Brijesh Zaveri

Trainer & Security Analyst

Brijesh Zaveri currently serves as a Security Analyst at NII and trainer at IIS. His work mainly focuses on Security Trainings, Networks and Web Application ,Vulnerability Assessment and Penetration Testing. His technical abilities span a very wide range of technologies across networks, operating systems, databases, web applications and web servers. However his specialization is Web application security, Forensics and IoT


  • Msc. Information Technology
  • EC Council Certified Ethical Hacker (CEH)
  • Certified Information Security Consultant (CISC)
  • Certified Professional Forensic Analyst (CPFA)
  • Diploma in Information Security and Ethical Hacking
  • Mobile Security & Forensics
    • Well Versed with Mobile Pentesting and Forensics Concept’s
  • Network Security
    • Knowledge of TCP/IP Fundamentals and Networking Concepts.
    • Wireless Security & Exploitation
  • Programming Languages
    • C, C++, C#, Java, ASP.NET, Python, Shell Scripting
  • IoT Security
    • Well versed in IoT Security and Pentesting
  • Application Security
    • Well versed with OWASP-Top 10
  • Certified Information Security Consultant (CISC).
  • Malware Analysis & Reverse Engineering
  • Mobile Security & Malware Analysis
  • Intrusion Response & Incident Management
  • Ethical Hacking

Brijesh has experience in the following technologies

  • Mobile Security
  • IoT Security
  • Web Application Security
  • Operating System’s: Windows XP/7/8, Windows Server 2008, Ubuntu Flavor’s, Kali Linux, Backtrack, IIS ToolKit, Mac OS, SIFT, DEFT, CAINE etc.
  • Network Tool’s: Nmap, Zenmap, Wireshark, Angry IP Scanner, Nessus, Metasploit etc.
  • Forensic Tool’s: Encase, FTK Imager, Sleuth Kit etc.
  • Web App Tool’s: Burpsuite, Vega, BeEF, OWASP ZAP, SqlMap, Acunetix etc.
  • Problem Solving
  • Decision Making
  • Active Listening
  • Verbal Communication

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content