prisha@cyberspace:~$
prisha@cyberspace:~$ whoami

Cybersecurity Engineering Student & Ethical Hacker

prisha@cyberspace:~$ cat skills.txt

Penetration Testing | Web Development | Digital Forensics

prisha@cyberspace:~$

Prisha Sharma

Cybersecurity Engineering Student | Flag Hunter | Web Developer

About Me

Curious by default and calm under pressure, I enjoy unraveling CTF puzzles and poking at the edges of systems to understand how they truly work, all while building practical web projects for fun and for learning. I am doubling down on fundamentals for the CompTIA Security+ exam, exploring threat models, secure design principles, and hands-on defenses I can bring to every project.

I thrive in new environments, bring a positive, collaborative energy to teams, and aren't afraid of the grind when something worth building is on the line. If you're into cybersecurity, clever exploits, or just cool web ideas, say hello—I'm always up for a good problem and a better conversation.

Education

Shah & Anchor Kutchhi Engineering College

B.Tech. in Cyber Security — Third Year Student

Mumbai, India

Currently studying for CompTIA Security+ certification

Skills & Expertise

Penetration Testing

Vulnerability assessment, exploitation, and security testing

Web Development

HTML, CSS, JavaScript, and modern web technologies

Digital Forensics

Evidence collection, analysis, and incident investigation

Social Engineering

Human psychology and security awareness training

Threat Analysis

Risk assessment and threat intelligence

Incident Response

Security incident handling and mitigation

Network Security

Network defense and monitoring

Operational Technology Security

OT security implementation and industrial control systems

Projects

CyberQuest CTF Challenge

Developed the web challenge component for the Cyber Colloquy Event's CTF competition, creating engaging and educational security challenges for participants.

CTF Web Development Security

Online Healthcare Appointment & Record System

Developed a comprehensive web-based healthcare management system enabling patients to book appointments, access medical records, and communicate with healthcare providers securely.

Web Development Database Healthcare

Arduino-Based Seismometer

Designed and deployed a low-cost seismometer using Arduino, sensor modules, and a calibrated sampling pipeline to log micro-tremors for basic event detection and visualization.

Arduino IoT Data Analysis

Keylogger

Built a controlled keylogger to study attack chains, persistence, and detection; translated findings into defensive guidance, EDR rule ideas, and secure input handling patterns.

Malware Analysis EDR Defense

Personal Portfolio

A responsive portfolio website showcasing my skills, projects, and achievements in cybersecurity. Built with modern web technologies and featuring a terminal-inspired design.

HTML CSS JavaScript

CTF Practice Platform

Actively participating in various CTF competitions on platforms like TryHackMe, enhancing my practical skills in ethical hacking and security challenges.

Ethical Hacking CTF Practice

Articles & Research

My latest technical and research writings in cybersecurity, AI, and software engineering.

Applications of Artificial Intelligence in Cyber Security

How AI enhances threat detection, prevention, and response in modern cybersecurity.

The ETL Process: Extract, Transform, and Load Explained

Understanding data pipelines for cybersecurity analytics and data management.

Dark Web Investigations: Tools, Techniques, and Challenges

Exploring how investigators uncover cybercrime in the hidden corners of the web.

Applications of Turing Machines in Artificial Intelligence and Problem Solving

How Turing’s theory of computation continues to shape AI and automation today.

Basics of Software Design in Software Engineering and Project Management

The role of design in building scalable, maintainable, and successful software projects.

The Role of Cryptography in Modern Network Security

Understanding how encryption, hashing, and digital signatures protect modern networks.

Security Information and Event Management (SIEM)

Understanding how SIEM tools enable real-time threat detection and monitoring in modern SOCs.

Incident Response in Security Operations Centers

Understanding how SOC teams detect, contain, and recover from cyber attacks.

Note: These articles are original works authored by Prisha Sharma. Reuse or citation should include proper credit.

Videos

Check out my latest cybersecurity content and tutorials

Get In Touch

Feel free to reach out for collaborations, opportunities, or just to connect!