Computers
Experience in Manual penetration and application testing. Knowledge of network architectures, operating systems, application software and cyber security tools. Knowledge of managing information assurance evaluation tests. Knowledge of scripting languages, php, Python. Understanding of information security and applied cryptographic protocols. Proficiency in scripting, Unix operating systems and windows. Ability to exploit recognized vulnerabilities
Network and application security
undefined• Member of National information security council.
• Member of United Conference on Cyber Space.
Certified Ethical Hacker ( CEH ) - EC-Council
Computers
Writing
Reading
Theatre
Tree Planting
Pet Care
Vulnerability Analysis and Management - CODERED - EC-Council
Certified Investigator -ACCESSDATA
Certified Ethical Hacker ( CEH ) - EC-Council
Hardware and Networking Engineer + Cloud -Jetking