Gowshik's Portfolio

Cyber
Security

ENTER SYSTEM →
01

Cyber Identity

I’m Gowshik Balakumar, a cybersecurity enthusiast focused on securing systems, analyzing threats, and understanding real-world attack vectors.

My core interests include Linux security, network defense, vulnerability assessment, and SOC-style monitoring workflows.

I believe strong security starts with understanding how attackers think, how systems fail, and how defenses can be improved.

Analyze threats Defend systems Think adversarially
02

Practical Learning

Network Reconnaissance

Practiced active and passive reconnaissance techniques using Nmap to identify open ports, services, and basic OS fingerprinting in controlled lab environments.

Nmap • TCP/IP • Enumeration

Web Application Security

Hands-on testing of vulnerable web applications to understand OWASP Top 10 issues such as SQL Injection, XSS, and authentication flaws.

OWASP • DVWA • Burp Suite

Linux Security & Hardening

Configured Linux systems by managing users, permissions, services, and firewall rules to reduce attack surfaces.

Kali Linux • Permissions • Services

Log Analysis & SOC Basics

Analyzed authentication and system logs to detect suspicious activity, failed login attempts, and potential brute-force attacks.

Log Analysis • Incident Detection • SOC
03

Certifications & Learning

Paloalto Certified Cybersecurity Virtual Internship

completed

AICTE / Paloalto

Learning cybersecurity fundamentals including threat detection, risk management, security operations, and incident response aligned with real-world SOC practices.

Zscaler Certified Networking Virtual Internship

Completed

AICTE / Zscaler

Gained practical knowledge of TCP/IP, DNS, HTTP/HTTPS, subnetting, and network communication essential for security analysis.

Linux Fundamentals

Completed

HTB / Onling Learning

Practiced Linux command-line usage, file permissions, process management, and system configuration with a security mindset.

Hands-on Cybersecurity Labs

Ongoing

Self Learning • Labs

Continuously practicing network scanning, web vulnerability testing, log analysis, and system hardening through practical lab environments.

04

Technical Skills

Cybersecurity

  • Vulnerability Assessment (Basic)
  • OWASP Top 10
  • Threat Identification
  • Incident Awareness

Networking

  • TCP/IP Fundamentals
  • DNS, HTTP, HTTPS
  • Subnetting (Basic)
  • Network Traffic Analysis

Linux

  • Kali Linux
  • User & Permission Management
  • Process & Service Control
  • Bash Basics

Tools & Platforms

  • Nmap
  • Wireshark
  • Burp Suite (Beginner)
  • TryHackMe / Practice Labs