Naresh Chandra Singh

Trainer & Security Analyst

Naresh Singh currently serves as a Security Analyst at NII and trainer at IIS. His work mainly focuses on Security Trainings, Vulnerability Assessment, Penetration Testing and Forensics for NII’s premier clients.His technical abilities span a very wide range of technologies across networks, operating systems, databases and web server and applications, however his specialization is, web application security, network security and more research


  • MSc (Information Technology)
  • Certified Ethical Hacker
  • Application Security
    • Well versed with OWASP – Top Ten, SANS 25 & WASC Threat classifications
    • Mobile Application security with OWASP Mobile Top 10
    • Expertise in vulnerability assessment & penetration testing
    • Bug bounty & exploitation
  • Network Security
    • Good knowledge of TCP/IP fundamentals
    • Expertise in security for Operating Systems, Databases and Web Servers
    • Network vulnerability discovery & exploitation
    • Network security event management
    • Secure Infrastructure Development
  • Wireless Security
    • Cracking WEP, WPA, WPA2 encryption
    • Evil Twin or Rogue AP Attacks
    • Cloaking Hidden SSID attacks
    • Secure Wireless Infrastructure Development
  • Compliance
    • ISO/IEC 27001 standards
    • Business Continuity Management
    • PCI-DSS

Naresh has been exposed to a variety of different applications and network environments which have helped his enhance his understanding and technical skills.

  • Operating Systems: Windows XP/2000/2003/Vista/7/10/Linux

While conducting trainingss, Naresh has familiarized himself with many of the popular tools available. Few tools he regularly uses are:

  • Nmap, Maltego, Dmitry, Whatweb, LBD, Recon-ng, Nessus, Netsparker, Acunetix, Retina, IBMAppSecScan, Snorby, Archnai, Snort, Splunk, Owaspzap, Spartascanner, W3af, Nagios, Security Onion, Aircrack‐ng suite, Dmitry, Hping3,Scapy, Metasploit, BurpSuite, Owasp Webscarab,Punkspider, Wireshark, NetCat, Tcpdump, , Nikto, SQLmap, Uniscan, Open vas, Hashcat, Armitage , and other PT tools.
  • Forensics Tools: Sleuth kit, Autopsy, FTK, sysinternal etc
  • Developed skills on Mobile Application Security Testing
  • Developed skills on SPLUNK and packet capturing/filtering and SNORT
  • Developed skills on Cyber Forensics
  • Developed skills on Scripting Languages
  • Experience in Webinar, seminar, onsite & classroom trainings.
  • Conducted college & corporate workshops
  • Certified Ethical Hacker

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content