55 Student Reviews
I am a teacher/engineer/entrepreneur. I am alumni of BITS Pilani and IIM Bangalore. I am a CISA and CISSP for the last 20 years. I have been teaching CISA students at ISACA Bangalore for more than 10 years. I have been independently teaching CISSP students for more than 5 years. I teach, because that helps me keep sharp and updated.
I am a teacher/engineer/entrepreneur. I am alumni of BITS Pilani and IIM Bangalore. I am a CISA and CISSP for the last 20 years. I have been teaching CISA students at ISACA Bangalore for more than 10 years. I have been independently teaching CISSP students for more than 5 years. I teach, because that helps me keep sharp and updated.
I have good Knowledge and Experience on the below mentioned areas, 1. Computer Basics, 2. Networking Concepts 3. SIEM ArcSight 4. Host DLP, Antivirus and Encryption (mcafee) 5. Network Security Concept.
I have good Knowledge and Experience on the below mentioned areas, 1. Computer Basics, 2. Networking Concepts 3. SIEM ArcSight 4. Host DLP, Antivirus and Encryption (mcafee) 5. Network Security Concept.
Infosec specialist and a manager whose qualifications include a degree in computer science and engineering; and detailed knowledge of security tools, technologies and best practices. Demonstrating experience in Information Security services I teach majority of the cyber security concepts like Web Application Firewall administration/Implementation/Operations, Platform Support and management, ISO27001:2013 Lead Implementer, SIEM Administration, CEH, log source integration, global threat monitoring, Vulnerability Management, patch management, reporting, Risk and compliance, and escalation of security events Certifications: ISO27001:2013 Certified Lead Implementer Professional IBM Certified Deployment Professional Security QRadar SIEM V7.1 Certified Ethical hacker (CEH v.7) ITIL 2011 Foundation RSA Envision Certified Systems Engineer (4.0) Splunk Certified Power User
Infosec specialist and a manager whose qualifications include a degree in computer science and engineering; and detailed knowledge of security tools, technologies and best practices. Demonstrating experience in Information Security services I teach majority of the cyber security concepts like Web Application Firewall administration/Implementation/Operations, Platform Support and management, ISO27001:2013 Lead Implementer, SIEM Administration, CEH, log source integration, global threat monitoring, Vulnerability Management, patch management, reporting, Risk and compliance, and escalation of security events Certifications: ISO27001:2013 Certified Lead Implementer Professional IBM Certified Deployment Professional Security QRadar SIEM V7.1 Certified Ethical hacker (CEH v.7) ITIL 2011 Foundation RSA Envision Certified Systems Engineer (4.0) Splunk Certified Power User
I'm a cybersecurity professional with hands-on experience in penetration testing, Linux, and threat analysis. I've trained elite Cyber Commandos at Rashtriya Raksha University (RRU) and worked at IBM Bangalore in a core cybersecurity role. I offer practical, lab-based training—including OSCP mentoring—focused on red teaming, ethical hacking, and real-world cyber defence.
I'm a cybersecurity professional with hands-on experience in penetration testing, Linux, and threat analysis. I've trained elite Cyber Commandos at Rashtriya Raksha University (RRU) and worked at IBM Bangalore in a core cybersecurity role. I offer practical, lab-based training—including OSCP mentoring—focused on red teaming, ethical hacking, and real-world cyber defence.
An IT security consultant and researcher with over 7+ years of expertise into Network,Web pen-testing and vulnerability management. Competent and skilled IT & Web Security Researcher. Apart from professional experience, have a Passion and diligence for hacking, finding new bugs and vulnerabilities.Having work knowledge in reputed organisations like Finance, Government domain, etc across North America Europe and APAC regions. Certifications : CEH Appspider pro InsightVM Nexpose Qualys VMDR Qualys PCI Qualys Container security AREAS OF EXPERTISE : * Web-App Penetration Testing * Mobile Penetration Testing. * Network Penetration Testing * Vulnerability Researcher TOOLS : VA/PT: Burp Suite, Metasploit, Nmap, SQL Map,WireShark, Snort, Nikto, Qualys VMDR,PCI,Appspider, insight vm,Nexpose etc
An IT security consultant and researcher with over 7+ years of expertise into Network,Web pen-testing and vulnerability management. Competent and skilled IT & Web Security Researcher. Apart from professional experience, have a Passion and diligence for hacking, finding new bugs and vulnerabilities.Having work knowledge in reputed organisations like Finance, Government domain, etc across North America Europe and APAC regions. Certifications : CEH Appspider pro InsightVM Nexpose Qualys VMDR Qualys PCI Qualys Container security AREAS OF EXPERTISE : * Web-App Penetration Testing * Mobile Penetration Testing. * Network Penetration Testing * Vulnerability Researcher TOOLS : VA/PT: Burp Suite, Metasploit, Nmap, SQL Map,WireShark, Snort, Nikto, Qualys VMDR,PCI,Appspider, insight vm,Nexpose etc
I am am influence student of mixed martial arts of white belt My achmoplosiment are undergraduate a basic trained of cybersecurity course also quiet good knowldge of data science
I am am influence student of mixed martial arts of white belt My achmoplosiment are undergraduate a basic trained of cybersecurity course also quiet good knowldge of data science
I'm an engineer working with Amazon. I have a degree in ECE but keep doing courses in new tech like cloud. My essential skills are I can teach mathematics and science upto class 12. I also like to teach cloud, cyber security and new tech concepts like blockchain and GenAI
I'm an engineer working with Amazon. I have a degree in ECE but keep doing courses in new tech like cloud. My essential skills are I can teach mathematics and science upto class 12. I also like to teach cloud, cyber security and new tech concepts like blockchain and GenAI
I am a ethical hacker and i am giving online tuition since 2 year i am certified in bachelor in technology my key skills are information gathering, mitm , spoofing, brute force attack , social engineering etc..
I am a ethical hacker and i am giving online tuition since 2 year i am certified in bachelor in technology my key skills are information gathering, mitm , spoofing, brute force attack , social engineering etc..
I'm a Subject Matter Expert | Who is certified CEH,CEI from Ec-Council, I'm have knowledge on Web Application & API Pentesting | Network Pentesting | Mobile Pentesting | Firewall Configuration | Cloud Security Testing. I have 8 years of experience in IT and Cyber Security, where I have experience in handling client end to end and indepth Pentesting in BlackHat and GrayHat Pentesting.
I'm a Subject Matter Expert | Who is certified CEH,CEI from Ec-Council, I'm have knowledge on Web Application & API Pentesting | Network Pentesting | Mobile Pentesting | Firewall Configuration | Cloud Security Testing. I have 8 years of experience in IT and Cyber Security, where I have experience in handling client end to end and indepth Pentesting in BlackHat and GrayHat Pentesting.
I can teach every topic very easily and make it stronger for the students.
I can teach every topic very easily and make it stronger for the students.
I am a Cybersecurity professional with 10+ years of experience across defensive and offensive security domains, including Penetration Testing, digital forensics, incident response, threat intelligence, vulnerability management, and product security. Currently working at Siemens, I support organisations in maintaining Information Security Management System posture, implementing security controls, and performing business impact assessments. I am passionate about sharing my learnings and real-world experiences with others, and I strongly believe that practical knowledge and continuous learning are key to building strong cybersecurity professionals.
I am a Cybersecurity professional with 10+ years of experience across defensive and offensive security domains, including Penetration Testing, digital forensics, incident response, threat intelligence, vulnerability management, and product security. Currently working at Siemens, I support organisations in maintaining Information Security Management System posture, implementing security controls, and performing business impact assessments. I am passionate about sharing my learnings and real-world experiences with others, and I strongly believe that practical knowledge and continuous learning are key to building strong cybersecurity professionals.
Security. Network security. Mathematics. Science. History. Political science.
Security. Network security. Mathematics. Science. History. Political science.
Infosec Labs is information security consulting firm specializing in delivering high quality services through expert driven manual penetration testing. A core focus on Penetration Testing and auditing services for your enterprise web applications, mobile apps, and Internet Of Things, to ensure that your data stays secure and your users trust you with their personal information. Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.Our Penetration Testing and Security Auditing has proven time and time again to be an effective security assessment of business IT infrastructure. Infosec Labs Provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.
Infosec Labs is information security consulting firm specializing in delivering high quality services through expert driven manual penetration testing. A core focus on Penetration Testing and auditing services for your enterprise web applications, mobile apps, and Internet Of Things, to ensure that your data stays secure and your users trust you with their personal information. Information security is crucial to every aspect of your business – operational efficiency, profitability, business continuity, customer confidence, brand loyalty, protection against fraud and meeting regulatory requirements.Our Penetration Testing and Security Auditing has proven time and time again to be an effective security assessment of business IT infrastructure. Infosec Labs Provides in-depth security assessments, risk management and compliance solutions to help you keep your confidential information safe and your critical systems secure. We’re innovative, flexible and supportive, helping you through any information security issues to deliver real business benefits and excellent value.
ntelleSecure specializes in Information Security, Governance, Risk & Compliance. With presence in India and the Middle East, IntelleSecure carries the experience and presents the expertise on everything from security awareness to creating security policies; from penetration testing to disaster recovery planning; from ISMS implementation to Sarbanes Oxley compliance!
ntelleSecure specializes in Information Security, Governance, Risk & Compliance. With presence in India and the Middle East, IntelleSecure carries the experience and presents the expertise on everything from security awareness to creating security policies; from penetration testing to disaster recovery planning; from ISMS implementation to Sarbanes Oxley compliance!
Java Bucket com provides IT Security Management Training
Java Bucket com provides IT Security Management Training
Browse hundreds of experienced dance tutors across Bangalore. Compare profiles, teaching styles, reviews, and class timings to find the one that fits your goals
Select your preferred tutor and book a free demo session. Experience their teaching style, ask questions, and understand the class flow before you commit.
Once you're satisfied, make the payment securely through UrbanPro and start your dance journey! Learn at your own pace — online or in-person — and track your progress easily.
Find the best IT Security Management Tutor Training
Selected Location Do you offer IT Security Management Training?
Create Free Profile >>You can browse the list of best IT Security Management tutors on UrbanPro.com. You can even book a free demo class to decide which Tutor to start classes with.
The fee charged varies between online and offline classes. Generally you get the best quality at the lowest cost in the online classes, as the best tutors don’t like to travel to the Student’s location.
It definitely helps to join IT Security Management Training near me in Silk Board Junction, Bangalore, as you get the desired motivation from a Teacher to learn. If you need personal attention and if your budget allows, select 1-1 Class. If you need peer interaction or have budget constraints, select a Group Class.
UrbanPro has a list of best IT Security Management Training
Determining the "best" hacker in the world is subjective and challenging because hacking involves...
Certainly! As an experienced tutor specializing in Cyber Security and registered on UrbanPro.com,...
Hi Sunil, According to me both are the same ethical hackers and cyber security experts. The difference...
I teach from scratch , if you want to learn on own first go with networking basics ( basic concepts of...
Program Highlights: * Computer Fundamentals & IT Applications * Core Java * Web & Graphics Designing * Python Language *...
How do I become a hacker? I have received this question countless times on formal and informal occasions. I feel the need to put a small sum up on the...
Definition of Computer Ethics Ethics are a set of moral principles that govern an individual or a group on what is acceptable behaviour while using...
Replace these popular apps with secure and open-source alternatives to protect your data:WhatsApp → SignalGoogle Drive → Nextcloud/SeafileX →...
Computer activities carried out by means computer or the internet.Cybercriminals may use computer technology to access personal information, business trade...