Hello! I'm M. Rob

CISSP, CompTIA Security +, MSc

CONFIDENTIALITY

This principle focuses on preserving the privacy and confidentiality of information, ensuring that only authorized individuals or entities have access to it. Confidentiality measures include access controls, encryption, and secure communication channels.

INTEGRITY

Integrity refers to maintaining the accuracy, consistency, and trustworthiness of information. It involves protecting data from unauthorized modifications, ensuring its completeness and accuracy, and detecting any unauthorized changes or tampering. 

AVAILABILITY

Availability emphasizes ensuring that information and resources are accessible and usable by authorized individuals whenever they are needed. This involves implementing measures to prevent service disruptions, downtime, and unauthorized denial of access. Redundancy, disaster recovery planning, and fault-tolerant systems are examples of techniques used to maximize availability.

Portfolio

Item To Purchase

There are two classes. ItemToPurchase and ShoppingCart. Both classes are used to create a menu system using object oriented programming.

Deaths In Cstody 

I have worked in a team environment to analyze deaths in custody data. The raw data was in csv format and we’ve tilized sql queries, pandassql library.

Bduget Analyzer

I have created a budget analyzer in python that used object oriented programming and database knowledge to analyze a month budget.

Security and Risk Management: Focuses on establishing and managing security governance and risk management frameworks, as well as understanding legal and regulatory issues related to information security.

Asset Security: Covers the protection of information assets through asset classification, ownership, and handling, as well as implementing appropriate security controls.

Identity and Access Management (IAM): Focuses on managing user identities, authentication, and authorization, as well as implementing controls for user provisioning, access control, and identity management lifecycle.

Security Assessment and Testing: Covers the planning, execution, and management of security assessments and tests, including vulnerability assessments, penetration testing, and security control validation.

Security Operations: Involves the establishment and management of security operations to detect, respond to, and recover from security incidents, including topics like incident management, disaster recovery, and business continuity.

UNIVERSITY OF CUMBERLANDS, KENTUCKY

JUL 2023 to Present

PhD in Information Technology

CSU GLOBAL, COLORADO

Graduated in NOV 20XX

Masters of Science in Artificial Intelligence and Machine Learning

CLARKSON UNIVERSITY, NEW YORK

Graduated in May 20XX

Bachelor of Science in Computer Engineering

CASE STUDY

Quest For Success

According to the book “7 Habits of Highly Effective People”,  study shows that, successful people do not do things differently but they manage and execute around priorities. Mr. Covey illustrated a time-management matrix, that explains the difference between successful and not so successful people. 

PERSISTANCE/HARDWORK

Persistence is the key to success. 

MISSION

My mission is to secure critical & non critical information systems. 

VISSION

Solving most complex cyber security/information system issues that has positive impact on people’s life. 

VALUES

Integrity, service, wisdom, Honesty, respect others, care, love, empathy, sympathy, self-respect, self-commitment, excellence, and service.

What are you waiting for!

Testimonials

I’ve known Md A. Rob since 2012. He has always impressed me with his ironclad work ethic, focus, and goal-oriented nature. It has been a true privilege to watch his academic skills and passion grow nearly exponentially over 3 years at ELLIS, and then in the huge leap that he took to Clarkson, … Abdur Rob is a multi-talented, multilingual, super-dedicated, intelligent young man who is highly adept at adapting to new situations and environments. He possesses an admirable love of learning and is a great team player with others from a wide variety of linguistic, racial/ethnic, socioeconomic, and academic backgrounds.

J. Heyman

Author, Without a Margin for Error: Urban Immigrant ELLs in STEM

Md Rob is a man of dignity, respect, and punctuality. He always lives up to his words despite difficulties. We started college in the same year but on a different campus, he always brought up ideas and skills from his campus and shared them with me. I used to look forward to having a conversation with him related to the software industry and futuristic technologies. The best part about Md is the consistency and perseverance where he sticks to something until it’s done. He made it to Georgia Institute of Technology with his hard work and dedication towards technology while being a full-timer at work.

M. Alam

Artificial Intelligence Researcher | 3D Printing Engineer | Associate Software Engineer

I have had the pleasure of working with Abdur Rob for several years and on multiple projects in the fields of Computers and Communication Technology… improve his skills and range of knowledge. He is a quick learner and, … knows when to ask questions and how to seek out and implement solutions for the new problems/challenges.. His solid understanding of computer science principals and fundamentals was very apparent in his ability to quickly pick up the PHP language, and … aspects of our web-dev projects, despite coming onboard without much experience in PHP and the WordPress CMS…

C. Wenrick

Founder, Developer, & Project Manager with GMCT, Tech Teacher/Trainer, Technology Researcher, Instructional Designer

Latest from blog

How I Have Got Admitted Into GA Tech OMSCS Program?

Disclaimer: I can’t guarantee this will get you accepted for the Online Masters Computer Science (OMSCS) program. I can only speak for myself, what helped me to be admitted at[…]

Read more

GA Institute of Technology Statement of Purpose (SOP)

Masters in Computer Science Complete SOP Specialization in Computational Perception and Robotics I plan to do research in the field of computer science to make faster and more effective human[…]

Read more

Analog to Digital Converter (ADC)

● Designed & implemented a digital system with Nexys4 board to communicate with I2C chip in VHDL ● Developed systems with standard integrated circuits; VHDL architecture, Finite State Machine ●[…]

Read more

Contact me

Please fill out this form, I will get back to you, as soon as possible.