UrbanPro
true
Ravi Kumar N. Cyber Security trainer in Bangalore

Ravi Kumar N.

Electronic City, Bangalore, India - 560100.

5 Students

Referral Discount: Get ₹ 500 off when you make a payment to start classes. Get started by Booking a Demo.

Details verified of Ravi Kumar N.

Identity

Education

Know how UrbanPro verifies Tutor details

Identity is verified based on matching the details uploaded by the Tutor with government databases.

Overview

The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems.

Languages Spoken

English

Telugu

Education

Bangalore university 2009

Master of Business Administration (M.B.A.)

Address

Electronic City, Bangalore, India - 560100

Verified Info

Phone Verified

Email Verified

Facebook Verified

Report this Profile

Is this listing inaccurate or duplicate? Any other problem?

Please tell us about the problem and we will fix it.

Please describe the problem that you see in this page.

Type the letters as shown below *

Please enter the letters as show below

Teaches

Cyber Security Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

ArcSight Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

Years of Experience in ArcSight Training

6

Ethical Hacking Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

Years of Experience in Ethical Hacking Training

6

Teaching Experience in detail in Ethical Hacking Training

I have total 6 years of cyber security experience and 4+ teaching Exp.

ITIL Foundations Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

Reviews (2)

5 out of 5 2 reviews

Ravi Kumar Nalluri https://s3-ap-southeast-1.amazonaws.com/tv-prod/member/photo/1009786-small.jpg Electronic City
5.0052
Ravi Kumar Nalluri
R

Ethical Hacking

"Sir, I have completed PUC and doing Diploma in computer science (2nd year) i want to learn hacking can you help me with it? "

Ravi Kumar Nalluri
V

Ethical Hacking

"Mr Ravi kumar its nice to meet u i am a fresher i want to learn Ethical hacking and cyber security training course can u please help me "

Have you attended any class with Ravi Kumar?

FAQs

1. Which classes do you teach?

I teach ArcSight, Cyber Security, Ethical Hacking and ITIL Foundations Classes.

2. Do you provide a demo class?

Yes, I provide a free demo class.

3. How many years of experience do you have?

I have been teaching for less than a year.

Answers by Ravi Kumar (5)

Answered on 23/04/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

depends on your learning skill levels. It normally takes 4- 14 days. As you must ave already know, you need to attend 4 days course for certification.
Answers 14 Comments
Dislike Bookmark

Answered on 23/04/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Basic Linux knowledge, Networking protocols, CEH certification should be enough to start with
Answers 15 Comments
Dislike Bookmark

Answered on 23/04/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Below are the topics covered in this course. There are wide range of opportunities in Cyber Security. 1: Getting Started with Ethical Hacking This chapter covers the purpose of ethical hacking, defines the ethical hacker, and describes how to get started performing security audits. 2: System... ...more
Below are the topics covered in this course. There are wide range of opportunities in Cyber Security. 1: Getting Started with Ethical Hacking This chapter covers the purpose of ethical hacking, defines the ethical hacker, and describes how to get started performing security audits. 2: System Fundamentals This chapter presents a look at the various components that make up a system and how they are affected by security. 3: Cryptography This chapter explores the art and science of cryptography. You’ll learn how cryptography works and how it supports security. 4: Footprinting and Reconnaissance In this chapter, you’ll learn how to gain information from a target using both passive and active methods. 5: Scanning Networks This chapter shows you how to gain information about the hosts and devices on a network as well as what the information means. 6: Enumeration of Services In this chapter, you’ll learn how to probe the various services present on a given host and how to process the information to determine what it means and how to use it for later actions. 7: Gaining Access to a System This chapter shows you how to use the information gained from footprinting, Scanning, and earlier examinations in order to break into or gain access to a system. 8: Trojans, Viruses, Worms, and Covert Channels This chapter covers the varieties of malware and how each can be created, used, or defended against. 9: Sniffers This chapter discusses using packet sniffers to gather information that is flowing across the network. You’ll learn how to dissect this information for immediate or later use. 10: Social Engineering This chapter covers how to manipulate the human being in order to gain sensitive information. 11: Denial of Service This chapter includes an analysis of attacks that are designed to temporarily or permanently shut down a target. 12: Session Hijacking This chapter covers how to disrupt communications as well as take over legitimate sessions between two parties. 13: Web Servers and Web Applications This chapter explains how to break into and examine web servers and applications as well as the various methods of attack. 14: SQL Injection In this chapter, you’ll learn how to attack databases and data stores using SQL injection to alter, intercept, view, or destroy information. 15: Evading IDSs, Firewalls, and Honeypots This chapter covers how to deal with the common protective measures that a system administrator may put into place; these measures include intrusion detection system (IDSs), firewalls, and honeypots. 16: Physical Security The final chapter deals with the process of physical security and how to protect assets from being stolen, lost, or otherwise compromised
Answers 11 Comments
Dislike Bookmark

Answered on 22/01/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

You can try using wifi cracker software. Or if any of users system is already connected to router. Get that system and open router configuration details to know the password.
Answers 6 Comments
Dislike Bookmark

Teaches

Cyber Security Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

ArcSight Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

Years of Experience in ArcSight Training

6

Ethical Hacking Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

Years of Experience in Ethical Hacking Training

6

Teaching Experience in detail in Ethical Hacking Training

I have total 6 years of cyber security experience and 4+ teaching Exp.

ITIL Foundations Training
2 Students

Class Location

Online (video chat via skype, google hangout etc)

Student's Home

Tutor's Home

5 out of 5 2 reviews

Ravi Kumar Nalluri
R

Ethical Hacking

"Sir, I have completed PUC and doing Diploma in computer science (2nd year) i want to learn hacking can you help me with it? "

Ravi Kumar Nalluri
V

Ethical Hacking

"Mr Ravi kumar its nice to meet u i am a fresher i want to learn Ethical hacking and cyber security training course can u please help me "

Have you attended any class with Ravi Kumar?

Answers by Ravi Kumar N. (5)

Answered on 23/04/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

depends on your learning skill levels. It normally takes 4- 14 days. As you must ave already know, you need to attend 4 days course for certification.
Answers 14 Comments
Dislike Bookmark

Answered on 23/04/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Basic Linux knowledge, Networking protocols, CEH certification should be enough to start with
Answers 15 Comments
Dislike Bookmark

Answered on 23/04/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Below are the topics covered in this course. There are wide range of opportunities in Cyber Security. 1: Getting Started with Ethical Hacking This chapter covers the purpose of ethical hacking, defines the ethical hacker, and describes how to get started performing security audits. 2: System... ...more
Below are the topics covered in this course. There are wide range of opportunities in Cyber Security. 1: Getting Started with Ethical Hacking This chapter covers the purpose of ethical hacking, defines the ethical hacker, and describes how to get started performing security audits. 2: System Fundamentals This chapter presents a look at the various components that make up a system and how they are affected by security. 3: Cryptography This chapter explores the art and science of cryptography. You’ll learn how cryptography works and how it supports security. 4: Footprinting and Reconnaissance In this chapter, you’ll learn how to gain information from a target using both passive and active methods. 5: Scanning Networks This chapter shows you how to gain information about the hosts and devices on a network as well as what the information means. 6: Enumeration of Services In this chapter, you’ll learn how to probe the various services present on a given host and how to process the information to determine what it means and how to use it for later actions. 7: Gaining Access to a System This chapter shows you how to use the information gained from footprinting, Scanning, and earlier examinations in order to break into or gain access to a system. 8: Trojans, Viruses, Worms, and Covert Channels This chapter covers the varieties of malware and how each can be created, used, or defended against. 9: Sniffers This chapter discusses using packet sniffers to gather information that is flowing across the network. You’ll learn how to dissect this information for immediate or later use. 10: Social Engineering This chapter covers how to manipulate the human being in order to gain sensitive information. 11: Denial of Service This chapter includes an analysis of attacks that are designed to temporarily or permanently shut down a target. 12: Session Hijacking This chapter covers how to disrupt communications as well as take over legitimate sessions between two parties. 13: Web Servers and Web Applications This chapter explains how to break into and examine web servers and applications as well as the various methods of attack. 14: SQL Injection In this chapter, you’ll learn how to attack databases and data stores using SQL injection to alter, intercept, view, or destroy information. 15: Evading IDSs, Firewalls, and Honeypots This chapter covers how to deal with the common protective measures that a system administrator may put into place; these measures include intrusion detection system (IDSs), firewalls, and honeypots. 16: Physical Security The final chapter deals with the process of physical security and how to protect assets from being stolen, lost, or otherwise compromised
Answers 11 Comments
Dislike Bookmark

Answered on 22/01/2016 Learn IT Courses/IT Security Management /Ethical Hacking & Cyber Security

You can try using wifi cracker software. Or if any of users system is already connected to router. Get that system and open router configuration details to know the password.
Answers 6 Comments
Dislike Bookmark

Ravi Kumar N. conducts classes in ArcSight, Cyber Security and Ethical Hacking. Ravi Kumar is located in Electronic City, Bangalore. Ravi Kumar takes Regular Classes- at his Home and Online Classes- via online medium. He has 6 years of teaching experience . Ravi Kumar has completed Master of Business Administration (M.B.A.) from Bangalore university in 2009. He is well versed in English and Telugu. Ravi Kumar has got 2 reviews till now with 100% positive feedback.

X

Share this Profile

Recommended Profiles

Ram Reddy

Ram Reddy photo Nagarbhavi, Bangalore

Madhuri

Madhuri photo Btm Layout 2nd Stage, Bangalore

Abhinav

Abhinav photo BTM Layout, Bangalore

Wings2i IT Solutions Pvt Ltd

Wings2i IT Solutions Pvt Ltd photo Btm Layout 2nd Stage, Bangalore

Rahul

Rahul photo Nagwara, Bangalore

Sulabh Mishra

Sulabh Mishra photo HSR Layout, Bangalore

Reply to 's review

Enter your reply*

1500/1500

Please enter your reply

Your reply should contain a minimum of 10 characters

Your reply has been successfully submitted.

Certified

The Certified badge indicates that the Tutor has received good amount of positive feedback from Students.

Different batches available for this Course

This website uses cookies

We use cookies to improve user experience. Choose what cookies you allow us to use. You can read more about our Cookie Policy in our Privacy Policy

Accept All
Decline All

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 55 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 7.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more