what your role and the role of others is and how you can best
contribute in the success of the team.
3. Project work is often fluid and free flowing. Once you understand your role and the roles
of others you are in a position to collaborate with them more successfully. This
collaboration isn't just a nice thing for you to do. It is imperative to the ultimate success
of the project. Look for ways and be willing to collaborate.
4. Recognise interdependencies. The bigger the project, the more linked and interdependent
are the people and the tasks. Certain steps need to be done before others can be completed.
If you see only your small piece of the project, you may not realise how you finishing two
days sooner might have a huge impact on several other things staying on track.
Conversely if you fall two days behind on one of your tasks, the effects on the end results
could be much longer delays. You aren't an island. Your work products, decisions and
efforts affect many others. Recognize and work with the interdependencies between you
and the others involved in the project.
5. Be credible and reliable. Share your knowledge with others. Be honest when you don't
know otherwise you will be seen as a windbag. Keep your promises!
6. Ask questions and communicate .Don't be afraid to ask questions. Asking questions is
communicating, so too is giving updates. Checking in with others. Coordinating
schedules. You can't leave it to the leader. Check in with others. Get their input. Find out
when the pieces you will need will be completed. Update people on your progress.
Communicate!
7. Break it down.Take the big project steps and break them down into definable tasks that
you can get your hands around. By breaking the tasks down the work won't feel so
daunting, you will find the interdependencies and you will be able to stay on track much
more successfully. How do you eat an elephant? One bite at a time. Break down the
overall project, and your individual steps into bite sized pieces.
8. Look at the past.Look for the lessons learned in the past to improve your results today.
Think too about other tasks and projects you have been involved in. Even if the project
was smaller or larger and the goals were very different, there are likely lessons you
learned that you can apply - things you did well that you would want to repeat, and things
you could have done better that you can correct on this project.
9. Look to the future. Take a little time to document the best practices and ideas that
work for you. Whether this is a formal task for everyone in the team, or just your own
notes to help you to continuously improve, investing a little time now will make your
contributions to all future projects more valuable and efficient.

Page No:
25
There are many more ways you can contribute to great team success. Take these nine ideas as a
starting point - as a checklist of things you can do, regardless of the role you play. Taking action
on these ideas will help you feel more confident and successful in your role on the project team,
and will help the project's goals be reached much more successfully.

Page No:
26
Describe the technological developments you have observed and relevant to the
subject area of training
Below, we describe some of the most popular cybersecurity technologies in the field. We cover
how they work and their applications in cybersecurity. Cybersecurity experts use these tools to
defend against the cyber threats described above.
1. Behavioral Analytics
Behavioral analytics looks at data to understand how people behave on websites, mobile
applications, systems, and networks. Cybersecurity professionals can use behavioral
analytics platforms to find potential threats and vulnerabilities.
Analyzing patterns of behavior can lead to identifying unusual events and actions that may
indicate cybersecurity threats.
2. Blockchain
Blockchain is a type of database that securely stores data in blocks. It connects the blocks
through cryptography. Blockchain allows information to be collected, but not edited or
deleted.
Cybersecurity professionals can use blockchain to secure systems or devices, create
standard security protocols, and make it almost impossible for hackers to penetrate
databases.
3. Cloud Encryption
Cloud services improve efficiency, help organizations offer improved remote services, and
save money. However, storing data remotely in the cloud can increase data vulnerabilities.
Cloud encryption technology changes data from understandable information into an unreadable
code before it goes into the cloud.
4. Defensive Artificial Intelligence (AI)
Cybersecurity professionals can use defensive artificial intelligence (AI) to detect or stop
cyberattacks. Savvy cybercriminals use technologies like offensive AI and adversarial machine
learning because they are more difficult for traditional cybersecurity tools to detect.
Offensive AI includes deep fakes, false images, personas, and videos that convincingly depict
people or things that never happened or do not exist. Malicious actors can use adversarial
machine learning to trick machines into malfunctioning by giving them incorrect data.
5. Extended Detection and Response (XDR)
Extended detection and response (XDR) is a type of advanced cybersecurity technology that
detects and responds to security threats and incidents. XDR responds across endpoints, the
cloud, and networks. It evolved from the simpler traditional endpoint detection and response.
XDR provides a more holistic picture, making connections between data in different places. This
technology allows cybersecurity professionals to detect and analyze threats from a higher,
automated level. This can help prevent or minimize current and future data breaches across an
organization's entire ecosystem of assets.

Page No:
27
Student Self Evaluation of the Short-Term Internship

Student Name: Registration No:

Term of Internship: From: To

Date of Evaluation:

Organization Name & Address:


Please rate your performance in the following areas:

Rating Scale: Letter grade of CGPA calculation to be provided

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5

Date: Signature of the Student

Page No:
28
Evaluation by the Supervisor of the Intern Organization

Student Name: Registration No:

Term of Internship: From: To :

Date of Evaluation:

Organization Name & Address:

Name & Address of the Supervisor


with Mobile Number
Please rate the student’s performance in the following areas:

Please note that your evaluation shall be done independent of the Student’s self-
evaluation

Rating Scale: 1 is lowest and 5 is highest rank

1 Oral communication 1 2 3 4 5
2 Written communication 1 2 3 4 5
3 Proactiveness 1 2 3 4 5
4 Interaction ability with community 1 2 3 4 5
5 Positive Attitude 1 2 3 4 5
6 Self-confidence 1 2 3 4 5
7 Ability to learn 1 2 3 4 5
8 Work Plan and organization 1 2 3 4 5
9 Professionalism 1 2 3 4 5
10 Creativity 1 2 3 4 5
11 Quality of work done 1 2 3 4 5
12 Time Management 1 2 3 4 5
13 Understanding the Community 1 2 3 4 5
14 Achievement of Desired Outcomes 1 2 3 4 5
15 OVERALL PERFORMANCE 1 2 3 4 5

Date: Signature of the Supervisor

Page No:
29
PHOTOS & VIDEO LINKS

Page No:
30
Page No:
31
Page No:
32
Page No:
33
EVALUATION

Page No:
34
Internal Evaluation for Short Term Internship
(On-site/Virtual)

Objectives:
 To integrate theory and practice.
 To learn to appreciate work and its function towards the future.
 To develop work habits and attitudes necessary for job success.
 To develop communication, interpersonal and other critical skills in the
future job.
 To acquire additional skills required for the world of work.

Assessment Model:
 There shall only be internal evaluation.
 The Faculty Guide assigned is in-charge of the learning activities of the students
and for the comprehensive and continuous assessment of the students.
 The assessment is to be conducted for 100 marks.
 The number of credits assigned is 4. Later the marks shall be converted into grades
and grade points to include finally in the SGPA and CGPA.
 The weightings shall be:
o Activity Log 25 marks
o Internship Evaluation 50marks
o Oral Presentation 25 marks
 Activity Log is the record of the day-to-day activities. The Activity Log is
assessed on an individual basis, thus allowing for individual members within
groups to be assessed this way. The assessment will take into consideration the
individual student’s involvement in the assigned work.
 While evaluating the student’s Activity Log, the following shall be considered –
a. The individual student’s effort and commitment.
b. The originality and quality of the work produced by the individual
student.
c. The student’s integration and co-operation with the work assigned.
d. The completeness of the Activity Log.
 The Internship Evaluation shall include the following components and based on
Weekly Reports and Outcomes Description
a. Description of the Work Environment.

Page No:
33
b. Real Time Technical Skills acquired.
c. Managerial Skills acquired.
d. Improvement of Communication Skills.
e. Team Dynamics
f. Technological Developments recorded.

Page No:
34
MARKS STATEMENT
(To be used by the Examiners)

Page No:
35
Page No:
36
INTERNAL ASSESSMENT STATEMENT

Name Of the Student:


Programme of Study:
Year of Study:
Group:
Register No/H.T. No:
Name of the College:
University:

Sl.No Evaluation Criterion Maximum Marks


Marks Awarded
1. Activity Log 25
2. Internship Evaluation 50
3. Oral Presentation 25
GRAND TOTAL 100

Date: Signature of the Faculty Guide

Certified by

Date: Signature of the Head of the Department/Principal


Seal:

Page No:
37
ANDHRA PRADESH
STATE COUNCIL OF HIGHER EDUCATION
(A Statuory Body of the Government of Andhra Pradesh)

2nd, 3rd, 4th and 5th floors, Neeladri Towers, Sri Ram Nagar, 6th Battalion Road
Atmakur (V)Mangalagiri (M), Guntur, Andhra Pradesh, Pin - 522 503
www.apsche.ap.gov.in

You might also like