cover photo

COURSEWORK

Suhani's CL-CY-001 course work. Lv 2

Suhani S GaonkarAUTHORACTIVE
This Report is yet to be approved by a Coordinator.

Suhani's CL-CY Level 2 MARVEL report

29 / 3 / 2025


TASK 1: Working of a Version Control

Version Control is a system that helps developers track changes in their code, collaborate with team members, and revert to previous versions when needed.I completed the Git task, covering repository setup, branching, merging, reverting, and cherry-picking.

Task Execution

  • Installed and configured Git.
  • Initialized a repository and made commits.
  • Created and merged branches.
  • Used git revert and git cherry-pick for commit management.
  • Worked with remote repositories on GitHub.

Key Learnings

  • Git fundamentals and version control.
  • Efficient branching and merging.
  • Handling commits and remote repositories.

TASK 5: Kali Linux

I learned how to create a virtual environment for Kali Linux and Metasploitable 2 (target) in VirtualBox.

With the help of Metasploitable’s IP address, I performed a simple penetration task where I discovered various security vulnerabilities. I explored Nmap scanning to identify open ports and running services, tested FTP and SSH authentication, and analyzed vulnerable web applications hosted on the target machine.


TASK 7: OSI

The OSI (Open Systems Interconnection) model is a conceptual framework that defines how data travels through a network using seven layers:

  • Physical Layer – Transfers raw data (bits) over physical media (cables, radio waves).
  • Data Link Layer – Manages data frames, MAC addresses, and error detection (Ethernet, Wi-Fi).
  • Network Layer – Handles IP addressing, routing, and packet forwarding (IPv4, IPv6).
  • Transport Layer – Ensures reliable data transmission using TCP/UDP.
  • Session Layer – Manages sessions and connections between applications.
  • Presentation Layer – Translates, encrypts, and compresses data.
  • Application Layer – Provides network services like HTTP, FTP, and SMTP.

I created a diagram using Draw.io to represent the seven layers of the OSI model and their functions. In cloud computing, the OSI model is crucial for:

  • Network security (Firewalls at Layers 3 & 4).
  • Virtualization (VMs communicating over different layers).
  • Data encryption (TLS operates at Layer 6).
  • Web-based applications (Application Layer handles HTTP requests).

TASK 8: IaaS, PaaS and SaaS

Cloud computing consists of three primary service models: IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). Each model provides different levels of control, flexibility, and management.

IaaS (Infrastructure as a Service)

  • What it is: Provides virtualized computing resources over the internet, such as servers, storage, and networking.
  • Example Services: AWS EC2, Google Compute Engine, Microsoft Azure Virtual Machines.
  • Use Case: Ideal for businesses needing scalable infrastructure without managing physical hardware.

PaaS (Platform as a Service)

  • What it is: Provides a development environment with tools, databases, and runtime for application deployment.
  • Example Services: Google App Engine, Microsoft Azure App Services, AWS Elastic Beanstalk.
  • Use Case: Best for developers who want to focus on coding without worrying about managing servers or infrastructure.

SaaS (Software as a Service)

  • What it is: It delivers fully functional applications over the internet that users can access without installation.

  • Example Services: Gmail, Google Drive, Dropbox, Microsoft 365.

  • Use Case: Suitable for end-users who need ready-to-use applications without maintenance hassles.

UVCE,
K. R Circle,
Bengaluru 01