πŸ‘‹ Hello! I’m Suhesh Kasti

feature image

My Cybersecurity Journey

πŸ›‘οΈ You see, I’m almost Batman… but instead of Gotham, I kinda try to save networks (Batman couldn’t either) 🀑.
Cybersecurity has been my passion, and here’s a quick look at what I’ve been doing with it:

  • Learning Ethical Hacking from TCM Security πŸ€“
  • Breaking into Web Applications with Rana Khalil and ITProTV then protecting them with F5 BigIP πŸ› οΈ
  • Scripting like a professional script kiddie with Python For Hackers from TCM Security 🐍
My Cybersecurity Resume
feature image

My DevOps and Networking Knowledge

I challenge you to find a guy who can get stuck like I did on VLANs and subnetting, I’ll wait…. (P.S. I still suck in it πŸ₯Ί) but I am learning using the following resources:

My DevOps Resume
feature image

Current Focus

At the moment, I’m juggling quite a bit (cybersecurity life, amirite?). Here’s what’s on my plate right now:

My Tech Arsenal

These are the technologies I have exposure to…

Python is a very versatile programming language. I think for a cybersecurity practitioner, python can be very helpful for automating task and scripting various tools.
Python

Python

Programming Language

When it comes to operating systems, I think Linux is the foundational operating system crucial for cybersecurity practitioners. Its robust security features and open-source nature make it an essential tool for professionals in the field.
Linux

Linux

Operating System

Git is a powerful version control system widely used in cybersecurity for tracking changes in source code during collaborative development. Its efficiency and flexibility enhance code management and collaboration.
Git

Git

Version Control System

Docker facilitates containerization, allowing cybersecurity experts to deploy and isolate applications efficiently. Its lightweight and scalable containers streamline the development and deployment of secure applications. I also use it to setup labs for practise.
Docker

Docker

Containerization

F5 Network’s BIG-IP is a collection of hardware platforms and software solutions providing services focused on security, reliability, and performance of web applications.
BigIP

BigIP

Web application firewall

SQL, or Structured Query Language, is fundamental for managing and manipulating databases. In cybersecurity, understanding SQL is essential for handling and securing databases, a critical aspect of protecting sensitive information. How can I protect something I dont know..right?
SQL

SQL

Database

Figma is a collaborative design tool and although its not a security tool I use it to make some creative designs. For developers though its collaborative features make it an excellent choice for designing secure and user-friendly applications.
Figma

Figma

Designing

Windows is by far the most widely used operating system in both personal and enterprise environments. So windows is most of the time the victim of cyberattacks. Understanding windows I think is understanding the incident.
Windows

Windows

Operating System

Kubernetes is a powerful container orchestration platform used for managing and scaling containerized applications. Although not entirely a cybersecurity tool, understanding Kubernetes can help understand the development workflows.
Kubernetes

Kubernetes

Containerization

Burpsuite is a popular tool for web application penetration testing. Its features for analyzing and identifying security vulnerabilities in web applications make it an indispensable tool for ethical hackers and security professionals.
Burpsuite

Burpsuite

Webapp pentesting

Wireshark is a network protocol analyzer widely used in cybersecurity for capturing and analyzing network traffic. It helps cybersecurity professionals identify and troubleshoot network issues and detect potential security threats.
Wireshark

Wireshark

Computer Netwoking

Microsoft Office is a suite of productivity tools used in various professional domains, including cybersecurity. Its applications like Word, Excel, and PowerPoint are essential for creating, analyzing, and presenting reports.
Microsoft Office

Microsoft Office

Office Suites

While being a totally technical domain effective communication is a critical soft skill in cybersecurity. Nothing much to say, as social engineering is the most successful hacking technique to ever exist.
Communication

Communication

Soft skills