Lionel Faleiro

Trainer & Security Analyst

Lionel Faleiro currently serves as a Security Analyst at NII and trainer at IIS. His work mainly focuses on Security Trainings, Vulnerability Assessment, Penetration Testing, Threat Hunting and Forensics for NII’s premier clients. His technical abilities span a very wide range of technologies across Networks, Operating Systems, Digital Forensics and Development, however his specialization is Intrusion Response, Threat Hunting, Malware Analysis and Research


  • Msc. Information Technology
  • EC Council Certified Ethical Hacker (CEH)
  • EC Council Certified Security Analyst (ECSA)
  • Microsoft Certified Technology Specialist
  • Forensics
    • Good understanding of Computer and Mobile Forensics
    • Well versed with various forensics tools like FTK, Prodiscover, Autopsy, Magnet
    • Adept with performing Log Analysis from various log sources like Operating Systems, Application and Network Devices
  • Network Security
    • Good understanding of Networking and Firewall concepts, including Network Address Tables, Subnets, Proxy services and TCP/IP
  • Database Security
    • Good understanding of databases like MySQL, MongoDB
  • Malware Analysis & Reverse Engineering
    • Good understanding of x86 Assembly, Static and Dynamic Malware Analysis tools
  • Programming Languages:
    • C, C++, HTML, PHP, Mysql, Python, oracle, JavaScript, HTML, XML
  • Application Security
    • Well versed with OWASP-Top 10
  • Certified Information Security Consultant (CISC).
  • Malware Analysis & Reverse Engineering
  • Mobile Security & Malware Analysis
  • Intrusion Response & Incident Management
  • Ethical Hacking

Lionel has been exposed to a variety of different applications and network environments which have helped his enhance his understanding and technical skills.

  • Operating Systems: Windows (9X/XP/7/8/10), Windows Server (2003/2008/2012), Linux (Ubuntu, Kali), Mac OS Server
  • MDM: Blackberry Enterprise Server
  • Data Storage / Databases: Hadoop, MySQL
  • Programming: Java, CSS, HTML, Objective C, Android & Hybrid Mobile Application Development, Bash Scripting.
  • Network Components: Firewalls, IDS(Snort), Network Attached Storage
  • Network Monitoring Tools: Wireshark, TCPDump, TShark
  • Forensics Tools: SIFT, FTK, Photorec, Caine, Sysinternals tools.
  • Malware Analysis: Static & Dynamic Malware Analysis
  • Problem Solving
  • Decision Making
  • Active Listening
  • Verbal Communication

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content