Hello,My Name is
chandhan
And I'm a
Hire Me

About Me

my photo
I am chandhan, a

Hello there! I'm Chandhan Madapakula, a computer science and engineering graduate with a B.Tech. degree from Jain University. My specialization lies in cloud technology & information security. I'm deeply passionate about the fascinating world of cyber security, and I've honed my skills in web development as well. With a strong commitment to protecting digital assets and creating engaging web experiences, I strive to contribute to the advancement of technology. Let's connect on GitHub and LinkedIn to explore my journey and discuss exciting opportunities in the field

Download Resume

My Projects

Cyber Ranges On AWS

• A cyber range is a controlled, interactive technology environment where up-and-coming cybersecurity professionals can learn how to detect and mitigate cyber-attacks using the same kind of equipment they will have on the job. • Configuring a Cyber Range with realistic experience on AWS using Projects and features provided and with Web interface for University Students to practice.

Basic Banking System

• It is a simple Dynamic Website that users can log in to through their user credentials. It shows information like username, email address, and account balance in the profile section. • Useful for transferring money between multiple users and a record is kept of all transfers.

Network Intrusion Detection System

• we create and train a model for this that makes use of the Decision Tree classifier to determine whether a network packet is being attacked. • A whole protected network can always be monitored by a network-based IDS system. It monitors overall incoming packets and points its decisions on packet content and metadata.

Preparing Large Question Banks Using Crowd Sourcing Model

A web platform where anonymous stakeholders can upload Questions and institutions can generate standard Question Papers from the crowd-sourced question bank.

StackOverflow Clone using MERN Stack

• we create and train a model for this that makes use of the Decision Tree classifier to determine whether a network packet is being attacked. • A whole protected network can always be monitored by a network-based IDS system. It monitors overall incoming packets and points its decisions on packet content and metadata.

My Skills

Programing & Development
Cyber Security & Hacking Tools

My Team

Contact Me

Get in touch

If you have any questions or comments, please get in touch with me 🤚

Name
Chandu
Address
Bangalore,India
email
cchandhan021@gmail.com
Message Me