Md. Nesar Rahman Porag

Md. Nesar Rahman Porag

Assistant Professor

Department of Information and Communication Technology
Faculty of Science & Technology (FST)

porag1010@gmail.com


BANGLADESH UNIVERSITY OF PROFESSIONALS
Mirpur Cantonment, Dhaka-1216

Biography

I’m a dedicated IT professional, cybersecurity researcher, and academic with over 14 years of experience in Bangladesh's IT sector—primarily serving within law enforcement and defence environments, including the Bangladesh Army.

My core strengths lie in server administration, virtualisation, networking, and full-scale data centre operations and implementation. For the past 10 years, I’ve been deeply involved in information security, working in parallel with infrastructure roles to design and secure critical systems and ensure operational resilience.

Academically, I hold a BSc in Computer Science & Engineering and an MSc in Information & Communication Technology, and I’m currently pursuing a PhD in Cybersecurity. I also serve as an adjunct faculty at Bangladesh University of Professionals (BUP), contributing to the master's programme and mentoring the next generation of IT and security professionals.

To support my practical expertise, I’ve earned globally recognised certifications, including RHCSA, RHCE, CCNA, Microsoft Azure, CEH (Practical), and SOC Analyst—reflecting my commitment to both technical mastery and continuous learning.

With a passion for bridging the gap between IT operations and information security, I’m always keen to connect with like-minded professionals, researchers, and organisations working at the intersection of infrastructure and cybersecurity.

Last Updated: 02 Apr 2026

Education
Masters, Bangladesh University of Professionals (BUP)

Last Updated: 02 Apr 2026

Researchs

1.

Zero Trust Authentication (ZTA): Developing a Resilient Framework
for Enterprise Network

esearch Overview

My research focuses on the paradigm shift from traditional perimeter-based security to an identity-centric Zero Trust Architecture (ZTA). In an era of sophisticated cyber threats, the "trust but verify" model is no longer sufficient. My work investigates the "Never Trust, Always Verify" principle, specifically focusing on the authentication layer.

Key Areas of Investigation:

  • Adaptive Multi-Factor Authentication (MFA): Developing dynamic authentication protocols that respond to real-time risk levels.

  • Continuous Identity Verification: Moving beyond static logins to session-based, continuous monitoring of user behavior.

  • Micro-segmentation: Analyzing how granular access control prevents lateral movement within a network.

  • Identity and Access Management (IAM): Strengthening the security of cloud-native and hybrid environments.

Academic Objective

The goal of this research is to develop robust frameworks that protect sensitive institutional and enterprise data by ensuring that security is enforced at the resource level, regardless of the user’s location or network origin.

Last Updated: 02 Apr 2026

Masters, Bangladesh University of Professionals (BUP)

Last Updated: 02 Apr 2026

Last Updated: 02 Apr 2026

Last Updated: 02 Apr 2026

Last Updated: 02 Apr 2026

Zero Trust Authentication (ZTA): Developing a Resilient Framework
for Enterprise Network

esearch Overview

My research focuses on the paradigm shift from traditional perimeter-based security to an identity-centric Zero Trust Architecture (ZTA). In an era of sophisticated cyber threats, the "trust but verify" model is no longer sufficient. My work investigates the "Never Trust, Always Verify" principle, specifically focusing on the authentication layer.

Key Areas of Investigation:

  • Adaptive Multi-Factor Authentication (MFA): Developing dynamic authentication protocols that respond to real-time risk levels.

  • Continuous Identity Verification: Moving beyond static logins to session-based, continuous monitoring of user behavior.

  • Micro-segmentation: Analyzing how granular access control prevents lateral movement within a network.

  • Identity and Access Management (IAM): Strengthening the security of cloud-native and hybrid environments.

Academic Objective

The goal of this research is to develop robust frameworks that protect sensitive institutional and enterprise data by ensuring that security is enforced at the resource level, regardless of the user’s location or network origin.

Last Updated: 02 Apr 2026

Last Updated: 02 Apr 2026

Last Updated: 02 Apr 2026