Rameshwor (Ram) Khadka — Cybersecurity Graduate (VU 2024)
Melbourne, VIC
Windows/Linux basics • Networking fundamentals • Python (beginner) • Security tools (university + ongoing learning)
rameshworkhadka@gmail.com
|
Open to Graduate / Intern / Entry-level roles
Profile
Victoria University (2024), a CyberSecurity Graduate, has a strong background in OS, Network Fundamentals and CyberSecurity concepts. Created as a team of four a Data Visualisation Project using StreamLit and SQLlite through an iterative team-based approach.
Used Problem Solving and Basic Data Handlng to develop skills and experience. Currently developing Ethical Hacking, Linux and Networking skills and knowledge through Practical Labs and Self-Direction; therefore, I would like to find Entry-Level Positions in Cyber Security or IT.
Education
- Bachelor of Cybersecurity — Victoria University (Completed 2024)
- Diploma of Information Technology — Victoria University (Completed 2022)
Technical Skills
Operating Systems
Windows (Basic)
Linux (Basic)
macOS (Working knowledge)
Networking
TCP/IP
DNS
DHCP
Wireshark
Cybersecurity Tools
Nmap
Autopsy
Metasploit
Kali Linux
Cloud & Virtualisation
AWS Academy (Data Engineering)
Streamlit (project-based)
Virtual environments (project-based)
Career Interests
- Ethical Hacking / Red Team
- GRC
- General cybersecurity graduate roles
Projects
- Objective: Develop a data visualisation application similar to Tableau.
- Team: 4 people; contributed to Python coding, poster design, QR code creation, and AI-generated logo.
- Collaboration: Used GitHub to track updates and individual contributions.
- Outcome: Strengthened Python data handling and collaborative GitHub workflow experience.
- Tools: Python, SQLite3, Pandas, BytesIO, Streamlit
Certifications & Training
- Introduction to Data Centres — TAFE NSW (Completed)
- 100 Days of Code: Python — Udemy (In progress)
- Exposure Management Certification - XM Cyber (Completed)
Ethical Hacking Series — LinkedIn Learning (Completed All Courses)
- Cybersecurity Foundations
- Ethical Hacking: Introduction to Ethical Hacking
- Ethical Hacking: Footprinting and Reconnaissance
- Ethical Hacking: Scanning Networks
- Ethical Hacking: Enumeration
- Ethical Hacking: Vulnerability Analysis
- Ethical Hacking: System Hacking
- Ethical Hacking: The Complete Malware Analysis Process
- Ethical Hacking: Sniffers
- Ethical Hacking: Social Engineering
- Ethical Hacking: Denial of Service
- Ethical Hacking: Session Hijacking
- Ethical Hacking: Evading IDS, Firewalls, and Honeypots
- Ethical Hacking: Hacking Web Servers and Web Applications
- Ethical Hacking: Wireless Networks
- Ethical Hacking: Mobile Devices and Platforms
- Ethical Hacking: Hacking IoT Devices
- Ethical Hacking: Cryptography
- Ethical Hacking: Cloud Computing
- Ethical Hacking: SQL Injection
Current Focus
- Python fundamentals (100 Days of Code — in progress)
- Strengthening networking and Linux fundamentals
Professional Attributes
- Clear documentation and accurate record-keeping
- Attention to detail and following procedures
- Team collaboration and reliability
- Time management and adaptability
- Calm under pressure and fast learner