About Me

About

“Internet privacy is fiction.”

  • Name: Rohit Ray
  • Date of birth: June 10, 2001
  • Address: Jadibuti Futsal, Bhagwan Kripa Marga, Kathmandu 44600
  • Zip code: 44600
  • Email: [email protected]
  • Phone: +977-9826897281

0 Project Accomplish

Compute CV

My Resume

Resume

“Passwords are like underwear: don’t let people see it, change it very often, and you shouldn’t share it with strangers.”

SUMMARY

Rohit Ray

+977-9826892781

Jadibuti Futsal, Bhagwan Kripa Marga, Kathmandu 44600

rohitray.com.np

[email protected]





I am an enthusiastic and committed fellow with an intense curiosity in networking and cybersecurity, as well as an alumni fellow seeking a job in the field of entry-level penetration tester and cybersecurity analyst.

EDUCATION

Coventry University

BSc (Hons) Ethical Hacking and Cybersecurity
First Class Honours Degree
2020-2023

OM National Academy

Science Stream("Biology Faculty")
2.42/4.0("B")
2017-2019

South Zone English Boarding School

3.4/4.0("A")
2017


Every time you click on something, you are choosing to share data.

SOCIAL PLATFORMS

                       

                       



I was basically born knowing how to casually stalk people on social media.

COURSEWORK

Freshman

Incident Response

Threat Hunting

Operating Systems, Security and Networks

Real World Project("Group Work")

Ethical Hacking

Advance Network Management And Design

Data Recovery And Advance Digital Forensic Analysis

Red Teaming

Individual Project("Final Thesis")

For me personally, cloud security isn’t a worry. My data is such a mess that no one would find anything anyway.

PROJECTS ACCOMPLISHED

Freshman Projects

A blockchain-based decentralized mechanism to ensure the security of the electronic voting system("Final Thesis")

SIEM Architecture Poster Design And Implementation For Enterprise Solution

Built a Scalable, and Safe Network infrastructure

Vulnerability Assessment and Penetration Testing("VAPT Report")

USB Forensic Analysis-Reconstructing Digital Evidence From USB Drive("Point_Blank_Group")

Reconnaissance and Vulberabilities Scanning of Web Application("Real World Project")

Hospital Management System("Individual project")

Color Game("Individual Project")

Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.

SKILLS

                       

                       

                 

A breach alone is not a disaster, but mishandling it is.

Services

Services

"You cannot create experience. You must undergo it"



Coming Soon!!

My Certificates

Certificates

"If you’re not doing scans and penetration tests, then just know that someone else is. And they don’t work for you."










Skills

My Skills

"Companies spend millions of dollars on firewalls, encryption and secure access devices, and it's money wasted; none of these measures address the weakest link in the security chain."

 Adobe Illustrator

 Adobe Photoshop

 Python

 HTML5

 CSS3

 C++

 Docker

 Linux OS

 Windows

 Applied Forensic

 Vulnerability Assessment

 OSINT

 Risk Assessment

 Reporting and Documentation

 Advance Network Management and Design

 Blockchain Security

Projects

My Projects

"As we’ve come to realize, the idea that security starts and ends with the purchase of a prepackaged firewall is simply misguided."

Featured Projects

A Blockchain-Based Electronic Voting System("Final Thesis")

    

Vulnerability Assessment and Penetration Testing("VAPT Report")

    


SIEM Architecture Poster Design And Implementation For Enterprise Solution

    

Built a Reliable, Scalable, and Safe Network Infrastructure

    


USB Forensic Analysis-Reconstructing Digital Evidence From USB Drive(Point_Blank Group)

    

Reconnaissance and vulnerabilities Scanning of Web Application("Real World Project")

    


Color Game

    

Hospital Management System

    


Research Paper

My Research Area

"No research without action, no action without research"

Coming Soon!!

Blogs

My Blogs

"It’s the not knowing that’s the worst… . After a breach, there are more questions than answers."

PDF File Analysis

    

Network Forensics

    


Jeopardy-Style CTF Challenges

    

Structured penetration test of vulnerable systems

    


Vulnerability Assessment and Penetration Testing ("VAPT Report")

    

In-Depth Investigation of the Packet Capture File ("PCAP”)

    


Memory Forensic

    

Steganography

    


Anti-Forensics

    

USB-Forensic Analysis

    


OS and Memory Forensics (Live and Dead Acquisition)

    

Password-Cracking Techniques

    


Contact

Contact Me

"Understand what data you hold, how you are using it, and make sure that you are practising good data hygiene."

© Copyright rohitray.com. All Rights Reserved