Latest Updates To know the details for B.Tech. (Hons.) seat allotment schedule under JEE Main Quota, please click here | The next call for applications for admission to RVU’s Ph.D. programmes will be announced in March 2026. | 1. Information submitted to UGC for inspection purpose | 2. UGC Public Self Disclosure | CET Code: E285

Rakesh Kumar

Rakesh Kumar

Assistant Professor

About

Educator and mentor specializing in Full Stack Development & mobile application development. Passionate about AI Product Applications.

I’m an educator and mentor specializing in Full Stack and mobile application development. I enjoy guiding learners from fundamentals to real-world applications, with a growing passion for building and exploring AI-powered products.

You will not be punished for your anger, you will be punished by your anger.

Zero Trust Architecture (ZTA) enforces continuous verification with no implicit user or device trust.


AI enables behavioral analysis by learning normal user activity patterns (login, access, device, application use).


Deviations from these patterns are detected as anomalies indicating potential security threats.


Machine learning improves detection accuracy and enables dynamic risk-based access control.


AI-driven anomaly detection makes Zero Trust systems more adaptive, scalable, and resilient to modern cyber attacks.


Research Interests


AI and Cybersecurity


Rakesh Kumar

Assistant Professor

M.Tech

School of Computer Science and Engineering

1