Completed an instructor-led training covering core principles of cybersecurity and ethical hacking
Learned how to analyze and identify security risks in networked systems and applications.
Learned about vulnerabilities, penetration testing basics, and tools used in the cyber security domain
Studied various types of cybeGained foundational knowledge of network security, ethical hacking, and common cyber threats.
r-attacks including phishing, malware, brute-force, and DoS/DDoS attacks.
Education
Bachelor of Technology - Computer Science
Poornima University
Rajasthan, Jaipur
08-2021
12th - Non Medical | CBSE With 79% in
RPS Public School
Narnaul, India
07-2021
10th - CBSE With 79% in
RPS Public School
Narnaul, India
06-2019
Skills
Sql
Java
Python
Html
CSS
Java Script
Certification
Python 101 for Data Science
SQL Injection Attacks
Ethical Hacking Essentials
Foundations of Cybersecurity
The Complete SQL Bootcamp
Projects
Keylogger :
Developed a python based keylogger application for windows .
Utilized the ".pyw" extension to ensure the program runs silently in the background.
Program records user keystrokes and saves them to a file. Sends recorded keystrokes to a specified email address.
Primarily designed for monitoring purposes, including parental control.
Registration Page
It involved creating User Registration and Sign-Up page using MERN Stack.
Designed a responsive user interface to enhance user experience across devices.
Enabled local host database connectivity for efficient data storage and retrieval.
SQL :
Key points what I am learned in SQL projects:-
SQL queries using SELECT, WHERE, JOIN, GROUP BY, and ORDER BY to extract meaningful insights from large datasets
Used INNER JOIN, LEFT JOIN,RIGHT JOIN and FULL JOIN to combine data from multiple tables for reporting and analysis
Applied DISTINCT and LIMIT clauses to refine datasets and improve performance
Utilized aggregate functions like SUM(), AVG(), COUNT(), MAX(), and MIN() to generate KPIs and summary statistics
Built summary tables to track trends over time using EXTRACT() functions.
Ensured data quality by applying validation rules, normalization (up to 3NF), and implementing constraints such as PRIMARY KEY, UNIQUE, and FOREIGN KEY.
Managed data updates and integrity through INSERT, UPDATE, and DELETE operations in both staging and production environments.