Cyber Identity
I’m Gowshik Balakumar, a cybersecurity enthusiast focused on securing systems, analyzing threats, and understanding real-world attack vectors.
My core interests include Linux security, network defense, vulnerability assessment, and SOC-style monitoring workflows.
I believe strong security starts with understanding how attackers think, how systems fail, and how defenses can be improved.
Practical Learning
Network Reconnaissance
Practiced active and passive reconnaissance techniques using Nmap to identify open ports, services, and basic OS fingerprinting in controlled lab environments.
Nmap • TCP/IP • EnumerationWeb Application Security
Hands-on testing of vulnerable web applications to understand OWASP Top 10 issues such as SQL Injection, XSS, and authentication flaws.
OWASP • DVWA • Burp SuiteLinux Security & Hardening
Configured Linux systems by managing users, permissions, services, and firewall rules to reduce attack surfaces.
Kali Linux • Permissions • ServicesLog Analysis & SOC Basics
Analyzed authentication and system logs to detect suspicious activity, failed login attempts, and potential brute-force attacks.
Log Analysis • Incident Detection • SOCCertifications & Learning
Paloalto Certified Cybersecurity Virtual Internship
completedAICTE / Paloalto
Learning cybersecurity fundamentals including threat detection, risk management, security operations, and incident response aligned with real-world SOC practices.
Zscaler Certified Networking Virtual Internship
CompletedAICTE / Zscaler
Gained practical knowledge of TCP/IP, DNS, HTTP/HTTPS, subnetting, and network communication essential for security analysis.
Linux Fundamentals
CompletedHTB / Onling Learning
Practiced Linux command-line usage, file permissions, process management, and system configuration with a security mindset.
Hands-on Cybersecurity Labs
OngoingSelf Learning • Labs
Continuously practicing network scanning, web vulnerability testing, log analysis, and system hardening through practical lab environments.
Technical Skills
Cybersecurity
- Vulnerability Assessment (Basic)
- OWASP Top 10
- Threat Identification
- Incident Awareness
Networking
- TCP/IP Fundamentals
- DNS, HTTP, HTTPS
- Subnetting (Basic)
- Network Traffic Analysis
Linux
- Kali Linux
- User & Permission Management
- Process & Service Control
- Bash Basics
Tools & Platforms
- Nmap
- Wireshark
- Burp Suite (Beginner)
- TryHackMe / Practice Labs