Drawing, Racing, Gaming, Mentoring, Social media marketing and handling, Charity and Donations
Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud/web-based software. Versed in robust network defense strategies. Proficiency in online security research, planning, execution, and maintenance. Skilled at training internal users on security procedures and preventative measures.
EC-Council Cybersecurity Analyst v 10 Trainee in Cyberloop Information Security.
performed Penetration Testing & Methodologies, Penetration Testing Scoping & Engagement Methodology, Open Source Intelligence Methodology, Penetration Testing & Methodologies in Social Engineering, Networking Internal, Networking Perimeter Devices, Web Application, Database, Wireless, Cloud, Report Writing & Post Testing Actions
Trained as EC-Council Ethical Hacker v 10 in Sites Learning India Pvt Ltd .
Performed Footprint & Reconnaissance, Scanning Networks, Enumeration, Vulnerability Analysis, System Hacking, Malware Threats, Sniffing, Social Engineering, Denial of Service, Session Hijacking, Evading IDS, Firewalls, and Honeypots, Hacking Web Servers, Hacking Web Applications, SQL injection, Hacking Wireless Networks, Hacking Mobile Platforms, IOT Hacking, Cloud Computing, Cryptography, Lab Training
Kali Linux
undefinedI worked on the project titled 'Smart Shopping' . The main aim of this project is to reduce the queue at a billing counter in a shopping complex. The system does the same by displaying the total price of the product kept inside the cart. Customer can directly pay the amount at the billing counter or can make the payment online.
EC-Council Certified Ethical Hacker
Programming and Scripting languages: C, C++, Java, Python, R
Drawing, Racing, Gaming, Mentoring, Social media marketing and handling, Charity and Donations
I declare that all information provided above is true to the best of my knowledge.
Hackersera Offensive Approach to Hunt Bugs
Hackersera Offensive Bug Bounty Hunter 2.0