About Me
Network engineering enthusiast with a passion for technology and innovation.

CHHAY PANHABOTH
Motivated network engineering enthusiastic student. I thrive on learning new technologies and applying innovative solutions in networking environments. Open minded and committed to continuous growth and ready to tackle real-world challenges in network engineering.
Personal Information
Sex: Male
Date of birth: 09/09/2005
Place of birth: Kandal province
Marital status: Single
Education
SECOND YEAR IN UNIVERSITY (NORTON UNIVERSITY)
Majoring in Network Engineering & Security • 2025-2026
STUDYING VMWARE COURSE (PROSETH INSTUTUDE)
2025-2026
FINISHED CCNA COURSE (PROSETH INSTITUTE)
2024-2025
- Completed Introduction to Networks
- Completed Switching, Routing and Wireless Essentials
- Completed Enterprise Networking, Security, and Automation
- Achieved Cisco Competition APJC NetAcad Riders 2025 (Bronze)
GRADUATED IELTS GENERAL ENGLISH PROGRAM (ACE)
Band score 6.0 • 2022-2023
GRADUATED HIGHSCHOOL (SOVANNAPHUMI SCHOOL)
Highschool Diploma • 2022-2023
Skills
Networking90%
English80%
Khmer100%
Problem Solving85%
Technical Expertise
NETWORKING SKILLS
Core competencies in network infrastructure
- Configure basic network settings and troubleshooting
- Inter-Vlan routing and VLAN/trunking implementation
- DHCP server configuration and management
- Access control list (ACL) implementation
- Ether-Channel and STP/RSTP configuration
- Static routing, default routing, and OSPF
- Route redistribution and NAT implementation
- Switch management via SSH/Telnet
HOME LAB EXPERIENCE
Self-hosted infrastructure and services
- Ubuntu server setup and administration
- Self-hosted web server deployment
- DNS filtering implementation
- Mesh VPN tunnel configuration
- Cloudflare tunnel setup
- Reverse proxy configuration
- Service alerting system for Telegram
CYBERSECURITY KNOWLEDGE
Security fundamentals and best practices
- Understanding of common cyber threats
- Familiarity with cybersecurity tools
- Basic penetration testing knowledge
- Network security best practices