Profile Picture

Hello, I'm

Pratham Verma

Cyber Security Analyst

Linkedin Profile Linkedin Profile

Get To Know More

About Me

Picture
experience icon

Experience

1+ years

education icon

Education

Galgotias University

B.Tech Computer Science
2022-2026

experience icon

Projects

4+ Projects

Aspiring Security Engineer with a passion for cybersecurity and expand my expertise in the software and IT fields. particularly focusing on web security and network security.

My journey also includes contributing to cybersecurity knowledge through blogs, speaking at events like DevFest 2k24, and excelling in hackathons, highlighting my commitment to innovation and continuous learning.

arrow icon

Explore My

Skills

Security

Web Application Security
OWASP Top 10
Secure Coding Practice
Penetration Testing

Networking

Computer Networking
Network Traffic Analysis
Network Security

Programming

Python
Java
C++
Data Structures & Algorithms

Tools & Platforms

Linux OS
Git/GitHub
Burp Suite
Nmap
Wireshark
Gobuster
OWASP ZAP

Explore My

Projects

Digital Signature Project

Digital Signature Verification

This project is a Digital Signature Verification System developed using Elliptic Curve Digital Signature Algorithm (ECDSA). It provides robust authentication for messages by allowing users to securely sign and verify the authenticity of data.

Medical Records Project

Blockchain Based Medical Record Portal

This project is a Blockchain-based medical record portal designed to give patients complete control over their healthcare data. Using Solidity smart contracts.

Web Application Firewall

Web Application Firewall

This project is a Web Application Firewall (WAF) designed to protect web applications from malicious requests. By leveraging Machine Learning, the WAF can distinguish between good and bad requests. The solution involves a proxy server that intercepts incoming requests.

Chat Application

Server-client based chat application

Server-client based chat application designed to facilitate real-time communication over a network.The project utilizes socket programming for network connectivity and Java Swing for the graphical user interface (GUI).

Check Out My

Achievements

DevFest Speaker

Speaker at DevFest 2k24

Delivered a talk on AI-Powered Cybersecurity Strengthening Defense with Machine Learning to 100+ attendees.

Hackathon Winner

Hackathon Dexterix 4.0

Hackathon Dexterix 4.0: Led a team of 5 to the finals, outperforming 100+ teams and developed a novel health and wellness project integrating traditional remedies with AI.

Security Certification

Blogs

Authored 20+ writeups on cybersecurity topics, enhancing understanding of critical areas such as Cyber Security and Computer Science.

Read My

Latest Blogs

Blog 1

BurpSuite 101, A web security tool

BurpSuite is one of the most common tools used for web security. In this guide, I will get you up to speed with the fundamentals of how the tool works and can be used as well as some ideas about how you can take BurpSuite further and use it in more advanced ways.

Blog 1

Building a Digital Signature Verification System with Django and ECDSA

In an era where digital security is paramount, verifying the authenticity of messages and data is crucial. Digital signatures provide a reliable way to ensure that data remains untampered from the sender to the recipient.

Blog 1

How I Mastered Data Structures and Algorithms

Mastering Data Structures and Algorithms (DSA) was a transformative journey that equipped me with problem-solving skills and a deep understanding of how code works behind the scenes.

Blog 1

Wireshark Explained: A Beginner’s Guide to Network Packet Analysis

Wireshark is a network protocol analyzer, or an application that captures packets from a network connection, such as from your computer to your home office or the internet.

Blog 1

The Network’s Hidden Conversations: Exploring the Depths of Network Traffic Analysis (NTA)

Network Traffic Analysis (NTA) can be described as the act of examining network traffic to characterize common ports and protocols utilized, establish a baseline for our environment, monitor and respond to threats.

Get in Touch

Contact Me