How to become Cybersecurity Analyst
How to become Cybersecurity Analyst
I’m Naem Azam Chowdhury, a passionate and driven cybersecurity professional and researcher with a strong focus on AI, programming, and digital security. Currently based in China, I’m dedicated to advancing the field of cybersecurity through innovative research, ethical hacking, and promoting privacy awareness globally.
With a proven track record as a National Level Hackathon Winner and a gold medalist in my BSc in Computer Science and Technology (CST) from China, I have built a solid foundation in technology and cybersecurity. I am also a certified Ethical Hacker (CEH) and Certified Cloud Technician (CCT), with expertise in cloud technologies and DevOps practices.
My mission is to bridge the gap between AI, cybersecurity, and privacy, making these critical areas more accessible and secure for individuals and organizations. As an AI privacy advocate, I work tirelessly to raise awareness about the ethical implications of artificial intelligence in today’s digital world.
I teach cybersecurity in Bangla through my YouTube channel, providing valuable knowledge to a diverse audience of aspiring professionals in Bangladesh and beyond. Whether you’re a beginner or an experienced professional, my goal is to inspire and empower you to secure your digital life and pursue a successful career in programming, AI, and cybersecurity.
By following my work, you’ll gain insights into emerging cybersecurity trends, practical tips on ethical hacking, AI research, and cloud solutions, and much more. Join me in my journey to create a safer, more secure digital landscape!
Experience
Completed
Successful
Conducting comprehensive audits to assess security posture, recommend improvements, and implement security measures to minimize risks.
Providing online courses and tutorials, including cybersecurity topics in Bangla, to empower individuals and organizations in securing their digital assets.
Exploring the intersection of AI and cybersecurity to develop strategies for securing AI-driven systems and technologies.
Skills are the technical capabilities an individual learns to create successful programs and applications. They typically involve using mathematical knowledge and a capacity for problem-solving to write source code, which…
Takes care of computers running on the Linux operating systems. The professional will handle the support infrastructure, operating systems, virtual platforms, and applications.
Offering cloud security consulting, implementation of security best practices, and DevOps integration to secure cloud-based environments.
Leading campaigns and providing insights into the ethical use of AI, promoting privacy protection, and mitigating risks associated with AI technologies.
Providing expert advice on securing digital infrastructure, risk management, and implementing robust security protocols to protect organizations from cyber threats.
A specialized package for organizations looking to integrate AI technologies securely and protect their cloud environments. This plan includes AI privacy consultations, cloud security assessments, and compliance audits.
Services Included:
> AI privacy policy creation & compliance guidance
> Cloud infrastructure security assessment
> DevOps security best practices implementation
> 2 hours of consultation on AI ethics and data privacy
This plan is for businesses or individuals requiring in-depth testing of their systems. It includes comprehensive penetration testing, vulnerability scanning, and a detailed report with actionable insights.
Services Included:
> Full network and web application penetration testing
> Vulnerability scanning & analysis
> Detailed report with recommendations and remediation steps
Ideal for small businesses or individuals looking to secure their digital presence. A basic cybersecurity audit and consultation is included to identify vulnerabilities and suggest immediate improvements.
Services Included:
> 1-hour cybersecurity consultation
> Basic vulnerability assessment
> Security best practices for personal and business security
I have had the pleasure of knowing Mr. Naem for more than two years. He is very skilled programmer, web developer, and his work has been exemplary. He has been a tremendous colleague and an asset to our university.
I have known Naem for more than 2 years as we studied together at CQUPT. I admire his passion for work and his hardworking personality very much. As I have seen him from very close, I know he can learn things very well and adjust quickly to a new environment.…
My Professional Resume
Web Developer mentor
You are currently pursuing a Master of Science (MS) in Cybersecurity and Information Law at Chongqing University, China, funded by the CSC Government Scholarship. This program blends advanced technical cybersecurity knowledge with the legal and regulatory aspects of cybersecurity, offering a comprehensive understanding of both the technical and legal challenges in securing digital environments.
Machine learning involves computation on large data sets; hence one should possess strong basic fundamental skills such as computer architecture, algorithms, data structures, complexity, etc. Getting in-depth into the programming books and exploring new things will be a good advantage.
We share our news and blog
combination of statistical, mathematical, and programming skills
Need Some Help?