Skip to content
View Priyabug's full-sized avatar
:octocat:
Learning & Sharing
:octocat:
Learning & Sharing

Block or report Priyabug

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Priyabug/README.md

Hello World 🙏

Hi, I'm Priyanka!

A tech enthusiast with a background in network, cloud infrastructure, and cross-functional collaboration. I enjoy solving real-world problems and working closely with product and engineering teams to deliver excellent customer experiences.

👨‍💻 Technical Projects:

  • Border Gateway Protocol - Launching-BGP-network-on-one-of-the-autonomous-system
  • Domain Name System - Local DNS Behavior Analysis
  • Virtual Private Network - Virtual-Private-Network---IP-Tunneling-and-Routing
  • Web Application Firewall - Implementation and Tracking a Firewall
  • Transmission Control Protocol/Internet Protocol - TCP/IP Protocol Analysis

🎓 Certifications, Courses, and Bootcamps:

  • Juniper Networks Certified Associate (On-going)
  • Oracle Cloud Infrastructure 2024

Linkedin LinkedIn  

Pinned Loading

  1. Launching-BGP-network-on-one-of-the-autonomous-system Launching-BGP-network-on-one-of-the-autonomous-system Public

    BGP exploration and the process of setting up a BGP network within an Autonomous System (AS), including BGP configuration, route advertisement, and path selection mechanisms. It covers real-world B…

    C

  2. Setting-Up-a-Traffic-Control-Device-in-a-Network-Environment Setting-Up-a-Traffic-Control-Device-in-a-Network-Environment Public

    Firewalls serve as the first line of defense in network security, regulating traffic flow based on predefined rules and policies. This repository focuses on firewall setup, configuration, and secur…

    C

  3. Implementation-of-remote-DNS-cache-poisoning- Implementation-of-remote-DNS-cache-poisoning- Public

    DNS Cache Poisoning, also known as DNS Spoofing, is a critical security vulnerability where an attacker injects false DNS records into a resolver’s cache, redirecting users to malicious sites. This…

    Python

  4. Network-Traffic-Analysis-and-Manipulation Network-Traffic-Analysis-and-Manipulation Public

    Network Traffic analysis is a crucial aspect of network security and network management, enabling the monitoring, inspection, and interpretation of data packets flowing across a network.

    Python

  5. ICMP-Route-Manipulation-Lab ICMP-Route-Manipulation-Lab Public

    The Internet Control Message Protocol (ICMP) is an integral part of the IP suite used for sending error messages and operational information. Commonly used by tools like ping and traceroute, ICMP h…

    Python 1

  6. Virtual-Private-Network---IP-Tunneling-and-Routing Virtual-Private-Network---IP-Tunneling-and-Routing Public

    Virtual Private Network (VPN) enables secure communication over public or untrusted networks by encrypting traffic and routing it through a secure tunnel exploring VPN implementations, IP tunneling…

    Python 1