Analysis of hardware security and firmware protection mechanisms
against low-level threats.
Research focuses on TPM 2.0, Secure Boot,
and defense architectures across x86/x64 and embedded systems.
Hands-on security laboratory exercises covering buffer overflow attacks, environment variable exploitation, and system-level security concepts.
Developed threat detection rules, custom dashboards, and security analytics for IBM QRadar SIEM platform as part of an academic SOC project.
Research project exploring honeypot implementation for network security, covering deployment strategies and threat detection mechanisms.
Detailed write-ups of machine challenges, demonstrating penetration testing methodologies and exploitation techniques.
Technical presentation and implementation of VPN solutions using IPSec protocols, covering security architecture and practical deployment scenarios.
Collection of academic projects covering algorithms, data structures, system programming, and web development fundamentals.