Naem Azam
Naem Azam
Cybersecurity Researcher AI Privacy Advocate DevOps Cloud Eng
Naem Azam

Hello I'm Naem Azam

I'm working as Cybersecurity Researcher AI Privacy Advocate DevOps Cloud Eng

About Me

Naem Azam

Bangladesh

I’m Naem Azam Chowdhury, a passionate and driven cybersecurity professional and researcher with a strong focus on AI, programming, and digital security. Currently based in China, I’m dedicated to advancing the field of cybersecurity through innovative research, ethical hacking, and promoting privacy awareness globally.

With a proven track record as a National Level Hackathon Winner and a gold medalist in my BSc in Computer Science and Technology (CST) from China, I have built a solid foundation in technology and cybersecurity. I am also a certified Ethical Hacker (CEH) and Certified Cloud Technician (CCT), with expertise in cloud technologies and DevOps practices.

My mission is to bridge the gap between AI, cybersecurity, and privacy, making these critical areas more accessible and secure for individuals and organizations. As an AI privacy advocate, I work tirelessly to raise awareness about the ethical implications of artificial intelligence in today’s digital world.

I teach cybersecurity in Bangla through my YouTube channel, providing valuable knowledge to a diverse audience of aspiring professionals in Bangladesh and beyond. Whether you’re a beginner or an experienced professional, my goal is to inspire and empower you to secure your digital life and pursue a successful career in programming, AI, and cybersecurity.

By following my work, you’ll gain insights into emerging cybersecurity trends, practical tips on ethical hacking, AI research, and cloud solutions, and much more. Join me in my journey to create a safer, more secure digital landscape!

  • 5+ Years Job

    Experience

  • 256+ Projects

    Completed

  • 400+ Meetings

    Successful

image

What Actually I Do My Services

Customized Security Audits & Risk Assessments

Customized Security Audits & Risk Assessments

Conducting comprehensive audits to assess security posture, recommend improvements, and implement security measures to minimize risks.

Cybersecurity Training & Education

Cybersecurity Training & Education

Providing online courses and tutorials, including cybersecurity topics in Bangla, to empower individuals and organizations in securing their digital assets.

AI & Machine Learning Security Research

AI & Machine Learning Security Research

Exploring the intersection of AI and cybersecurity to develop strategies for securing AI-driven systems and technologies.

Software Developer

Software Developer

Skills are the technical capabilities an individual learns to create successful programs and applications. They typically involve using mathematical knowledge and a capacity for problem-solving to write source code, which…

Linux system administrator

Linux system administrator

Takes care of computers running on the Linux operating systems. The professional will handle the support infrastructure, operating systems, virtual platforms, and applications.

Cloud Security Solutions

Cloud Security Solutions

Offering cloud security consulting, implementation of security best practices, and DevOps integration to secure cloud-based environments.

AI Privacy Awareness & Advocacy

AI Privacy Awareness & Advocacy

Leading campaigns and providing insights into the ethical use of AI, promoting privacy protection, and mitigating risks associated with AI technologies.

Cybersecurity Consulting

Cybersecurity Consulting

Providing expert advice on securing digital infrastructure, risk management, and implementing robust security protocols to protect organizations from cyber threats.

My Recent Offers Pricing Plans

What My Freedom Client Say

My Clients

Resume

My Professional Resume

My Professional Work History

Download Resume
Paper Airplane Inc.
Jul 2022 - Dec 2022
Web Developer mentor - Paper Airplane Inc.

Web Developer mentor

My Professional Cybersecurity & AI-Privacy

Developing AI models for threat, anomaly detection

67%

predictive threat analysis

85%

AI-powered vulnerability scanning

67%

Conducting penetration testing

53%

Exploiting security weaknesses

40%

Implementing privacy-preserving

65%

handling of sensitive AI-generated data

53%

Privacy laws and regulations

65%

automated threat detection

85%

adversarial attacks

53%

Securing AI models

67%

AI-Based Privacy Advocacy

85%

My Professional Cloud & DevOps

Securing cloud environments (AWS, Azure, Google Cloud)

85%

Identity and Access Management (IAM)

40%

Cloud infrastructure security

67%

Encryption and data protection

53%

Implementing security in CI/CD pipelines

87%

Automation of security testing and monitoring

65%

DevSecOps integration

54%

Containerization security (Docker, Kubernetes)

89%

Infrastructure as Code (IaC)

65%

Cloud security monitoring

24%

Real-time monitoring and log management

85%

Threat intelligence and mitigation

53%

GDPR, HIPAA, SOC 2

40%

Cloud governance models

65%

Security audits and risk assessments

40%

Load balancing and disaster recovery

95%

My Education Background History

University
Sep 2023 - Current
Master of Science in Cybersecurity and Information Law - University

You are currently pursuing a Master of Science (MS) in Cybersecurity and Information Law at Chongqing University, China, funded by the CSC Government Scholarship. This program blends advanced technical cybersecurity knowledge with the legal and regulatory aspects of cybersecurity, offering a comprehensive understanding of both the technical and legal challenges in securing digital environments.

University of Posts and Telecommunications
Sep 2019 - Jun 2023
Computer Science And Technology - University of Posts and Telecommunications

Machine learning involves computation on large data sets; hence one should possess strong basic fundamental skills such as computer architecture, algorithms, data structures, complexity, etc. Getting in-depth into the programming books and exploring new things will be a good advantage.

Portfolio

Blog

We share our news and blog

2117
How to become Cybersecurity Analyst

How to become Cybersecurity Analyst

Feb 25, 2023 In Career Roadmap

How to become Cybersecurity Analyst

2091
How to become Cloud Engineer

How to become Cloud Engineer

Feb 25, 2023 In Career Roadmap

How to become Cloud Engineer

2010
How to become Internet of Things (IoT) Engineer

How to become Internet of Things…

Feb 25, 2023 In Career Roadmap

How to become Internet of Things (IoT) Engineer

2013
How to be a Blockchain Developer Full Guideline

How to be a Blockchain Developer…

Feb 25, 2023 In Career Roadmap

How to be a Blockchain Developer Full Guideline

2047
How to be AI Robotics Engineer

How to be AI Robotics Engineer

Feb 25, 2023 In Career Roadmap

How to be AI Robotics Engineer

2034
Natural Language Processing (NLP) Engineer Full Guideline

Natural Language Processing (NLP)…

Feb 25, 2023 In Career Roadmap

Natural Language Processing (NLP) Engineer Full Guideline

2094
How to become Computer Vision Engineer

How to become Computer Vision…

Feb 25, 2023 In Career Roadmap

How to become Computer Vision Engineer

2064
Machine Learning Engineer full Guide

Machine Learning Engineer full…

Feb 25, 2023 In Career Roadmap

learn from data and make predictions or decisions.

2107
How to be a Data scientist for CS and Non-CS

How to be a Data scientist for…

Feb 25, 2023 In Career Roadmap

combination of statistical, mathematical, and programming skills

Contact

Need Some Help?

Contact Information Find me here