Hello!!
“Internet privacy is fiction.”
0 Project Accomplish
“Passwords are like underwear: don’t let people see it, change it very often, and you shouldn’t share it with strangers.”
Rohit Ray
+977-9826892781
Jadibuti Futsal, Bhagwan Kripa Marga, Kathmandu 44600
rohitray.com.np
I am an enthusiastic and committed fellow with an intense curiosity in networking and cybersecurity, as well as an alumni fellow seeking a job in the field of entry-level penetration tester and cybersecurity analyst.
Coventry University
BSc (Hons) Ethical Hacking and Cybersecurity
First Class Honours Degree
2020-2023
OM National Academy
Science Stream("Biology Faculty")
2.42/4.0("B")
2017-2019
South Zone English Boarding School
3.4/4.0("A")
2017
Every time you click on something, you are choosing to share data.
Freshman
Incident Response
Threat Hunting
Operating Systems, Security and Networks
Real World Project("Group Work")
Ethical Hacking
Advance Network Management And Design
Data Recovery And Advance Digital Forensic Analysis
Red Teaming
Individual Project("Final Thesis")
For me personally, cloud security isn’t a worry. My data is such a mess that no one would find anything anyway.
Freshman Projects
A blockchain-based decentralized mechanism to ensure the security of the electronic voting system("Final Thesis")
SIEM Architecture Poster Design And Implementation For Enterprise Solution
Built a Scalable, and Safe Network infrastructure
Vulnerability Assessment and Penetration Testing("VAPT Report")
USB Forensic Analysis-Reconstructing Digital Evidence From USB Drive("Point_Blank_Group")
Reconnaissance and Vulberabilities Scanning of Web Application("Real World Project")
Hospital Management System("Individual project")
Color Game("Individual Project")
Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.
"You cannot create experience. You must undergo it"
Coming Soon!!
"If you’re not doing scans and penetration tests, then just know that someone else is. And they don’t work for you."
"Companies spend millions of dollars on firewalls, encryption and secure access devices, and it's money wasted; none of these measures address the weakest link in the security chain."
Adobe Illustrator
Adobe Photoshop
Python
HTML5
CSS3
C++
Docker
Linux OS
Windows
Applied Forensic
Vulnerability Assessment
OSINT
Risk Assessment
Reporting and Documentation
Advance Network Management and Design
Blockchain Security"As we’ve come to realize, the idea that security starts and ends with the purchase of a prepackaged firewall is simply misguided."
"No research without action, no action without research"
Coming Soon!!
"It’s the not knowing that’s the worst… . After a breach, there are more questions than answers."
"Understand what data you hold, how you are using it, and make sure that you are practising good data hygiene."