Skip to content
View Priyabug's full-sized avatar
:octocat:
Learning & Sharing
:octocat:
Learning & Sharing

Block or report Priyabug

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Priyabug/README.md

Hello World 🙏

Hi, I'm Priyanka!

Security Engineer | Cybersecurity Professional

👨‍💻 Technical Projects:

  • Border Gateway Protocol - Launching-BGP-network-on-one-of-the-autonomous-system
  • Next Generation FireWall - Deployment-and-Prevention-of-Threats-with-Google-Cloud-NGFW-Enterprise
  • Domain Name System - Local-DNS-Exploits-&-Defense
  • Virtual Private Network - Virtual-Private-Network---IP-Tunneling-and-Routing
  • Web Application Firewall - Implementation and Tracking a Firewall
  • Transmission Control Protocol/Internet Protocol - Vulnerabilities in the TCP-IP Protocol

🎓 Certifications, Courses, and Bootcamps:

  • Google Cybersecurity Professional (Coursera)
  • Juniper Networks Certified Associate (On-going)
  • Oracle Cloud Infrastructure 2024
  • Google Cloud Security Professional(on-going)

Linkedin LinkedIn  

Pinned Loading

  1. Launching-BGP-network-on-one-of-the-autonomous-system Launching-BGP-network-on-one-of-the-autonomous-system Public

    BGP exploration and the process of setting up a BGP network within an Autonomous System (AS), including BGP configuration, route advertisement, and path selection mechanisms. It covers real-world B…

    C

  2. Cross-Site-Request-Forgery-Vulnerability-Exploration Cross-Site-Request-Forgery-Vulnerability-Exploration Public

    Cross-Site Request Forgery (CSRF) is a web security vulnerability that explores CSRF attack techniques, vulnerability analysis, and mitigation strategies. It includes hands-on demonstrations of how…

    JavaScript

  3. Crypto-Infrastructure-Simulation-Lab Crypto-Infrastructure-Simulation-Lab Public

    A blockchain system is quite complex, and it's difficult to cover every aspect of it in a single lab. To address this, we have developed a series of labs focusing on different aspects of this emerg…

    Python

  4. Implementation-and-setting-up-a-single-firewall-on-a-network Implementation-and-setting-up-a-single-firewall-on-a-network Public

    Firewalls serve as the first line of defense in network security, regulating traffic flow based on predefined rules and policies. This repository focuses on firewall setup, configuration, and secur…

    C

  5. Implementation-of-remote-DNS-cache-poisoning- Implementation-of-remote-DNS-cache-poisoning- Public

    DNS Cache Poisoning, also known as DNS Spoofing, is a critical security vulnerability where an attacker injects false DNS records into a resolver’s cache, redirecting users to malicious sites. This…

    Python

  6. Network-Traffic-Analysis-and-Manipulation Network-Traffic-Analysis-and-Manipulation Public

    Network Traffic analysis is a crucial aspect of network security and network management, enabling the monitoring, inspection, and interpretation of data packets flowing across a network.

    Python