I am Akshay Galgali (He/Him), a Cybersecurity Engineer.
Network Security, Incident Response, Vulnerability Assessments, and Penetration Testing.
Master of Science degree in Cybersecurity at the University of Houston.
Spring 2023 Graduate.
Let's Connect on TryHackMe, HackTheBox
View my résumé.Feel free to contact me!
Developed a security system to detect Malicious URLS by utilizing a Phish tank dataset containing malicious and benevolent URLs to generate various URL-based, domain-based, page-based features.
Trained a Random Forest classifier on generated features to predict a URL as malicious or benevolent so as to mitigate the increasing phishing attacks happening throughout the internet.
Developed a keystroke logger in an active browser using python scripting and libraries, to retrieve sensitive information and credentials of a user like username, passwords, credit card details , etc.
The credentials and URL information with login timestamp is sent via email to the attacker.
AI based Restaurant Recommendation Chatbot which is built using Google DialogFlow.
The chat bot ask for Cuisine Preference and Location from the user. Then the chatbot sends a list of restaurants to the user with their Zomato Links.
This chat bot is integrated using Telegram.
Simulated and Demostrated MODBUS Attack & Packet Injection Attack in Industrial Control System in an Master-Slave environment.
This is simulated using Modsak Simulator.
ICS Security - ICS Firewall, Centralized Control, Restricted Access.
MGTRAVELS is a website which is dedicated towards Tour and Travels business.
Website created and desined using html, php, css, JS, MySQL and integrated with payment gateway. Integrated payment gateway system PayPal with third-party APIs to leverage complete payment gateway infrastructure and enable payments directly on web app, mobile app, or website.
The Payment Gateway is secured with XES Encryption Security, Tokenization, SET, SSL, PCI DSS.
Web Application which simulates chemical experiments with the help of an interactive environment containing animations for a multiplicity of reactions and gives information about some molecules, making boring experiments look thrilling.
Technology Stack - Apache HTTP Server, MySQL, HTML5, CSS3, XAMPP, MySQL, PHP, JS.
Online Cipher Identifier tool to determine the type of the Cipher.
An encryptor tool that uses the Caesar Cipher to encrypt any file. The user may pick the ASCII shift of the data. A decryptor tool that, again, uses the Caesar Cipher to decrypt any file previously encrypted with the Caesar Cipher. The user must specify what ASCII shift to decrypt the file with.
Investigation on generated alerts where a system operated by a user Bob from HR behaves maliciously as if another person is controlling it. Additionally, Bob mentioned that he noticed the mouse moving out of character and files had been moved across the system.
Report - providing mitigation and prevention measures to avoid these kinds of attacks in the future or in any other system.
Keywords - SOC, Security Operations, Security Management, Security Operations Centres.
Abstract - Security Operations Centres (SOC) has exponentially grown its significant because of the frequent cyber events and cyber activities, this has led majority of the enterprises move towards development of centralized security operations to prevent these kinds of events.
Keywords: Risks, Risk Management, CISO, Data Security, IT company, threats, IT, analysis.
Abstract - This paper provides an illustration of the risk management strategy for handling data security and business-related risk management. I will also outline the importance of risk management in the IT firm and how it affects every element of the business.
Keywords - SCADA, Control Systems, Cybersecurity, mitigation, ICS.
Abstract - The expedite growth, and advancement in SCADA systems have made this control system more vulnerable to the cybersecurity threats and attacks. SCADA was introduced into the world wide web (Internet) which exposed this system to most common cybersecurity threats like virus, malware, intrusions.
Keywords- APT, Advance Persistent Group, SolarWinds, threats, Organization, Enterprise, firm.
Abstract - APT (Advance Persistent Threat Group) have become more sophisticated, diversified, and successful in recent times. Despite the fact that security technologies, and security policies continue to evolve, security breaches continue to occur at an alarming rate.
Keywords - Experiments, Simulation, Chemistry lab, JavaScript, MySQL, Web browser, Virtual lab.
Abstract - This paper is to scale the entire chemistry laboratory to a single-window on the computer. The project idea is developed for Polytechnic college having the specified set of experiments in their syllabus. It is a web-based application designed to perform chemistry experiments.
Keywords - Database encryption; Enterprise; Vulnerabilities; Standards; Exploits; Mitigation, cryptography, key management;
Abstract - This paper highlights the current standards that todays enterprises utilize to keep their databases secure and always accessible to their customers. These standards are utilized to maintain the data at rest and data in transit. In this paper, we'll also explore the vulnerabilities and exploits which is faced today's enterprise databases.
Master Of Science in Cybersecurity
Aug 2021 - May 2023
Network Security
Security Operations Center
Applied Cryptography
Industrial Control Systems Security
Critical Thinking Ino-Sec
Project Management
Secure Enterprise Computing
Bachelor Of Engineering in Information Technology
Aug 2018 - May 2021
Adv. Digital Forensics
Network Security
Cryptography
Big Data Analytics
Artificial Intelligence
Python Programming
Internet Of Things
Data Structures
Programming in C++ jAVA Python
Database Management System
Applied Physics Chemistry
Data Structures
Computer Networks
Computer H/W & S/W
Engineering Drawing
Data Analytics