Skip to content

This program provides hands-on, practical experience in tackling real-world cybersecurity challenges. The projects are designed to give you a comprehensive understanding of different aspects of cybersecurity, enhancing your skills and preparing you for a career in this dynamic field.

License

Notifications You must be signed in to change notification settings

himanshu-03/JPMC-Cybersecurity-Job-Simulation

Repository files navigation

JPMorgan Chase & Co. Cybersecurity Job Simulation

🗃️ Task 1 - Fraud in Financial Payment Services

This project involves the analysis of a recently acquired dataset of mobile money transactions from a financial services provider. The goal is to explore the dataset, understand the various types of transactions, and analyze fraud detection and occurrence within these transactions.

Task Link: Analyze a Large Dataset of Fraud in Financial Payment Services

🗃️ Task 2 - Application Security Fundamentals

In this project, we aim to develop a secure Django web application enhanced with One-Time Password (OTP) authentication. This setup will ensure that users authenticate using not only their username and password but also a time-sensitive OTP, providing an additional layer of security.

Task Link: Learn About Application Security Fundamentals and Put it to Use on your own Website

🗃️ Task 3 - Spam or Ham: Email Classifier

Business Email Compromise (BEC) is a sophisticated type of cybercrime that targets email systems within organizations. BEC attacks are designed to deceive employees into making unauthorized financial transactions or disclosing sensitive information. Given the critical nature of these attacks, it's essential to develop robust detection systems to identify and prevent BEC incidents.

Task Link: Spam or Ham? Build an Email Classifier

🗃️ Task 4 - System to Tighten Access to Sensitive Information

The goal of this project is to design a system that simulates limiting the number of roles a user can have at any given point in time. This system aims to enforce the principle of least privilege, thereby minimizing security risks associated with excessive role assignments. By limiting roles, the system helps mitigate the impact of compromised accounts by reducing the attacker's access.

Task Link: Design and Develop a System to Tighten Access to Sensitive Information

🪪 License

This project follows the MIT LICENSE.


Connect with me

Github     LinkedIn     Twitter     Instagram     Gmail   

(Back to top)

About

This program provides hands-on, practical experience in tackling real-world cybersecurity challenges. The projects are designed to give you a comprehensive understanding of different aspects of cybersecurity, enhancing your skills and preparing you for a career in this dynamic field.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published