Education

Welcome to my personal website! I'm Rishvvi Pooskur, a highly accomplished Cybersecurity Analyst from Penn State, experienced in malware analytics, privilege access management, and AI-driven solutions.

Education

Welcome to my personal website! I'm Rishvvi Pooskur, a highly accomplished Cybersecurity Analyst from Penn State, experienced in malware analytics, privilege access management, and AI-driven solutions.

Penn State Relevant Coursework

IST 456 Info Security Management 
Information Security Management focuses on the managerial aspects of information security. Topics include security policies, risk management, compliance, and the strategic implementation of security measures.
IST 454 Cyber Forensics
Cyber Forensics explores the techniques and tools used to investigate digital crimes. Students learn to collect, preserve, and analyze digital evidence in compliance with legal and ethical standards.
IST 451 Net Security
Network Security covers the principles and practices of securing network infrastructures. The course includes topics such as encryption, firewalls, intrusion detection systems, and network protocols.
CYBER 342W Cyber Incident Response
Cyber Incident Response provides an in-depth look at the processes and techniques used to respond to cyber incidents. Students learn to identify, contain, and remediate cyber threats while maintaining proper documentation and communication.
ENGL 202D Business Writing
Business Writing focuses on developing effective writing skills for professional settings. Students learn to create clear, concise, and persuasive business documents, including reports, proposals, and emails.
CYBER 366 Malware Analytics
Malware Analytics delves into the study of malicious software. Students learn to analyze, detect, and respond to malware using various tools and techniques. The course covers both static and dynamic analysis methods.
SRA 231 Decision Theory
Decision Theory introduces the principles and methods of decision-making. The course covers various decision-making models and techniques, including risk assessment, cost-benefit analysis, and decision trees.
IST 261 App Dev Studio I
Application Development Studio I offers practical experience in software development. Students work on real-world projects, applying their knowledge of programming, design, and project management to create functional applications. Java is the primary programming language used in this course.
IST 242 Inter Oo App Dev
Intermediate and Object-Oriented Application Development builds on the concepts learned in introductory programming courses. This course emphasizes object-oriented design and development techniques for creating robust and scalable applications. Java is the primary programming language used in this course.
CYBER 262 Cyber Defense Studio
Cyber Defense Studio is a hands-on course focusing on practical cyber defense techniques. Students engage in simulated environments to develop skills in defending against cyber attacks and understanding defensive strategies.
SRA 111 Intro to SRA
Introduction to Security and Risk Analysis provides a foundational understanding of security, risk management, and the various threats and vulnerabilities that organizations face. The course covers both technical and managerial aspects of security.
IST 220 Network and Telecommunications
Networking and Telecommunications introduces the fundamental concepts of data communication and networking. The course covers network architectures, protocols, and the design and management of network systems.
IST 140 Intro App Dev
Introduction to Application Development explores the basics of programming and software development. Students learn to design, develop, test, and debug applications using a high-level programming language. Java is the primary programming language used in this course.
CYBER 100S Computer Systems Literacy
An introduction to computer systems and literacy, covering the basic concepts of computing and information technology. The course focuses on the fundamental skills needed to effectively use computers and technology in everyday life and professional settings.
Back to Top