Skip to content
View Priyabug's full-sized avatar
:octocat:
Learning & Sharing
:octocat:
Learning & Sharing

Block or report Priyabug

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Priyabug/README.md

Hello World 🙏

Hi, I'm Priyanka!

Software Engineer | Cybersecurity Professional

👨‍💻 Technical Projects:

  • Border Gateway Protocol - Launching-BGP-network-on-one-of-the-autonomous-system
  • Next Generation FireWall - Deployment-and-Prevention-of-Threats-with-Google-Cloud-NGFW-Enterprise
  • Domain Name System - Local-Attacks-on-DNS-Server
  • Virtual Private Network - Virtual-Private-Network---IP-Tunneling-and-Routing
  • Web Application Firewall - Implementation and Tracking a Firewall
  • Transmission Control Protocol/Internet Protocol - Vulnerabilities in the TCP-IP Protocol

🎓 Certifications, Courses, and Bootcamps:

  • Google Cybersecurity Professional
  • JNCIA
  • Oracle Cloud Infrastructure 2024

Linkedin LinkedIn  

Pinned Loading

  1. Efficient-Data-Transfer-with-RDMA-Memory-Registration-and-Request-Handling Public

    This project explores efficient data transfer mechanisms using RDMA, focusing on memory registration, request handling, and performance optimizations.Here we can see the demonstration of how RDMA i…

    C

  2. Deployment-and-Prevention-of-Threats-with-Google-Cloud-NGFW-Enterprise Public

    Explored the deployment and usage of Google Cloud Firewall Plus, a native Google Cloud service integrated with Palo Alto Networks' Threat Prevention technologies.

    HCL

  3. Implemented-ARP-cache-manipulation-to-identify-and-analyze-network-vulnerabilities. Public

    This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study …

    Python 1

  4. Launching-BGP-network-on-one-of-the-autonomous-system Public

    BGP exploration and the process of setting up a BGP network within an Autonomous System (AS), including BGP configuration, route advertisement, and path selection mechanisms. It covers real-world B…

    C