0% found this document useful (0 votes)
70 views

Cyber Security Trainers Profile:: Name: Ms. Prajakta Pawar

Ms. Prajakta Pawar has a graduate degree in Information Security and is a certified ethical hacker. She has over a year of experience in information security, ethical hacking, vulnerability assessment, penetration testing, intrusion detection, and forensic data recovery. Her skills also include security training, technical security planning, and risk management. She developed an intrusion detection system that logs packets from intruders and notifies administrators to take action.

Uploaded by

Rohan Choudhari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

Cyber Security Trainers Profile:: Name: Ms. Prajakta Pawar

Ms. Prajakta Pawar has a graduate degree in Information Security and is a certified ethical hacker. She has over a year of experience in information security, ethical hacking, vulnerability assessment, penetration testing, intrusion detection, and forensic data recovery. Her skills also include security training, technical security planning, and risk management. She developed an intrusion detection system that logs packets from intruders and notifies administrators to take action.

Uploaded by

Rohan Choudhari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Cyber Security Trainers Profile:

Name: Ms. Prajakta Pawar.


 Profile: She has done her graduation in
Information Security.

 EC-Council Certified Ethical hacker (CEH).


Followed by One year Diploma in
Information Security and Ethical Hacking
from Appin Technology Lab.
Well versed with handling diverse range of
information security domains, including policy
design and development, vulnerability & risk
assessment, treatment, penetration testing,
intrusion detection & prevention, forensic &
data recovery, deploying Firewall policy,
application security testing as well as
vulnerability analysis.
Research work:
An Intrusion Detection System is a security
 Have experience of handling Forensic
system that monitors computer systems
Investigation projects.
and analyzes network traffic for possible
hostile attacks originating from outside
 The ability to serve as a corporate security
the organization and also for system Trainer by ensuring technical security planning,
misuse or attacks originating from within testing, verification and risk analysis in
the organization. accordance with TCP/IP protocols.

An effort has been made to develop an  Capable of defining, deploying and monitoring
Intrusion Detection System which logs all risk management, compliance, and information
the packets used by the intruder and security programs while functioning as a
notify or alert the System Administrator to primary IT disaster recovery coordinator.
take necessary action against the intruder
to ward off the adverse effects. There are
four primary software packages that
comprise this system - MySQL database
server, ACID and Sax2. This project aims at
installing the packages and configuring
each package with the other to achieve
the best results from the Intrusion
Detection System.

You might also like