31 Student Reviews
I am a Ethical Hacking Trainer, I have Completed My CEH (Certified Ethical Hacking), ECSA (Ec Council Certified Security Analyst) and CEI (Certified Ec-Council Instructor), I have been taken this Training programme for Various people across the globe in Ethical Hacking and Pentesting Field, and have handled more than 500+ students in overall.
I am a Ethical Hacking Trainer, I have Completed My CEH (Certified Ethical Hacking), ECSA (Ec Council Certified Security Analyst) and CEI (Certified Ec-Council Instructor), I have been taken this Training programme for Various people across the globe in Ethical Hacking and Pentesting Field, and have handled more than 500+ students in overall.
I have 10+ years of experience in cyber security domain working with MNC & IT companies. I teach 1) Security Operations Center Concepts 2) Vulnerability Management concepts 3) Incident Investigation and Forensics
I have 10+ years of experience in cyber security domain working with MNC & IT companies. I teach 1) Security Operations Center Concepts 2) Vulnerability Management concepts 3) Incident Investigation and Forensics
I'm a cybersecurity professional with hands-on experience in penetration testing, Linux, and threat analysis. I've trained elite Cyber Commandos at Rashtriya Raksha University (RRU) and worked at IBM Bangalore in a core cybersecurity role. I offer practical, lab-based training—including OSCP mentoring—focused on red teaming, ethical hacking, and real-world cyber defence.
I'm a cybersecurity professional with hands-on experience in penetration testing, Linux, and threat analysis. I've trained elite Cyber Commandos at Rashtriya Raksha University (RRU) and worked at IBM Bangalore in a core cybersecurity role. I offer practical, lab-based training—including OSCP mentoring—focused on red teaming, ethical hacking, and real-world cyber defence.
I have completed my cybersecurity course and I work in a private firm. My skills are teaching profession for basics of IT Infrastructure and also to students.
I have completed my cybersecurity course and I work in a private firm. My skills are teaching profession for basics of IT Infrastructure and also to students.
CDAQi one of the leading Global regulatory & Compliance consultants in healthcare domains and also providing Shingo Japanese Management techniques 5S, TQM, TPM, Poke Yoke, Lean Management. Our team has 16 years of rich industry experience which spans across established standards/regulations for class 1 & 2 medical equipment’s - MDD, ISO 13485, 21CFR820,GMP,Design Controls, CE,FDA 510k approval,62304, 60601-1,60601- 2,62366,60601-1-6,60601-1-8 & ISO 14971, HIPPA Compliance. OUR KEY OFFERINGS: Establish a risk management framework Demonstrate compliance to 62304 Establishing 60601-1 and 1-2 practices • Preparation/Review of technical file for CE, 510k file for FDA Audit for QMS and QSR • CAPA Management Quality/Regulatory Documentation • Risk Evaluation Techniques – FMEA & FTA Quality manual, Procedure Manual, Standard operating procedures) as stipulated in QSR (21 CFR 820)/ISO 13485:2003 /ISO 9001:2008,93/42/EEC, & Relevant standards. supplier audit UNFPA qualification audit LNE-G/Med International audit USFDA Audit without any FDA 483 observations CE Mark(EC Certificate) Canadian Regulation * Relevant Standards GMP/cGMP compliance snd SOPS Looking forward to join with you and help our clients to implement International quality & regulatory practices to produce high quality products right at the first time.
CDAQi one of the leading Global regulatory & Compliance consultants in healthcare domains and also providing Shingo Japanese Management techniques 5S, TQM, TPM, Poke Yoke, Lean Management. Our team has 16 years of rich industry experience which spans across established standards/regulations for class 1 & 2 medical equipment’s - MDD, ISO 13485, 21CFR820,GMP,Design Controls, CE,FDA 510k approval,62304, 60601-1,60601- 2,62366,60601-1-6,60601-1-8 & ISO 14971, HIPPA Compliance. OUR KEY OFFERINGS: Establish a risk management framework Demonstrate compliance to 62304 Establishing 60601-1 and 1-2 practices • Preparation/Review of technical file for CE, 510k file for FDA Audit for QMS and QSR • CAPA Management Quality/Regulatory Documentation • Risk Evaluation Techniques – FMEA & FTA Quality manual, Procedure Manual, Standard operating procedures) as stipulated in QSR (21 CFR 820)/ISO 13485:2003 /ISO 9001:2008,93/42/EEC, & Relevant standards. supplier audit UNFPA qualification audit LNE-G/Med International audit USFDA Audit without any FDA 483 observations CE Mark(EC Certificate) Canadian Regulation * Relevant Standards GMP/cGMP compliance snd SOPS Looking forward to join with you and help our clients to implement International quality & regulatory practices to produce high quality products right at the first time.
Vulnerability assessment Penetration testing security auditing website security application security
Vulnerability assessment Penetration testing security auditing website security application security
I am an CEH and i am 12th pass and i am now working in Indian Cyber Security.
I am an CEH and i am 12th pass and i am now working in Indian Cyber Security.
- Versatile Experience in Software testing with more than 3.5 years in multiple business verticals and platforms. - Worked on Java and .NET platforms and currently working on python projects. - Experienced and certified in Security and Penetration testing, performance testing. - Best QA award in 2013 - Science Olympiad winner in Class 9th (CBSE)
- Versatile Experience in Software testing with more than 3.5 years in multiple business verticals and platforms. - Worked on Java and .NET platforms and currently working on python projects. - Experienced and certified in Security and Penetration testing, performance testing. - Best QA award in 2013 - Science Olympiad winner in Class 9th (CBSE)
I am a Post Graduate in Computer Science and Information Security from IITM-K Trivandrum. I am a optimistic learner and guider . I will apply all my extent to contribute in to the well being of society in the form of a young mind. I have self enthusiasm and motivational skills.
I am a Post Graduate in Computer Science and Information Security from IITM-K Trivandrum. I am a optimistic learner and guider . I will apply all my extent to contribute in to the well being of society in the form of a young mind. I have self enthusiasm and motivational skills.
Browse hundreds of experienced dance tutors across Bangalore. Compare profiles, teaching styles, reviews, and class timings to find the one that fits your goals
Select your preferred tutor and book a free demo session. Experience their teaching style, ask questions, and understand the class flow before you commit.
Once you're satisfied, make the payment securely through UrbanPro and start your dance journey! Learn at your own pace — online or in-person — and track your progress easily.
Find the best Cyber Security Tutor Training
Selected Location Do you offer Cyber Security Training?
Create Free Profile >>You can browse the list of best Cyber Security tutors on UrbanPro.com. You can even book a free demo class to decide which Tutor to start classes with.
The fee charged varies between online and offline classes. Generally you get the best quality at the lowest cost in the online classes, as the best tutors don’t like to travel to the Student’s location.
It definitely helps to join Cyber Security Training near me in The Forum Mall, Bangalore, as you get the desired motivation from a Teacher to learn. If you need personal attention and if your budget allows, select 1-1 Class. If you need peer interaction or have budget constraints, select a Group Class.
UrbanPro has a list of best Cyber Security Training
As an experienced tutor registered on UrbanPro.com specializing in Cyber Security Training, I understand...
The choice between studying cybersecurity or artificial intelligence (AI) depends on your interests,...
The better course depends on your interests, career goals, and the job market demand in your region....
Certainly! As an experienced tutor specializing in Cyber Security and registered on UrbanPro.com,...
HI Niyajuddin, The difference is cybersecurity consist of various domains in it and computer forensics is one the domain that falls under it.
1. White Hat Hacker (The Good Hacker) White hat hackers are ethical hackers. They use their skills to protect systems and find security problems before...
Penetration testing, often referred to as penetration testing or penetration testing, is a security method that simulates a cyber attack on a computer...
https://vz-3ad30922-ba4.b-cdn.net/6fb5777d-aab0-4bf5-b136-15bb9fed23d8/play_480p.mp4
Penetration testing, often referred to as penetration testing or penetration testing, is a security method that simulates a cyber attack on a computer...
https://vz-3ad30922-ba4.b-cdn.net/6fb5777d-aab0-4bf5-b136-15bb9fed23d8/play_480p.mp4