Hello! 👋

I'm Mohammed Khan :D

Aspiring Ethical Hacker & Cybersecurity Enthusiast

About Me

I’m 18 and currently pursuing my Diploma in Computer Engineering and IoT. Over time, I discovered my real passion lies in cybersecurity — understanding how systems work, how they break, and how to defend them. With skills in Python, C, C++, Kali Linux, and networking, I’m training myself to become a disciplined ethical hacker and cybersecurity analyst through practical, project-driven learning.

Python C C++ Kali Linux Networking Cybersecurity Tools

Experience

Junior Python Developer

TronSoft Pvt Lmt

Jun 2025 - Sep 2025
  • Delivered a functional POS web app (Flask + React) with CRUD operations, authentication, and structured folder architecture.
  • Created cybersecurity utilities in Python for hashing, file integrity verification, and simple vulnerability scanning.
  • Improved code quality and collaboration by adopting Git workflows, PEP 8 standards, and logging for debugging.

The Complete Hands On Cybersecurity Analyst Course

Udemy Course

Jun 2025 - Ongoing
  • Gaining practical exposure to core cybersecurity concepts, including networking, encryption, threat analysis, and ethical hacking.
  • Applied hands-on labs in Kali Linux for penetration testing, vulnerability scanning, and password attacks.
  • Developed Python-based security scripts for automation, hashing, and log analysis to simulate real-world attack/defense scenarios.

Junior Python Developer

TronSoft

Jan 2025 - Mar 2025
  • Developed automation scripts for file handling, log parsing, and data processing using Python.
  • Built and deployed a basic Flask backend for a local POS system, handling routes and user input.

Education

Diploma in Computer Engg & IoT

Cusrow Wadia Institute Of Technology

2023 - ongoing(2026)
  • Studying core computer science subjects including Operating Systems, Networking, and Database Management.
  • Strengthened programming foundation in Python, C, and C++ with a focus on problem-solving and system-level understanding.
  • Gained exposure to cybersecurity fundamentals (ethical hacking, digital forensics, network defense) through coursework and seminars.