About me

My name is Amith but I am no myth. :P

Cape or no cape, I like being the cop taking on the baddies, the painstakers, data meddlers, information eavesdroppers being a pain in the, Oh Wait! Pain on the INTERNET.

With an acute OCD for sorting things, it’s safe to say I’ve had some intense relationships with relational Databases like Oracle Database, MySQL, MongoDB. Hailing from Bengaluru, the IT hub of India and able to converse fluently in multiple languages like Eng.... Naaahhh! C, C++, Python, HTML, CSS and scripts has helped me CODE my way out several times!

Leaving no PLATFORM unturned and no DOMAINS unexplored, I don the hat of an Administrator, Developer, Networking Consultant and a Security Analyst on cloud nine after seizing the perks of Cloud services.

Cloud Computing
System Administration and Networking
Cyber Security
Loves to learn new stuff ? Hell, Yes !!
This is me - IT worker

Amith Raj

Let's make something awesome together ?
Drop me a line or give me a heads up if you're interested in talking to me

Contact Me


Networking and Security Consulting

Cybersecurity is one of the most important ecommerce features. Without the proper protocols, online store owners put themselves and their customers at risk for payment fraud. Loyal customers are reluctant to continue shopping at an online store that put their information at risk in the past. Studying Masters of IT with majors in Internetworking and Cyber Security, I will be able to assist in keeping the system secure.


A website is the most powerful tool for communication. A website is a unique way to connect with the world. Whether you choose to create a website to share passion for music, inform people of business, sell products, or any other reason—there are no boundaries to what we can do! Having completed half a dozen of websites, I am ready to take new challenges. Try me ?

System Administration and Cloud Computing

During production, users can scale services to fit their needs, customize applications, and access cloud services from anywhere with an Internet connection. Enterprise users can get applications to market quickly without worrying about underlying infrastructure costs or maintenance. As a business, it is required to maintain the company's IT network, servers and security systems on a day to day basis.

Some things never go out of style. Like being old school and want to take a sneak peak into my RESUME?


What my Clients and Colleagues are saying about me

I am always glad to hear that my customers are satisfied. I appreciate and thank my colleagues too. Some of them shared with you, their insights on my work.

My work

I have worked on a lot of things but I have picked only the latest for you.



Art For Humanity

An interactive website for an NGO based in Bengaluru

Art for Humanity (AFH) believes ART is the catalyst for positive change in society. Art exists in everyone and AFH aims to facilitate the opportunity for communities to manifest the act that lives inside them. AFH is a Non-Government Organisation part of Ranjini Kalakendra, based in Bengaluru. Dedicated to promoting all forms of art, AFH provides a platform for Artists, Artists, Art enthusiasts and Art patrons to exchange ideas and Opportunities. Launched in 2014, AFH continues to expand.

Ranjini Kalakendra is dedicated to preserving, promoting and developing Indian Performing arts. It is earnestly committed in administering training to several students in arts, lining up community outreach activities in the form music and dance festivals, strategizing workshops, seminars, conferences, exhibitions and other activities. A very rich legacy has been set and Art for Humanity extends upon the profound legacy that Ranjini Kalakendra has set. They are a global community of artists and art patrons working concurrently for the welfare of the society. AFH forum brings together dedicated individuals to exchange ideas and provide opportunities. They at AFH are moving forward with the conviction that art has the potential to engrave a positive signature on mankind. They attach weight to the fact that the duty of an artist is to embolden art and its benefits for the revitalization of the society

Visit website

IEEE Paper

International Conference, SJBIT, Bengaluru,

Enhancing security of Docker using Linux hardening techniques

Docker which is a lightweight containerization tool has enabled DevOps to build and run applications in distributed environment effectively. Docker has generated a significant momentum by bringing together a standardized containing method which is easy to use by enabling the users to use Linux containers to its full capacity. Docker currently supports the Linux hardening capabilities and Linux Security Modules (LSM) with AppArmor and SELinux for host system hardening.

Authors :
Amith Raj MP
Information Science and Engineering, Dayananda Sagar College of Engineering, Bengaluru, India
Ashok Kumar
Information Science and Engineering, Dayananda Sagar College of Engineering, Bengaluru, India
Sahithya J Pai
Computer Science and Engineering, Dayananda Sagar College of Engineering, Bengaluru, India
Ashika Gopal
Information Science and Engineering, Dayananda Sagar College of Engineering, Bengaluru, India

Published in: Applied and Theoretical Computing and Communication Technology (iCATccT), 2016
Date of Conference: 21-23 July 2016
Date Added to IEEE Xplore: 27 April 2017
ISBN Information:
Electronic ISBN: 978-1-5090-2399-8
USB ISBN: 978-1-5090-2398-1
Print on Demand(PoD) ISBN: 978-1-5090-2400-1
INSPEC Accession Number: 16850779
DOI: 10.1109/ICATCCT.2016.7911971
Publisher: IEEE
Conference Location: Bangalore, India

Read IEEE paper

CEH - EC Council

Entry Level Cyber Security Certfication from EC Council

Certified Ethical Hacker, or CEH, certification is one of the hottest picks for IT security professionals pursuing a career in penetration testing. However, it’s often overlooked as a viable certification option by most information security pros. Although the certification is a must-have for penetration testers, its benefits are not limited only to this small niche of professionals.

What many security professionals do not yet realise is that the benefits of studying for and achieving this certification stretch beyond the field of penetration testing and into everyday network and application security. In addition to meeting the regulatory standards for employment for many top security positions, you can gain a wealth of knowledge that is otherwise not easy to obtain.

The CEH exam is a relatively new credential in the IT certification industry, but its importance and influence have grown quickly. Provided by EC-Council, the CEH exam was the first certification to bring the so-called dark side of IT into the limelight. Before the CEH exam, there was no certification that taught the methods and tools that hackers use to penetrate computer systems. The CEH exam focuses on how hackers find and exploit vulnerabilities. The course includes everything from the tools of the trade to ethics.

Verify this Certificate

Cybrary Certifications

Intermediate level certifications from Cybrary.it

Cloud security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use. This certification enables to identify technology enabled for securing mission-critical cloud-based assets under the scope of all policies, processes and compliance considerations that go along with this increasing trend in technology adoption.

Cryptography is the cornerstone of security technologies, its use of different encryption methods you can protect private or sensitive information from unauthorized access.

Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response. Many companies, organizations, and even medical facilities are required to meet a certain compliance with regards to vulnerability management. And while the effort and complexity of vulnerability management can be overwhelming to those entities, it is an easy task for professionals versed in the high-level process.

The Ethical Hacking and Penetration Testing with Kali Linux course is for those with little or no knowledge of Kali Linux and its many tools. Anyone interested in learning ethical hacking and working towards more advanced penetration techniques needs to learn the fundamentals.

Verify these Certificates

Agiles Australia

A portfolio website for an IT firm based in Australia

Agiles Australia providing comprehensive solutions on Oracle Technologies including Oracle APEX, SOA, JBoss and J2EE, Agiles Austalia is one of the top niche software solutions providers in Australia and abroad. Agile Australia is an expert in driving cost savings and delivering value through its tailor-made solutions that target various business functions & support services that are built on Oracle technologies.

Visit website

Undergrad Project

Private Cloud Containerisation using Raspberry Pi Network

Private Cloud Containerisation using Raspberry Pi Network

The existing FOSS IAAS cloud systems target enterprise as a primary user, students and developers usually cannot afford to maintain their own cloud and technical knowledge required to maintain is still very high. Raspberry Pi and ARM based devices is a series of small single board computers which is very affordable and caters to all the requirements. Raspberry Pi is a capable little device that enables people of all ages to explore cloud computing, and to learn how to program in languages like Scratch and Python.

It’s capable of doing everything we’d expect a desktop computer to do, from browsing the internet and playing high-definition video, to making spreadsheets, word-processing, and playing games. Students who wants to learn cloud should be able to span cloud servers on demand for free in their premise. This would definitely make the life of a student much better by building pocket cloud on demand easily. Raspberry Pi devices are officially supported by Docker and Kubernetes which can be used to create and orchestrate cloud containers. ARM based devices can also be used to spawn Virtual Machines using cloud stack.

In this project, Raspberry Pi and affordable device is configured with Docker, Kubernetes and cloud stack with a supporting Operating System to spawn on demand containers and Virtual Machines. The configuration is automated to help students implement pocket cloud easily without any hassles and access the GUI board(Dashboard) and the Command Line interface for performing various tasks and operations.

Best Project Presentation 2017, Information Science Department

View Research Paper

Faculty Feedback Management System

Contribution to ISE Dept.

Faculty Feedback Management System

The existing system was to write a feedback on a piece of paper by hand. The Lecturer/Faculty comes to everyone and collects the anonymous feedback from the students about their lecture. This looked very unprofessional and was not effective and a lot of time was being wasted on this. That is when I came up with this idea and developed this website for the Department to use. The students could give feedback via their phones/laptops anywhere in college or their house.

The faculty could login from the website and check the feedbacks they had recieved. The integration of google forms had made the website easier and simpler to use for both the students and faculties. The lecturers were alerted of any new feedbacks from the students and also they could see the statistics or the collective data from the feedback they recieved.

This Project successfully eliminated the pen and paper traditional feedback system and automated the process for the department. The department still uses this system to collect the feedback from the students if any new lecturer drops by.

View Website

Troll Haiklu

Online Media and Entertainment Website for a Popular Social Media Page

Being the first kannada comedy page on various online social platforms, from a following of one person to a following of 4 lakh people , Troll Haiklu has grown from an idea to a brand.

They at Troll Haiklu strive to bring you the best possible comedy content. They will continue to bring smiles on your faces and sometimes get you thinking as well.

Their services :
Registrations, Sign Ups , Purchases , Revenue

Creative Social Media marketing, Video marketing, Network Marketing, Location based marketing, Affiliate Marketing

Brand establishment, User Experience Branding , Youtube branding

Interactive advertising , Rapid market penetration , Event and celebrity promotion

Visit website


Professional Certifications

Git Contributions

IEEE Conference and Research Papers

Clients and Employers

Contact me