About
Experienced Cyber Security Manager with over 15 years of expertise in establishing…
Services
Articles by Maj Sumit
Contributions
-
How can behavior-based detection identify new and unknown malware threats?
Behavior-based detection offers a multitude of advantages that significantly enhance an organization's cybersecurity posture. Here are some key benefits: 1. Proactive Threat Identification 2. Anomaly Recognition 3. Adaptability to Evolving Threats 4. Reduced False Positives: By focusing on genuine deviations from established norms, behavior-based detection. 5. Insider Threat Detection 6. Early Threat Intervention In essence, behavior-based detection is a cornerstone in modern cybersecurity, offering a dynamic and intelligent approach to threat identification and mitigation. Its ability to adapt, recognize anomalies, and provide early intervention makes it an invaluable asset in the ongoing battle against cyber threats.
-
How can behavior-based detection identify new and unknown malware threats?
Behavior-based detection is a technique where the system analyses the organic behavioural pattern those have been established in a sample set or in a large set after weeding out the outlier patterns for any organisation. This novel method provides a proactive defence against emerging cyberthreats by carefully examining a system's inherent behavioural patterns. The system explores the nuances of accepted behavioural norms after identifying and eliminating anomalous behaviours, laying a solid basis for threat identification.
-
How can behavior-based detection identify new and unknown malware threats?
Envision being able to see irregularities and possible dangers before your company's priceless data and systems are compromised! Behaviour discrepancies are made visible by Behavior-based detection technique, which enables us to efficiently react and reduce dangers.Think about malware, those sneaky dangers that try to wreak havoc on our digital havens. Often, malicious programmes diverge from typical behaviour patterns by claiming elevated rights, assigning more space, or posing as computation bots. These anomalies become into obvious warning signs when behavior-based detection can be used, giving us the ability to stop any cyberattacks before they have a chance to take hold.
Activity
-
Mastering CRTO? This Resource is Pure Gold!🔥 If you're preparing for Certified Red Team Operator (CRTO) or want to sharpen your adversary emulation…
Mastering CRTO? This Resource is Pure Gold!🔥 If you're preparing for Certified Red Team Operator (CRTO) or want to sharpen your adversary emulation…
Liked by Maj Sumit Sharma
-
🔰Breaking News: Sweden Delivers ASC 890 Airborne Early Warning Aircraft to Ukraine in Major Military Aid Package🇸🇪🇺🇦⚡🇷🇺 Sweden has officially…
🔰Breaking News: Sweden Delivers ASC 890 Airborne Early Warning Aircraft to Ukraine in Major Military Aid Package🇸🇪🇺🇦⚡🇷🇺 Sweden has officially…
Liked by Maj Sumit Sharma
-
A lady stands to seek justice... But for a moment look back and reflect on this corrupt system 1. Drunk Police Man 2. Beat Father and Son till they…
A lady stands to seek justice... But for a moment look back and reflect on this corrupt system 1. Drunk Police Man 2. Beat Father and Son till they…
Liked by Maj Sumit Sharma
Experience
Education
-
Indian Institute of Management, Indore
-
For the men and women of our defence forces, the 24-week Certificate Course in Business Management for Defence Officers programme is a gateway to the corporate world. A contact programme, bundled with the right mix of management subjects, is tailored to bridge the diverse experiences these officers have and the needs of today’s corporate. Laying a strong foundation of core business management concepts, to include Finance, Accounts, Communication, Operations and MIS amongst others.
The…For the men and women of our defence forces, the 24-week Certificate Course in Business Management for Defence Officers programme is a gateway to the corporate world. A contact programme, bundled with the right mix of management subjects, is tailored to bridge the diverse experiences these officers have and the needs of today’s corporate. Laying a strong foundation of core business management concepts, to include Finance, Accounts, Communication, Operations and MIS amongst others.
The purpose of the course is to facilitate an effective transition from the military to the corporate through skill development and industry orientation. A case-based pedagogy combined with industry-based assignments and projects enhance the comprehension and ability to address complex business situations.Curated to chisel off the functional differences from their erstwhile environment and nurture the wide experience, the programme aims to create an effective and efficient leader for today’s corporate.
-
-
Designing and modeling for fast feedback and idea sharing
System optimization with open architectures
Validating functions and verifying performance
Leveraging and enabling the system designs, platforms, and ecosystems
Lean Startup and Product Innovation Analytics
Developing the data collection and preparation pipeline for products and services
Analyzing the performance and testing hypotheses for usability, fast-feedback, and growth
Customer experience (CX) validation and…Designing and modeling for fast feedback and idea sharing
System optimization with open architectures
Validating functions and verifying performance
Leveraging and enabling the system designs, platforms, and ecosystems
Lean Startup and Product Innovation Analytics
Developing the data collection and preparation pipeline for products and services
Analyzing the performance and testing hypotheses for usability, fast-feedback, and growth
Customer experience (CX) validation and enhancement leveraging usability analytics -
-
Learning Objectives
By the end of this course students will be able to:
Present the design principles and core ideas behind several advanced computer network architectures to academic audiences.
Lead discussions on current topics in network protocols, algorithms, applications and architecture research in both device to device communication and content networking paradigms.
Design simulation and experiments to demonstrate the working of computer network protocols and algorithms. -
-
Activities and Societies: https://www.facebook.com/HistoryOfVadodaraBaroda/posts/the-eme-school-electric-mechanical-engineering-school-of-the-indian-army-was-rai/2683407965019715/
Introduction to Industrial equipment,
Design considerations, operation principles
Engineering maintenance,
Maintenance mathematics,
Maintenance Management and control,
Reliability studies & Human errors
General service,
Trouble shooting check list for major equipment, system overhaul
Maintenance and servicing of components,
Maintenance Schedules and Documentation, Standards and References, Maintenance Strategies,
Condition Monitoring Tools, Preventive…Introduction to Industrial equipment,
Design considerations, operation principles
Engineering maintenance,
Maintenance mathematics,
Maintenance Management and control,
Reliability studies & Human errors
General service,
Trouble shooting check list for major equipment, system overhaul
Maintenance and servicing of components,
Maintenance Schedules and Documentation, Standards and References, Maintenance Strategies,
Condition Monitoring Tools, Preventive Maintenance, Corrective maintenancE
Inventory control and spares:
Quality and safety in maintenance engineering,
Fire Systems, Inspection, Testing, and Maintenance of safety systems
Maintenance, especially preventative maintenance, -
-
THE FOUNDER
Sir Syed Ahmad Khan, one of the architects of modern India was born on October 17, 1817, in Delhi and started his career as a civil servant.
The 1857 revolt was one of the turning points in Syed Ahmed's life. He clearly foresaw the imperative need for the Muslims to acquire proficiency in the English language and modern sciences, if the community were to maintain its social and political clout, particularly in Northern India.
He was one of those early pioneers who…THE FOUNDER
Sir Syed Ahmad Khan, one of the architects of modern India was born on October 17, 1817, in Delhi and started his career as a civil servant.
The 1857 revolt was one of the turning points in Syed Ahmed's life. He clearly foresaw the imperative need for the Muslims to acquire proficiency in the English language and modern sciences, if the community were to maintain its social and political clout, particularly in Northern India.
He was one of those early pioneers who recognized the critical role of education in the empowerment of the poor and backward Muslim community. In more than one ways, Sir Syed was one of the greatest social reformers and a great national builder of modern India. He began to prepare the road map for the formation of a Muslim University by starting various schools. He instituted Scientific Society in 1863 to instill a scientific temperament into the Muslims and to make the Western knowledge available to Indians in their own language.
Licenses & Certifications
-
-
-
Certification for R programming
Coursera
IssuedCredential ID https://coursera.org/share/99c4dc68ff2f583036690f5c3fdb7989 -
-
-
Introduction to Google Analytics
Great Learning
IssuedCredential ID https://olympus.greatlearning.in/courses/59414/certificate -
Microsoft Azure Essentials
Great Learning
IssuedCredential ID https://olympus.greatlearning.in/courses/10922/certificate -
Certificate course on Exploratory Data Analytics
Great Learning
IssuedCredential ID https://olympus1.greatlearning.in/course_certificate/PJXDMZWN -
Certificate course on Introduction to R
Great Learning
IssuedCredential ID https://olympus1.greatlearning.in/course_certificate/VABBDDXQ -
Publications
-
DXCCII-Based Mixed-Mode Electronically Tunable Quadrature Oscillator with Grounded Capacitors
DOI:10.1007/978-3-642-18440-6_65
A new mixed-mode quadrature oscillator circuit using two dual-X current conveyors (DXCCIIs) and grounded passive components is presented. In the proposed circuit, two quadrature voltage-mode signals and a current-mode sinusoidal waveform are simultaneously available. The oscillation condition and oscillation frequency are independently controllable. Further, electronic tunability i.e. voltage control of the circuit is also discussed. The use of only grounded capacitors makes the proposed…
A new mixed-mode quadrature oscillator circuit using two dual-X current conveyors (DXCCIIs) and grounded passive components is presented. In the proposed circuit, two quadrature voltage-mode signals and a current-mode sinusoidal waveform are simultaneously available. The oscillation condition and oscillation frequency are independently controllable. Further, electronic tunability i.e. voltage control of the circuit is also discussed. The use of only grounded capacitors makes the proposed circuit suitable for integrated circuit implementation. Results of PSPICE simulation confirm the proposed theor
Other authorsSee publication -
New Applications of CMOS DXCCII: Quadrature Oscillator; AM, FM & OOK Modulators and Variable Duty-Cycle Square-Wave Generator
Conference: Proceedings of the International Conference on Future Engineering Trends (ICFET2K10)
https://www.researchgate.net/scientific-contributions/Sumit-Sharma-2023916078
Other authorsSee publication -
DXCCII based Electronically Tunable Band-Pass Filter
Conference: Proceedings of the International Conference on Future Trends in Information and Communication Technologies (FTICT-09)
Recommendations received
7 people have recommended Maj Sumit
Join now to viewMore activity by Maj Sumit
-
🏆 Struggling in OSCP? These 4 Resources Will Save You! Struggling with privilege escalation or Active Directory attacks? Don't waste hours—use…
🏆 Struggling in OSCP? These 4 Resources Will Save You! Struggling with privilege escalation or Active Directory attacks? Don't waste hours—use…
Liked by Maj Sumit Sharma
-
One of the best videos you’ll ever see about Large Language Models. Probably no very cool slides and the audio is not perfect, but come on, this…
One of the best videos you’ll ever see about Large Language Models. Probably no very cool slides and the audio is not perfect, but come on, this…
Liked by Maj Sumit Sharma
-
Has the Army Top Brass Bent Too Much? It has, BUT We DONT KNOW WHY Would the 'Patiala Assault Case' happen if Capt Amrinder Singh would have been…
Has the Army Top Brass Bent Too Much? It has, BUT We DONT KNOW WHY Would the 'Patiala Assault Case' happen if Capt Amrinder Singh would have been…
Liked by Maj Sumit Sharma
-
The wrong architecture will kill your product Even faster than bad code... Every week or so I watch organizations struggle with microservices they…
The wrong architecture will kill your product Even faster than bad code... Every week or so I watch organizations struggle with microservices they…
Liked by Maj Sumit Sharma
-
Got a spot for a Senior Consultant on my team at Mandiant (part of Google Cloud). If you are passionate about solving complex incident response…
Got a spot for a Senior Consultant on my team at Mandiant (part of Google Cloud). If you are passionate about solving complex incident response…
Liked by Maj Sumit Sharma
-
This has been a very long and in occasions a tortuous journey. The only exam(cert) that I've failed in my career. Even CISSP wasn't that challenging…
This has been a very long and in occasions a tortuous journey. The only exam(cert) that I've failed in my career. Even CISSP wasn't that challenging…
Liked by Maj Sumit Sharma
-
🚨 SHARE SOMEONE NEEDS IT 🚨 The repository Cybersecurity Free Resources on GitHub provides a collection of 14 free cybersecurity resources ,…
🚨 SHARE SOMEONE NEEDS IT 🚨 The repository Cybersecurity Free Resources on GitHub provides a collection of 14 free cybersecurity resources ,…
Liked by Maj Sumit Sharma
-
Hacking commercial trucks is highly profitable: a complex, outdated attack surface and cargo worth millions. Key risks and solutions. 🚚 🪝…
Hacking commercial trucks is highly profitable: a complex, outdated attack surface and cargo worth millions. Key risks and solutions. 🚚 🪝…
Liked by Maj Sumit Sharma
-
These are the four police rogues who got drunk and physically assaulted Col Bath. CM Bhagwant Mann Please Ensure they are arrested, and complete…
These are the four police rogues who got drunk and physically assaulted Col Bath. CM Bhagwant Mann Please Ensure they are arrested, and complete…
Liked by Maj Sumit Sharma
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More