Академический Документы
Профессиональный Документы
Культура Документы
EDUCATION
Chandra Shekhar Azad Institute of Science and Technology 2012 - 2015
BCA -B.COMPUTER APPLICATION
Tech Computer Science | Aggregate: 67.56 / 100.00
INTERNSHIPS
Internship based on a project which done successfully with IIT Kanpur and published a technical report.
PROJECTS
Working with Attack Proof Web Server with automated backups of OS and Logs. May 17, 2019 - June 10, 2019
Mentor: Dr. Rahul Gupta | Team Size: 3
It is a promising solutions to general web server security system and benchmark is on the cutting edge of automated log management in centralized
system. Security of Web server and Apache File access logs for backup power solution and enhanced security of metadata cache. It auto scaling
the server attack proof.
Capacity Building Of Client-Server Disruption Network Over Cloud Using Network Forensics Sept. 8, 2017 - March 14, 2018
Team Size: 1
It is a mechanism of centralized computing. a sector of available resources such as applications, processes and services can be rapidly deployed,
scaled and provisioned, on demand. For this reason using cloud computing to deliver on demand forensic services could be an effective new way to
support framework of client-server model allowing cloud organizations, service providers and customers, to establish forensic capabilities and
reducing cloud security risks.
Setting Cloud Server Security using Virtualization Nov. 15, 2016 - March 3, 2017
Mentor: Munivel E | Team Size: 1
A significant number of secure systems are concerned with monitoring the environment. Then there are equipment to measuring consumption of
utilities. At the top end of the scale, there are systems used to verify security issues, there are also security systems, Monitoring systems are also
important because they have quite a lot in common with systems designed to enforce the copyright of software and other digital media.
Cloud computing is growing now-a-days in the interest of technical approach can be improved much instead of using traditional ICT. A significant
number of secure systems are concerned with monitoring the environment. It is challenging for cloud providers to quickly interpret which events to
act upon and the priority of events
ACHIEVEMENTS
https://www.youracclaim.com/badges/696c4873-8392-40fd-8fa1-0ba24389fcc7
ASSESSMENTS / CERTIFICATIONS
Global Initiative of Academic Networks Course on High Performance Computing Concepts and Practice
Key Skills: N-body-Simulation Parallel-Computing Cloud-Computing GPU-Computing
Global Initiative of Academic Networks (GIAN) in higher Education, in order to garner the best international experience.
Certificate on Cryptography I
Aggregate: 90.0
Introduction to Cryptography from Stanford University, it contains the process of converting ordinary plain text into unintelligible text and vice-versa. It
is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.
The general information security risk management framework and its practices and how to identify and model information security risks and apply
both qualitative and quantitative risk assessment methods.
Azure data lake offers dynamic scaling to match your business priorities, along with enterprise-grade security with Azure Active Directory. It allows
you to store & analyze petabyte-size files & trillions of objects. It helps you to develop massively parallel programs with ease.
Digital India Capacity Building training programs July 26, 2019 - July 26, 2019
Institute Name: Dr. MCR HRD Institute of Telangana
Explore application of some of the key Emerging Technologies in e-governance in their functional area.
National Instructional Workshop on Cryptology June 6, 2018 - June 10, 2018
Institute Name: Motilal Nehru National Institute of Technology Allahabad
The subject of Cryptology is developing rapidly and its popularity is increasing day-by-day in Information Science particular in network, banking
related activities.
DevOps with MS or open source tools & technologies May 30, 2018 - May 30, 2018
Institute Name: Microsoft India Pvt Ltd
Microsoft App Innovation Circle – Hands on Lab session for Introduction to CI/CD, Hands On - Introduction - Explore VSTS and related capabilities
and Hands on - VSTS - Build and Release management.
Workshop on Common Criteria Awareness May 25, 2018 - May 25, 2018
Institute Name: C-DAC
This workshop covered background and global scenario, details on CC Evaluation using protection profiles, industry expectation in product security
evaluation, protection profile and security target and briefing on common criteria certification process.
Workshop on Cyber Security Threats and Forensics March 23, 2017 - March 24, 2018
Institute Name: Maulana Azad National Institute of Technology, Bhopal
In cyber security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. Spoofing,
tampering, repudiation, denial of service and elevation of privilege are common type of threats faced by web applications. Forensic analysis is use of
tools and techniques to identify the true root cause of a security breach.
Short Term course for Network Security Jan. 8, 2018 - Jan. 12, 2018
Institute Name: IIT Roorkee
Workshop on Cloud Computing for Final Round Robothlon 2017, Oct. 15, 2017 - Oct. 15, 2017
Institute Name: IIT Delhi
Workshops will be delivered by officials of Robosapiens Technologies Pvt. Ltd & and its Associates.
PG Diploma in Information Security and Cloud Computing Sept. 19, 2016 - March 3, 2017
Institute Name: National Institute of Electronics and Information Technology, Calicut
Key Skills:
Cloud-Computing Virtualization
Information Security knowledge to maintain the Systems, Networks and cloud infrastructure in today’s scenario.
NPTEL online four-week course on Introduction to Cryptology July 18, 2016 - Aug. 12, 2016
Institute Name: IIT Roorkee
Introduction of Caesar cipher and Modular Arithmetic, Shift Cipher. Public Key Cryptography and RSA Computation
PERSONAL DETAILS
Gender: Male Date of Birth: July 2, 1994
Marital Status: Unmarried Known Languages: Hindi, English
Current Address: Hostel No: 9, Room No: 9073, MANIT Bhopal, Permanent Address: 995, Khati Baba Mandir Isai Tola Dildar Nagar
Madhya Pradesh, India, 462003, Bhopal, Madhya Pradesh - 462003 Jhansi, 284003, Bhopal, Madhya Pradesh - 462003
Phone Numbers: +91-8765232907
Emails: rsansiya@gmail.com
REFERENCES
Dr. Sujoy Das
(Associate Professor, MANIT Bhopal)
Dr. Amit Bhagat
(Assistant Professor, MANIT Bhopal)
Shri. Munivel E
(Scientist/Engineer ‘C’, National Institute of Electronics & Information Technology,Calicut)