Ravi Sharma

Trainer & Security Analyst

Ravi Sharma currently serves as a Security Analyst at NII and trainer at IIS. His work mainly focuses on Security Trainings, Vulnerability Assessment and Penetration Testing for NII’s premier clients. His technical abilities span a very wide range of technologies across networks, operating systems, databases and web server and applications, however his specializations are network security, application security and research.

Profile

  • B.TECH (Computer Science) from Punjab Technical University
  • Certified Information Security Consultant(CISC)
  • Certified Professional Hacker(CPH)
  • Certified Digital Forensics Analyst(CPFA)
  • Application Security
    • Well versed with OWASP-Top 10 and WASC Threat classifications
    • Expertise in vulnerability assessment and penetration testing of web applications
    • Also exploit the latest vulnerabilities like POODLE, SHELLSHOCK,HEARTBLEED , LDAP Injection
  • Network Security
    • Good knowledge of TCP/IP fundamentals
    • Expertise in security for operating system, databases, web servers
  • Wireless Security
    • Cracking WEP, WPA, WPA2 encryption
  • Digital Forensics
    • Disk Forensics with Encase
    • Memory Forensics with Volatility
    • Network Forensics & Log Analysis
    • Email Address Tracking & Analysis
    • Live Response – Windows and Linux
  • Penetration Testing 2.0
    • Untraditional Social Engineering Attacks
    • Business Logic Tests
  • Ravi has been exposed to a variety of different applications and network environments which have helped him enhance his understanding and technical skills.
  • Operating Systems: Windows XP/2000/2003/Vista/7
  • While conducting security trainings, Ravi has familiarized himself with many of the popular tools available. Few tools he regularly uses are:
  • Nmap, Nessus, Aircrack‐ng suite, Dmitry, Hping3, Metasploit, BurpSuite, Wireshark, NetCat, Cain & Abel, tcpdump, PWDump, Nikto, SQLmap, whatweb, Brutus, bleedout, and PE tools.
  • Experience in presenting presentations and trainings.

Certified Professional Hacker(CPH)

Certified Information Security Consultant(CISC)

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content