IT-Sicherheitskoordinator/in

Indien

keine Erfahrung

Geburtsdatum:

Staatsangehörigkeit:
indisch

21789901

Hochschulstudium

Zeitraum
Abschluss / Fachbereich / Hochschule
Schwerpunkte

08/201508/2017

abgeschlossen

Master of Engineering (ME)
IT-Sicherheit (weiterführend)

, Indien

1. PROJECT [M.TECH] : Using Microsoft SDL develop a threat Model For E-BANKING and analyzing threats using STRIDE
approach.

2. PROJECT [M.TECH -MAJOR PROJECT] : Enhancing Location Privacy Protection Using Obfuscation based Approaches
Description :- Information regarding physical locations of individuals is rapidly becoming easily available for processing by online and mobile Location-Based Services (LBSs).The widely accepted online third party location based services and mobile communication devices for location technologies are fostering the development of a new wave of applications offers various social or informational purposesin now a days. As an effect of such innovative services, however, privacy concerns are increasing, and we needs more sophisticated solutions for providing users with different and manageable levelsof privacy. Also the fact that, Since the beginning of the smart phone era, the number of mobile appsthat use location data has increased rapidly. In this work, we focus an intuitive methodology called "location obfuscation" to express users privacy preferences on location information in a straightforward and instinctive way.

3. PROJECT [B.E]: Information sharing and security in Dynamic coalation
Domain : JAVA
Role : TEAM LEADER
Description :- The main objective of my project is to share the information faster than traditional system, on a sudden unexpected situations like earthquake, terrorist attack.

4. PAPER PUBLISHED :
Paper Title :

5. ACADEMIC SEMINAR
TOPIC:- Mimicry Attacks On Host - Based IDS

  • Dokument_Studium_011.jpg

06/201004/2014

abgeschlossen

Bachelor of Engineering (BE)
Informatik

, Indien

Computer Forensics , computer Hacking, Cyber Security , Location Privacy.
 Operating Systems (Windows, Ubuntu, Linux)
 Tools (Wireshark, Cisco Packet Tracer, Microsoft SDL Threat Modeling tool, Encase Forensic imager, Splunk,
Nmap, FTK,Eclipse,Android Studio,Basics in Hadoop,Cloudera Manager, Installation of CDH5,Metasploit)
 Good knowledge on software development lifecycle and software test life cycle
 Knowledge on various SDLC models,Database fundamentals, writing and executing SQL statements
 Knowledge on SQL server Database Management Systems

  • Dokument_Studium_021.jpg

Aus- und Weiterbildung

Zeitraum
Abschluss / Institut
Inhalt

Weiterbildung

18.12.2017Bis heute

Computer Hacking & Forensic Imvestigator V9

, Indien

CHFI includes detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset
for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals,
bankers, computer and network security professionals, and anyone who is concerned
about the integrity of the network and digital investigations.

Schulbildung

01.07.200814.03.2010

abgeschlossen

Higher Secondary Education ( Plus Two)

, Indien

  • Dokument_Bildung_011.jpg

Schulbildung

06/199803/2008

abgeschlossen

10 th

, Indien

  • Dokument_Bildung_021.jpg

Veröffentlichungen

Datum
Art der Veröffentlichung / Verlag
Titel / Inhalt

Autor / Verfasser

15.03.2017

Andere Veröffentlichung



  • Dokument_Publikation_011.pdf

Sprachkenntnisse

Sprache
Level
Prüfung / Zertifikat
Englisch
Fließend (C1)

Deutsch
Grundkenntnisse (A1)

Malayalam
Muttersprache

Tamilisch
Grundkenntnisse (A1)

Weitere Fähigkeiten

Kompetenzen
Führerscheine
Interessen, Hobbys, Persönliches

Technologies/Languages (C, C++,javaScript,Python)

Operating Systems (Windows, Ubuntu, Linux)

Tools (Wireshark, Cisco Packet Tracer, Microsoft SDL Threat Modeling tool, Encase Forensic imager, Splunk,
Nmap, FTK,Eclipse,Android Studio,Basics in Hadoop,Cloudera Manager, Installation of CDH5,Metasploit) & Various other hacking and Forensic tools.

  • Kraftrad
  • PKW

So geht's