Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Work Availability
Quote
Timeline
Generic
ADARSH ANIL JOSHI

ADARSH ANIL JOSHI

Deulgaon Raja

Summary

Aspiring cybersecurity professional with a certified ethical hacker background, seeking an entry-level role to apply and enhance skills in ensuring digital security for the organization. COMMUNICATION AND LEADERSHIP Conducted a successful penetration test during my Cyber Security course at Imarticus Learning, where I not only identified vulnerabilities in a virtual environment but also created a comprehensive report. Received commendation from my mentor for effective presentation skills, ensuring that fellow candidates grasped the content and gained valuable insights from the session.

Overview

7
7
years of post-secondary education
1
1
Certification
1
1
Language

Work History

Cyber Security VAPT Intern

Crypto Forensics Technology
Nagpur
08.2019 - 01.2020
  • Identified weaknesses and vulnerabilities in network systems.
  • Documented entire penetration testing lifecycle during engagements for future review.
  • Conducted breach and attack simulation operations against systems.
  • Conducted security audits to identify vulnerabilities.
  • Educated and trained users on information security policies and procedures.
  • Administered and monitored firewalls, intrusion detection systems and anti-virus software to detect risks.
  • Monitored use of data files and regulated access to protect secure information.
  • Monitored computer virus reports to determine when to update virus protection systems.

Education

PG - Cyber Security

Imarticus Learning
Banglore
01.2022 - 04.2023

CEH-practical v11 2023 Ec-council. Ethical Hacking from scratch - undefined

Bachelor of Science - undefined

Saint Gadge Baba Amravati University
01.2019 - 04.2024

undefined

Skills

OSINT- Sherlock, Phoneinfoga, OSINTundefined

Accomplishments

  • Attack & Defend - Imarticus Learning
  • Ports and network scan using NMAP
  • Finding and exposing vulnerabilities using NMAP NSE scripts
  • Exploiting target using metasploit, Patching vulnerabilities
  • Description:
  • Championed a hands-on project at Imarticus Learning, engaging in a King of the Hills (KOTH) challenge on the TRYHACKME platform. Successfully penetrated the target, strategically placing my username in the king.txt file within the target's file system. Demonstrated adept cyber security skills, earning accolades for effective execution and knowledge sharing among peers.


  • A study on OSINT ( open source intelligence)
  • Scanning for open ports
  • Information Gathering, Foot printing & reconnisance
  • Using shodan and censys
  • Searching Usernames using Sherlock
  • Business records, metadata, Telephone Numbers


  • A study on wifi-dauth using NodeMCU
  • Wifi-Pentesting
  • Wifi jamming
  • Captive Portal Phishing
  • ARP Poisoning
  • MITM
  • Ettercap, wireshark



  • A study on Automated Port Scanner
  • Cronjobs
  • Automation
  • Nmap

Certification

CEH practical

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Quote

There is a powerful driving force inside every human being that, once unleashed, can make any vision, dream, or desire a reality.
Tony Robbins

Timeline

CEH practical

03-2023

PG - Cyber Security

Imarticus Learning
01.2022 - 04.2023

Cyber Security VAPT Intern

Crypto Forensics Technology
08.2019 - 01.2020

Bachelor of Science - undefined

Saint Gadge Baba Amravati University
01.2019 - 04.2024

CEH-practical v11 2023 Ec-council. Ethical Hacking from scratch - undefined

undefined

ADARSH ANIL JOSHI