- New York, NY
- 23:56
(UTC -12:00) - https://www.linkedin.com/in/priyanka-bugade-2239b3251/
- @PriyankaBugade1
-
-
Wireless LAN Controller Configuration
UpdatedAug 18, 2025 -
Cisco-Wireless-LAN-Access-Point-Configuration
UpdatedAug 8, 2025 -
The goal of this lab is to provide hands-on experience with a unique variant of the **buffer-overflow attack** that can bypass existing protection mechanisms in major Linux operating systems.
Python UpdatedAug 7, 2025 -
Design and Deployment of Company System Network Architecture
Python UpdatedJun 30, 2025 -
Cisco ASA Firewall Configuration
hostname cisco-asa authetication intrusion-prevention-system virtual-private-network inside-zone outside-zoneUpdatedJun 15, 2025 -
Small Office Home Office Network Design Implementation
UpdatedJun 14, 2025 -
Design a network in Cisco Packet Tracer to connect the ACCOUNTS and DELIVERY departments, implementing best practices in cabling, IP addressing, and testing.
UpdatedJun 13, 2025 -
DWDM Fiber Network Design using Cisco Optical Network Planner
Python UpdatedJun 13, 2025 -
BGP exploration and the process of setting up a BGP network within an Autonomous System (AS), including BGP configuration, route advertisement, and path selection mechanisms. It covers real-world B…
C UpdatedJun 9, 2025 -
Firewalls serve as the first line of defense in network security, regulating traffic flow based on predefined rules and policies. This repository focuses on firewall setup, configuration, and secur…
kernel-module internal-network connection-tracking netfilter internal-servers webapplicationfirewall router-protectedC UpdatedJun 1, 2025 -
This project provides hands-on simulations of DNS security threats, demonstrating how attackers exploit weaknesses in DNS resolution and how to mitigate these risks. By analyzing real-world attack …
C UpdatedMay 10, 2025 -
This repository contains a hands-on lab for understanding SQL query manipulation and its mitigations. SQL query manipulation is a method that allows altering database queries and accessing sensitiv…
PHP UpdatedMay 10, 2025 -
ICMP-Route-Manipulation-Lab Public
The Internet Control Message Protocol (ICMP) is an integral part of the IP suite used for sending error messages and operational information. Commonly used by tools like ping and traceroute, ICMP h…
-
Here we examine various weaknesses in the TCP/IP stack, illustrating how flaws in the protocol can be identified and addressed. This includes simulations, analysis of common techniques used to take…
C UpdatedMay 10, 2025 -
DNS Cache Poisoning, also known as DNS Spoofing, is a critical security vulnerability where an attacker injects false DNS records into a resolver’s cache, redirecting users to malicious sites. This…
Python UpdatedApr 29, 2025 -
Network Traffic analysis is a crucial aspect of network security and network management, enabling the monitoring, inspection, and interpretation of data packets flowing across a network.
Python UpdatedApr 29, 2025 -
A blockchain system is quite complex, and it's difficult to cover every aspect of it in a single lab. To address this, we have developed a series of labs focusing on different aspects of this emerg…
Python UpdatedApr 24, 2025 -
Virtual Private Network (VPN) enables secure communication over public or untrusted networks by encrypting traffic and routing it through a secure tunnel exploring VPN implementations, IP tunneling…
-
Buffer overflow is a critical security vulnerability that occurs when a program writes more data into a buffer than it can handle, leading to memory corruption. Attackers can exploit this flaw to e…
Python UpdatedApr 19, 2025 -
Deployment-and-Prevention-of-Threats-with-Google-Cloud-NGFW-Enterprise---Firewall-Policy-Rules Public
Explored the deployment and usage of Google Cloud Firewall Plus, a native Google Cloud service integrated with Palo Alto Networks' Threat Prevention technologies.
HCL UpdatedApr 16, 2025 -
Cross-Site Request Forgery (CSRF) is a web security vulnerability that explores CSRF attack techniques, vulnerability analysis, and mitigation strategies. It includes hands-on demonstrations of how…
JavaScript UpdatedApr 15, 2025 -
This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study …
-
Podman AI Lab is an open-source extension for Podman Desktop that allows you to work with LLMs ( Large Language Models ) in a local environment. From getting started with AI and experimenting with …
-
This project contains configurations and guides for setting up Cisco ASA firewalls in various network environments. It includes detailed steps for implementing High Availability (HA) failover, stat…
1 UpdatedApr 4, 2025 -
This project explores efficient data transfer mechanisms using RDMA, focusing on memory registration, request handling, and performance optimizations.Here we can see the demonstration of how RDMA i…
C UpdatedMar 17, 2025 -
It explores race condition vulnerabilities, detection techniques, and mitigation strategies, providing insights into how they are exploited and how to prevent them.
C UpdatedFeb 22, 2025 -
To protect web applications from XSS attacks simulations, detection techniques, and prevention strategies helping developers and security professionals understand and defend against XSS vulnerabili…
JavaScript UpdatedFeb 21, 2025 -
learningsql-2875059 Public
Forked from LinkedInLearning/learningsql-2875059Other UpdatedMay 29, 2024 -
terraform-managing-network-infrastructure Public
Forked from LinkedInLearning/terraform-managing-network-infrastructure-4373320Terraform: Managing Network Infrastructure
HCL Other UpdatedMar 29, 2024