Md Fardin Ahamed
Md Fardin Ahamed
Available for Research Opportunities

Protecting the Next Generation of Networks

BSc Electronics & Telecommunication Engineering Prospective MSc Cybersecurity Candidate

Bridging the gap between telecommunications infrastructure and advanced network security. Passionate about protocol analysis, digital forensics, and building resilient systems.

About Me

With a solid foundation in Electronics & Telecommunication Engineering, I possess a deep understanding of how data flows across physical and logical layers. During my undergraduate studies, I developed a keen interest in the security aspects of these communication networks.

My goal is to pursue an MSc in Cybersecurity to transition from understanding network architectures to actively securing them. I am particularly interested in academic research focusing on network forensics, cryptographic protocols, and intrusion detection systems (IDS).

I am Md Fardin Ahamed, a cybersecurity-focused student building a portfolio around secure systems, protocol behavior, and evidence-driven technical work. My academic base is a BSc in Electrical and Telecommunication Engineering at CUET, and my long-term goal is to pursue an MSc in Cybersecurity.

My strongest interests are network security, protocol analysis, intrusion detection, and digital forensics. I learn best through practical labs, packet captures, controlled environments, and writing down findings clearly enough for other engineers and researchers to review.

Education

CUET

BSc in Electrical and Telecommunication Engineering with strong grounding in networks and communication systems.

Career Goal

MSc in Cybersecurity

Pursuing graduate study to deepen research capability in network defense, forensics, and secure infrastructure.

Research Interests

Security and Analysis

Network security, protocol analysis, intrusion detection, and digital forensics across real-world system traces.

Learning Philosophy

Hands-on First

I prefer labs, controlled experiments, and repeatable observations that connect theory to operational reality.

Technical Skills

Security Tools

Wireshark88%
Nmap84%
Burp Suite76%
Metasploit68%
Snort70%

Programming

C86%
Python80%
JavaScript72%
Bash78%

Systems

Linux84%
TCP/IP88%
Active Directory62%

Certifications & Training

Continuous learning is essential in cybersecurity. Here are some of the professional certifications and courses I have completed.

2023

Google Cybersecurity Professional Certificate

Coursera

2022

Introduction to Cybersecurity

Cisco Networking Academy

Featured Projects

Project work focused on network visibility, host telemetry, vulnerability research, and practical systems thinking.

Network Traffic Analyzer

Network Traffic Analyzer

A low-level traffic analysis project designed to capture packets, decode core headers, and produce protocol-level summaries for lab networks. The project focuses on understanding how communication patterns reveal system state and potential abuse.

What it solves: This project helps turn raw packet captures into readable operational insight, making it easier to study abnormal flows, protocol misuse, and host behavior during security exercises.

Tools Used

WiresharklibpcapLinux CLI
CTCP/IPPacket Parsinglibpcap
Custom Port Scanner

Custom Port Scanner

A custom scanner that probes target hosts, records open ports, and demonstrates the mechanics behind service discovery. Built as a learning project to understand socket behavior, port states, and timing strategies.

What it solves: It provides a transparent learning platform for understanding how scanning engines work instead of treating tool output as a black box.

Tools Used

NmapLinux SocketsTerminal
CSocketsPOSIX ThreadsTCP
Linux Telemetry Daemon

Linux Telemetry Daemon

A lightweight daemon that reads Linux process and resource data to surface operational health signals. The emphasis is on reproducible host observation for troubleshooting, incident triage, and baseline profiling.

What it solves: It makes core telemetry easier to inspect quickly during lab investigations, especially when comparing healthy and degraded system states.

Tools Used

Linux/procBash
CLinux APIsSystem MonitoringShell
Vulnerability Research Lab

Vulnerability Research Lab

A structured practice lab covering common web attack surfaces, safe reproduction steps, and remediation notes. It is organized to support repeatable experiments and strong technical writeups.

What it solves: It creates a safe research environment for understanding vulnerability mechanics and documenting mitigation logic with clear evidence.

Tools Used

Burp SuiteOWASP Juice ShopBrowser DevTools
PythonJavaScriptHTTPWeb Security

Research and Writeups

Technical articles, lab notes, and concise writeups that document how I approach cybersecurity problems.

CybersecurityNetworkingLinuxCryptographyLab Notes

Networking

How TCP SYN Port Scanning Works

A concise breakdown of half-open scanning, port state inference, and detection considerations.

Port ScanningTCPReconnaissance
Read writeup

Cybersecurity

Packet Analysis Using Wireshark

Methods for isolating relevant streams, filtering noise, and validating protocol behavior.

WiresharkPacket AnalysisTraffic Inspection
Read writeup

Lab Notes

Introduction to Network Forensics

Initial thinking about capture sources, timelines, host correlation, and evidence preservation.

Network ForensicsIncident Response
Read writeup

Linux

Building a Port Scanner in C

A technical note on sockets, concurrency decisions, and limitations in a learning scanner.

CSocketsSystem Programming
Read writeup

Cryptography

Basics of Cryptographic Protocols

An overview of trust, key exchange, confidentiality, and integrity in modern protocols.

CryptographyProtocolsTLS
Read writeup
Browse all writeups

Blog and Research Log

A practical learning log covering packet analysis, network security, cryptography fundamentals, TryHackMe progress, and cybersecurity lab work.

Packet AnalysisNetwork SecurityCryptographyTryHackMe WriteupsCybersecurity Labs
Explore the blog

Contact

I am actively seeking opportunities to connect with professors, researchers, and professionals in the cybersecurity domain.