Parag Kamra

Trainer & Security Analyst

Parag Kamra currently serves as a Security Analyst at NII and trainer at IIS. His work mainly focuses on Security Trainings, Networks and Web Application ,Vulnerability Assessment and Penetration Testing. His technical abilities span a very wide range of technologies across networks, operating systems, databases, web applications and web servers. However his specializations are Web application security and network security and more research.


  • Bachelor of Computer Applications(Maharaja Ganga Singh University, Bikaner)
  • Certified Information Security Consultant (CISC)
  • Certified Professional Hacker (CPH) (NxG)
  • Certified Professional Forensics Analyst (CPFA)
  • Digital Forensics
    • Disk Forensics with Encase
    • Memory Forensics with Volatility
    • Network Forensics
    • Email Address Tracking & Analysis
    • Data Carving
    • Live Response – Windows and Linux
  • Network Security
    • Good knowledge of TCP/IP fundamentals
    • Network Vulnerability Discovery and Exploitation.
    • Network security Audit
  • Wireless Security
    • Cracking WEP, WPA, WPA2 encryption
    • Hotspot Attack on open Wi-Fi Networks
    • Evil Twin Attack
    • Chop Chop Attack
  • Application Security
    • Well versed with OWASP-Top 10
    • WASC-Threat Classification
    • WAF Bypassing Techniques
    • Business Logic Testing
  • Compliance & Guidelines
    • ISO/IEC 27001 standards
    • Risk Assessment
    • Business Continuity Management
    • PCI-DSS
  • Forensic tools: Encase, FTK, Helix, SysInternals, Volatility, foremost, netwitness investigator, scalpel, Autopsy
  • Security tools: Nmap, Nessus, Scapy, Aircrack‐ng suite, tnscmd, IkeScan, IkeProbe, Acunetix, Netsparker, Ncat, Hping3, Metasploit, BurpSuite, Wireshark, NetCat, Cain & Abel, Dirbuster, Brutus, Nikto, SQLmap, OScanner, Beef, Vega, Scuba, Hydra
  • Parag has good communication skills and experience in presentations and trainings.
  • Certified Professional Hacker (CPH)
  • Certified Information Security Consultant (CISC)

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content