1 Student Reviews
I am currently pursuing MCA from MIT-WPU and in the internship period. I have also worked as Associate Security Consultant in Seracle company. I am EC-Council Certified Security Analyst(ECSA) and EC-Council Certified Ethical Hacker(CEH). I am also a researcher and have got first prize in National as well as International Student Research paper conference. I am also Certified Internet Investigation Specialist by Asian School of cyber laws. My key skills are: 1) Networking 2) Penetration Testing 3) Vulnerability Analysis. 4) Vulnerability Management.
I am currently pursuing MCA from MIT-WPU and in the internship period. I have also worked as Associate Security Consultant in Seracle company. I am EC-Council Certified Security Analyst(ECSA) and EC-Council Certified Ethical Hacker(CEH). I am also a researcher and have got first prize in National as well as International Student Research paper conference. I am also Certified Internet Investigation Specialist by Asian School of cyber laws. My key skills are: 1) Networking 2) Penetration Testing 3) Vulnerability Analysis. 4) Vulnerability Management.
I can teach each and every topics very easily and make it stronger for the students. I believe in Practical Training. I can give students 100% Practical Training.
I can teach each and every topics very easily and make it stronger for the students. I believe in Practical Training. I can give students 100% Practical Training.
Work:- Currently Working as a threat Analyst in a security firm in malware analysis and reverse engineering domain for developing snort based signatures. Achievements;- 12+ sites reported for SQL vulnerabilities. Certified Ethical Hacker V10 Skills:- Penetration Testing , Ethical Hacking , Cyber Security, Nessus, Burpsuite, Nmap, Metasploit, New Cutting Edge Technology.
Work:- Currently Working as a threat Analyst in a security firm in malware analysis and reverse engineering domain for developing snort based signatures. Achievements;- 12+ sites reported for SQL vulnerabilities. Certified Ethical Hacker V10 Skills:- Penetration Testing , Ethical Hacking , Cyber Security, Nessus, Burpsuite, Nmap, Metasploit, New Cutting Edge Technology.
CISM-certified Cybersecurity Expert with 15+ years of industry experience, currently leading 1300+ professionals in enterprise security. Expert trainer in incident response, threat hunting, and security implementations. Created 110+ security playbooks and managed 4600+ identity security deployments. Provides practical, placement-focused training backed by real-world expertise.
CISM-certified Cybersecurity Expert with 15+ years of industry experience, currently leading 1300+ professionals in enterprise security. Expert trainer in incident response, threat hunting, and security implementations. Created 110+ security playbooks and managed 4600+ identity security deployments. Provides practical, placement-focused training backed by real-world expertise.
I have 4+ years of experience as a Cybersecurity Trainer and Personal Mentor, delivering industry-oriented training to 100+ students, including college students, freshers , and working professionals transitioning into cybersecurity roles. My teaching focuses on hands-on, practical learning aligned with real-world security operations. I train students in Vulnerability Management, covering the complete lifecycle—from vulnerability discovery and risk assessment to prioritization, reporting, remediation validation, and closure. I provide in-depth training in Application Security, including OWASP Top 10 vulnerabilities, secure coding concepts, and business logic flaws, with practical demonstrations using real applications and test environments. In Penetration Testing, I conduct structured training on Web Application, API, and Network Penetration , guiding students through reconnaissance, exploitation, post-exploitation analysis, and professional reporting practices. Students learn how attacks work in real production-like environments and how to communicate findings effectively to technical and non-technical stakeholders. I also train students on Vulnerability Remediation and Patch Management, teaching how to interpret scan results, recommend accurate fixes, validate remediation, and coordinate with development and infrastructure teams. Additionally, I provide practical exposure to Web Application Firewall (WAF) management, including rule tuning, attack detection, false-positive handling, and traffic monitoring. As a mentor, I offer personal guidance, interview preparation, resume support, and real-world insights, ensuring students are not only technically strong but also job-ready.
I have 4+ years of experience as a Cybersecurity Trainer and Personal Mentor, delivering industry-oriented training to 100+ students, including college students, freshers , and working professionals transitioning into cybersecurity roles. My teaching focuses on hands-on, practical learning aligned with real-world security operations. I train students in Vulnerability Management, covering the complete lifecycle—from vulnerability discovery and risk assessment to prioritization, reporting, remediation validation, and closure. I provide in-depth training in Application Security, including OWASP Top 10 vulnerabilities, secure coding concepts, and business logic flaws, with practical demonstrations using real applications and test environments. In Penetration Testing, I conduct structured training on Web Application, API, and Network Penetration , guiding students through reconnaissance, exploitation, post-exploitation analysis, and professional reporting practices. Students learn how attacks work in real production-like environments and how to communicate findings effectively to technical and non-technical stakeholders. I also train students on Vulnerability Remediation and Patch Management, teaching how to interpret scan results, recommend accurate fixes, validate remediation, and coordinate with development and infrastructure teams. Additionally, I provide practical exposure to Web Application Firewall (WAF) management, including rule tuning, attack detection, false-positive handling, and traffic monitoring. As a mentor, I offer personal guidance, interview preparation, resume support, and real-world insights, ensuring students are not only technically strong but also job-ready.
CEH | CRTP | ISO 27001| CASE Certified Information Security Professional with 6+ years of experience in information security and services industry, currently working as a Cyber Security Engineer at F. Hoffmann-La Roche AG a Switzerland based pharmaceutical company. Previously served in EY, Accenture and different on-site clients. • Deeply engaged in end-to-end execution and management of security projects, perform risk assessment, Vulnerability Management, providing remedial solutions and handling project teams of different continents. • Holds a Master’s degree in information security. Responsibility and Engagement details I was engaged so-far: ▪ Worked as a security consultant for a multinational corporation. Conducted a wide range of security testing approaches, tools, and techniques to carry out baseline security testing for a major international financial services business. Worked together with the security department of the organization to conduct thorough evaluations of key apps and to make useful suggestions for enhancing overall security posture. Successfully found and fixed a number of security flaws, particularly those involving web apps and APIs, to help safeguard the company's data and systems from potential cyber attacks. ▪ Conducted an annual security assessment for global tech industry. Uncovered critical security issues, including XSS, SQL injection, and others, which could have potentially exposed sensitive data and systems to cyber threats. ▪ Conducted penetration testing and vulnerability assessments for web application security penetration testing, API security assessment for one of the leading cargo industry. Found several vulnerabilities in these assessments. Deliver high quality security assessment report with proper explanations and recommendations ▪ Conducted a security assessment for a leading African payment company, with a specific focus on a company mergers and acquisitions engagement. I was conducted penetration test on public-facing web applications, mobile application which were due to launch soon. With a through assessment, I identified a critical vulnerability in one of the applications that could have exposed sensitive data and systems to cyber threats. I promptly reported the issue to the company's security team, enabling them to remediate the vulnerability before the launch. The assessment and report submitted by him helped the company to proactively address security concerns, ensuring that their web applications were secure and protected from potential cyber-attacks ▪ Performed penetration testing on 100+ business Web applications based on OWASP guideline. Had deliver services to banking/payment industries, oil and gas industry, IT industries, healthcare Industry, ecommerce etc. ▪ Reported other major critical findings for the African financial corporation such as: broken authorization, XSS, sql injection, OTP authentication bypass, OTP flooding, IDOR vulnerability on Internet facing applications, SSL Pinning bypass, SQLite db enumeration for a banking mobile application. ▪ Performed vulnerability assessment and penetration testing for internal network of the organization. Scan the infrastructure with the help of Nessus, Nmap, and exploit the identified vulnerabilities with the help of Metasploit, Nmap etc. Performed wireless network security analysis, WiFi penetration testing with the help of Airomon-Ng, Airodump-Ng, Aireplay-Ng, ARP spoofing, poisoning using Ettercap etc ▪ Conducted social engineering by launching phishing campaigns for an African financial services statutory body, Universities etc. With the expertise in social engineering techniques and knowledge of the latest phishing trends, I was able to simulate realistic scenarios to test the awareness and response of employees. This activity helped organizations to improve their security posture and protect against the risk of data breaches and financial losses. ▪ Engaged in a Red Teaming activity, performing AD vulnerability assessment, with the help of Bloodhound, and AD-Command. Reported several outdated and misconfigured policies, and found more than one domain admin account, etc. ▪ Recently engaged in few AWS config review projects, highlighted several mis-configured entities, deliver best practices according to CIS benchmark and AWS best-practice guide lines.
CEH | CRTP | ISO 27001| CASE Certified Information Security Professional with 6+ years of experience in information security and services industry, currently working as a Cyber Security Engineer at F. Hoffmann-La Roche AG a Switzerland based pharmaceutical company. Previously served in EY, Accenture and different on-site clients. • Deeply engaged in end-to-end execution and management of security projects, perform risk assessment, Vulnerability Management, providing remedial solutions and handling project teams of different continents. • Holds a Master’s degree in information security. Responsibility and Engagement details I was engaged so-far: ▪ Worked as a security consultant for a multinational corporation. Conducted a wide range of security testing approaches, tools, and techniques to carry out baseline security testing for a major international financial services business. Worked together with the security department of the organization to conduct thorough evaluations of key apps and to make useful suggestions for enhancing overall security posture. Successfully found and fixed a number of security flaws, particularly those involving web apps and APIs, to help safeguard the company's data and systems from potential cyber attacks. ▪ Conducted an annual security assessment for global tech industry. Uncovered critical security issues, including XSS, SQL injection, and others, which could have potentially exposed sensitive data and systems to cyber threats. ▪ Conducted penetration testing and vulnerability assessments for web application security penetration testing, API security assessment for one of the leading cargo industry. Found several vulnerabilities in these assessments. Deliver high quality security assessment report with proper explanations and recommendations ▪ Conducted a security assessment for a leading African payment company, with a specific focus on a company mergers and acquisitions engagement. I was conducted penetration test on public-facing web applications, mobile application which were due to launch soon. With a through assessment, I identified a critical vulnerability in one of the applications that could have exposed sensitive data and systems to cyber threats. I promptly reported the issue to the company's security team, enabling them to remediate the vulnerability before the launch. The assessment and report submitted by him helped the company to proactively address security concerns, ensuring that their web applications were secure and protected from potential cyber-attacks ▪ Performed penetration testing on 100+ business Web applications based on OWASP guideline. Had deliver services to banking/payment industries, oil and gas industry, IT industries, healthcare Industry, ecommerce etc. ▪ Reported other major critical findings for the African financial corporation such as: broken authorization, XSS, sql injection, OTP authentication bypass, OTP flooding, IDOR vulnerability on Internet facing applications, SSL Pinning bypass, SQLite db enumeration for a banking mobile application. ▪ Performed vulnerability assessment and penetration testing for internal network of the organization. Scan the infrastructure with the help of Nessus, Nmap, and exploit the identified vulnerabilities with the help of Metasploit, Nmap etc. Performed wireless network security analysis, WiFi penetration testing with the help of Airomon-Ng, Airodump-Ng, Aireplay-Ng, ARP spoofing, poisoning using Ettercap etc ▪ Conducted social engineering by launching phishing campaigns for an African financial services statutory body, Universities etc. With the expertise in social engineering techniques and knowledge of the latest phishing trends, I was able to simulate realistic scenarios to test the awareness and response of employees. This activity helped organizations to improve their security posture and protect against the risk of data breaches and financial losses. ▪ Engaged in a Red Teaming activity, performing AD vulnerability assessment, with the help of Bloodhound, and AD-Command. Reported several outdated and misconfigured policies, and found more than one domain admin account, etc. ▪ Recently engaged in few AWS config review projects, highlighted several mis-configured entities, deliver best practices according to CIS benchmark and AWS best-practice guide lines.
Sri Harsha is a Cyber Security and Artificial Intelligence expert with great experience in maintaining complex Machine Learning systems. He is the founder of ICyberSol and SocAlty where they build Cyber Security and AI solutions for businesses and startups. As an Intel software innovator, he drives the AI innovation and been an active contributor to the Intel AI and Atal Innovation missions.
Sri Harsha is a Cyber Security and Artificial Intelligence expert with great experience in maintaining complex Machine Learning systems. He is the founder of ICyberSol and SocAlty where they build Cyber Security and AI solutions for businesses and startups. As an Intel software innovator, he drives the AI innovation and been an active contributor to the Intel AI and Atal Innovation missions.
A passionate individual with an eye for detail and a knack for problem solving, I have a unique set of skills that have been honed through my educational pursuits, work experience, and hobbies. I have valuable experience while staying calm, collected, and professional under demanding conditions. With a knack for public relations and reputation management, I am also a Certified DevOps Associate, Cybersecurity Researcher, and CERTFIED Ethical Hacker.
A passionate individual with an eye for detail and a knack for problem solving, I have a unique set of skills that have been honed through my educational pursuits, work experience, and hobbies. I have valuable experience while staying calm, collected, and professional under demanding conditions. With a knack for public relations and reputation management, I am also a Certified DevOps Associate, Cybersecurity Researcher, and CERTFIED Ethical Hacker.
Global Techsys Learning Number one institute in Pune, provides an SAP Training, Data Science ,Software Testing ,Salesforce Training.Dot Net Training ,Power BI Training with Placement Here at Global Techsys provide various SAP Modules like SAP ABAP, SAP FICO, SAP MM, SAP WM, SAP PP, SAP PM, SAP SD, SAP BASIS . ,Software Testing ,Data Science ,Salesforce . Candidates looking for online Training in USA,Saudi Arabia,Dubai,South Africa etc., We also provides SAP Real Time Training with step by step Real Time SAP scenarios of Real Time Project along with Interview Handling Skills & Resume building skills. Modes of Training in Global techsys: • Class Room Training • Online Training • Weekend Batches & • Real Time Project Training Salient Features: • Free Training Certification Material (SOFT COPIES) • Certified faculty members with over 10 years of Industrial experience. •Highest Placement record in Pune.
Global Techsys Learning Number one institute in Pune, provides an SAP Training, Data Science ,Software Testing ,Salesforce Training.Dot Net Training ,Power BI Training with Placement Here at Global Techsys provide various SAP Modules like SAP ABAP, SAP FICO, SAP MM, SAP WM, SAP PP, SAP PM, SAP SD, SAP BASIS . ,Software Testing ,Data Science ,Salesforce . Candidates looking for online Training in USA,Saudi Arabia,Dubai,South Africa etc., We also provides SAP Real Time Training with step by step Real Time SAP scenarios of Real Time Project along with Interview Handling Skills & Resume building skills. Modes of Training in Global techsys: • Class Room Training • Online Training • Weekend Batches & • Real Time Project Training Salient Features: • Free Training Certification Material (SOFT COPIES) • Certified faculty members with over 10 years of Industrial experience. •Highest Placement record in Pune.
I am here to guide you through various courses. I am a passionate cyber security enthusiast. I am EC Council Certified Ethical Hacker and Cybrary Inc. certified Penetration Tester. I am planning to pursue my post graduation in Cyber security from the United States. I am here to help people how cyber security is changing the world each day. I have a training experience of 2 years. I have a Cyber Security course on Udemy with more than 45000 students happily enjoying the course. It's been listed in TOP CYBER SECURITY COURSES.
I am here to guide you through various courses. I am a passionate cyber security enthusiast. I am EC Council Certified Ethical Hacker and Cybrary Inc. certified Penetration Tester. I am planning to pursue my post graduation in Cyber security from the United States. I am here to help people how cyber security is changing the world each day. I have a training experience of 2 years. I have a Cyber Security course on Udemy with more than 45000 students happily enjoying the course. It's been listed in TOP CYBER SECURITY COURSES.
Browse hundreds of experienced dance tutors across Pune. Compare profiles, teaching styles, reviews, and class timings to find the one that fits your goals
Select your preferred tutor and book a free demo session. Experience their teaching style, ask questions, and understand the class flow before you commit.
Once you're satisfied, make the payment securely through UrbanPro and start your dance journey! Learn at your own pace — online or in-person — and track your progress easily.
Find the best Cyber Security Tutor Training
Selected Location
Do you offer Cyber Security Training?
Create Free Profile >>You can browse the list of best Cyber Security tutors on UrbanPro.com. You can even book a free demo class to decide which Tutor to start classes with.
The fee charged varies between online and offline classes. Generally you get the best quality at the lowest cost in the online classes, as the best tutors don’t like to travel to the Student’s location.
It definitely helps to join Cyber Security Training near me in USA, as you get the desired motivation from a Teacher to learn. If you need personal attention and if your budget allows, select 1-1 Class. If you need peer interaction or have budget constraints, select a Group Class.
The average salary for Cyber Security Analyst is ₹5,50,000 per year in the India.
They should start with ethical hacking training, later they can learn network security, and they will...
Hi Srikanth, According to me Never ever. Because this is the era of technology. So there are so many...
Introduction: As an experienced tutor on UrbanPro.com, let's draw parallels between the prerequisites...
As an experienced tutor registered on UrbanPro.com specializing in Cyber Security Training, I understand...
1. White Hat Hacker (The Good Hacker) White hat hackers are ethical hackers. They use their skills to protect systems and find security problems before...
https://vz-3ad30922-ba4.b-cdn.net/6fb5777d-aab0-4bf5-b136-15bb9fed23d8/play_480p.mp4
https://vz-3ad30922-ba4.b-cdn.net/6fb5777d-aab0-4bf5-b136-15bb9fed23d8/play_480p.mp4
1. White Hat Hacker (The Good Hacker) White hat hackers are ethical hackers. They use their skills to protect systems and find security problems before...
https://vz-3ad30922-ba4.b-cdn.net/6fb5777d-aab0-4bf5-b136-15bb9fed23d8/play_480p.mp4