0% found this document useful (0 votes)
18 views5 pages

Eze Cyb It New Tab

This report details the Student Industrial Work Experience Scheme (SIWES) training conducted at Legacy Technologies from June to December 2025, authored by Eze Temple Chukwuka as part of his Bachelor of Technology in Cyber Security. It includes sections on the objectives of SIWES, networking types, and computer assembly, along with acknowledgments and recommendations. The report aims to fulfill academic requirements while providing insights into practical experiences gained during the training.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

Eze Cyb It New Tab

This report details the Student Industrial Work Experience Scheme (SIWES) training conducted at Legacy Technologies from June to December 2025, authored by Eze Temple Chukwuka as part of his Bachelor of Technology in Cyber Security. It includes sections on the objectives of SIWES, networking types, and computer assembly, along with acknowledgments and recommendations. The report aims to fulfill academic requirements while providing insights into practical experiences gained during the training.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

REPORT ON STUDENT INDUSTRIAL WORK

EXPERIENCE SCHEME (SIWES) TRAINING


PROGRAMME.
(JUNE, 2025 – DECEMBER, 2025)

AT

LEGACY TECHNOLOGIES
IFITE UNIZIK PERMSITE, AWKA NORTH LOCAL
GOVERNMENT AREA, AWKA
BY

EZE, TEMPLE CHUKWUKA


(20211267462)

CYBER SECURITY
SCHOOL OF INFORMATION COMMUNICATION
TECHNOLOGY

FEDERAL UNIVERSITY OF TECHNOLOGY, OWERRI


BEING A REPORT SUBMITTED TO THE SIWES
DIRECTOR IN PARTIAL FULFILMENT OF THE
REQUIREMENTS OF BACHELOR OF TECHNOLOGY
IN CYBER SECURITY

DECEMBER, 2025.

i
DEDICATION
I would like to dedicate this report to God Almighty for the grace and enablement
to complete my SIWES programme successfully and the wisdom given to write
this report. I also want to dedicate this report to the management & staff of Legacy
Technologies for the love and level of support they all gave to me during my
industrial training. Finally, I dedicate this to my Parents, Mr. and Mrs. Eze for
always being there as a source of inspiration, correction and encouragement.

ii
ACKNOWLEDGEMENTS
I am unendingly grateful to God for His provision, inspiration, guidance and
strength throughout the course of this training scheme. I also express my profound
gratitude to the management and all members of staff of Legacy Technologies who
generously and graciously shared their time and knowledge during my training and
also provided a very conducive environment for learning. I would very much like
to acknowledge the efforts of my lecturers in the Department of cyber security for
giving me a solid foundation.

iii
TABLE OF CONTENTS
Title page i
Dedication ii
Acknowledgements iii
SECTION ONE 1
1.1 Introduction 1
1.1. Introduction to SIWES 1
1.2 Objectives of SIWES 3
1.3 Brief History of the Establishment of Attachment 4
1.3.1 Organogram of the firm 5
SECTION TWO 6
2.1 Net work 6
2.2. Types of networks 6
2.2.1. Local area network. 6
2.2.2. Wide area network 8
3.3 Devices use in networking 8
2.3.1. Router 10
2.3.2 Hub 10
2.3.3 Switch 11
2.3.4. Ethernet cable 11
2.3.5 Host 13
2.4 How to create network (LAN) 13
2.4.1. Count the number of computer 13
2.4.2. Decide if it will be wireless network 14
2.4.3. Determine if you want all network devices to have internet access 14
2.4.4. Measure the distance for all hardwired devices 14
2.4.5. Consider your future needs 14
2.5 Setting up a basic LAN 15
2.5.1. Gather your network hardwire 15
2.5.2. setup your router 15
2.5.3. Connect your modem to your router 15
2.5.4. Connect your switch to your router 16
2.5.5. Connect your computers to open LAN port 16
2.5.6. Verify the network connection on each computer 16
2.5.7. Setup file and printer sharing. 16
iv
2.6 Assembling Of Computer System 16
2.6.2 Installing the Stand Off 18
2.6.3 Installing the Motherboard 18
2.6.4 Attach the Power Connect 20
2.6.5 Installing the Processor 20
2.6.6 Installing the CPU Cooler 20
2.6.7 Installing the RAM Module 20
2.6.8 Proper Insertion of the RAM Module 20
2.6.9 Installing Expansion Cards 21
2.6.10 installing Your Computer’s Hard Drive 21
2.6.11 Connecting Power Cable to the Drives 21
2.6.12 Installing DVD/CD Drives and Other Auxiliary Drive 22
2.6.13 Installing the Front Panel Connectors 22
2.7 UPS (INVERTER) 22
2.7.1 Uninterruptible power supply (UPS) 22
2.7.2 Stabilizer 24
2.8 Component of Data Communication 25
2.8.1 Data transmission mode 25
2.8.2 Network Classification 25
2.8.3 Scales 26
SECTION THREE 27
3.1 Conclusion 27
3.2 Recommendations 27
3.3 Recommendations to the Firm 27
3.3.1 Recommendations to the University 27
References 29

You might also like