Vaibhav Verma

Security Analyst &Trainer

Vaibhav Verma currently serves as a Security Analyst at NII and trainer at IIS. His work mainly focuses on Security Trainings, Vulnerability Assessment and Penetration Testing for NII’s premier clients. His technical abilities span a very wide range of technologies across Networks, Operating Systems, Databases, Digital Forensics and Development.

Profile

  • Bachelor of Technology (Computer Science)
  • Certified Professional Forensics Analyst (CPFA)
  • Certified Professional Hacker (CPH NxG)
  • Certified Information Security Consultant (CISC)
  • Diploma in Advanced Java
  • IBM DB2 Academic Associate: DB2 Database and Application Fundamentals
  • Network Security
    • Good knowledge of TCP/IP fundamentals
    • Well versed with Metasploit Framework
    • Network Vulnerability Discovery and Exploitation
    • Database Security
    • OS Security
  • Wireless Security
    • Cracking WEP, WPA, WPA2 encryption
    • Hotspot Attack on open Wi-Fi Networks
    • Evil Twin Attack
    • Breaking Hidden SSID, MAC Filtering
  • Web Application Security
    • Well versed with OWASP-Top 10
    • WASC-Threat Classification
    • Web Application Vulnerability Assessment and Penetration testing.
    • WAF Bypassing Techniques
  • Digital Forensics
    • Disk Forensics with Encase
    • Memory Forensics with Volatility
    • Network Forensics & Log Analysis
    • Data Carving
    • Live Response – Windows and Linux
  • Programming Languages
    • C and C++
    • Java and JSP
    • Html and JavaScript
  • RDBMS
    • SQL Server 2012
    • Oracle 11g
    • IBM DB2 and IBM TDS
  • Forensic Tools: Encase, FTK, Helix, Sys Internals, The Sleuth Kit tools, WinHex, Volatility, foremost, Scalpel, Internet Evidence Finder, binwalk, bmap.
  • Security tools: Nmap, Nessus, Scapy, Aircrack-ng suite, tnscmd, IkeScan, IkeProbe, IDA, Hping3, Metasploit, BurpSuite, Wireshark, NetCat, Cain & Abel, tcpdump, PWDump, Brutus, Nikto, SQLmap, OScanner.
  • Vaibhav has good communication skills and experience in presenting several presentations and trainings.
  • Certified Professional Hacker (CPH)
  • Certified Information Security Consultant (CISC)

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content