Skip to content
View PritomDas's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report PritomDas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
PritomDas/README.md

Pritom's IT and Cybersecurity Project Portfolio 🔐

I'm passionate about cybersecurity and love tackling complex challenges through hands-on projects. From vulnerability management to threat detection, these projects allow me to dive deep into the ever-evolving landscape of cybersecurity. Please feel free to check them out and see the work I’ve put into enhancing security operations and processes!

⚠️ Vulnerability Management Projects

🚨 Threat Hunting and Security Operations


Research work:


You can find in me in the web 🌍

PritomDas PritomDas | Medium PritomDas | LinkedIn PritomDas | Instagram


My Other Fun Projects:

Already Pinned Down for you sire!
Astronaut pointing downwards GIF

Pinned Loading

  1. Cloud-Computing-Projects Cloud-Computing-Projects Public

    This contains a compilation of Cloud Computing related projects for hands-on development and practice involving AWS, DevOps, Microservices, Linux and Powershell.

    1

  2. Tableau-Projects Tableau-Projects Public

    The rise in importance of data visualization is the result of many factors, including the sheer volume of data our world now produces, and the recognition that numbers alone aren’t enough. But prob…

    Jupyter Notebook

  3. Real-Time-Streaming-Data-Pipeline-and-Dashboard Real-Time-Streaming-Data-Pipeline-and-Dashboard Public

    Building Real Time Data Pipeline using Apache Kafka, Apache Spark, Hadoop, PostgreSQL, Django and Flexomonster on Docker to track status of Servers in the Data Center across the Globe.

    Python 21 5

  4. Cyber-Attack-Attribution-with-Machine-Learning Cyber-Attack-Attribution-with-Machine-Learning Public

    Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cyber attacks have become more prevalent, cyber attack attributi…

    Jupyter Notebook 15 9

  5. Brain-Tumor-Detection-with-Deep-Learning Brain-Tumor-Detection-with-Deep-Learning Public

    In this project there was application of Deep Learning to detect brain tumors from MRI Scan images using Residual Network and Convoluted Neural Networks. This automatic detection of brain tumors ca…

    Jupyter Notebook 13 7

  6. bregman-arie/devops-exercises bregman-arie/devops-exercises Public

    Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions

    Python 79.9k 18.1k