Venus Rastogi

Trainer & Security Analyst

Venus Rastogi currently serves as a Security Analyst at NII and trainer at IIS. Her work mainly focuses on Security Trainings, Vulnerability Assessment, Penetration Testing and Forensics for NII’s premier clients. Her technical abilities span a very wide range of technologies across networks, operating systems, databases and web server and applications, however her specialization is network security, application security and more research.

Profile

  • Associate Diploma in Cyber Security
  • Application Security
    • Well versed with OWASP – Top Ten & WASC Threat lassifications
    • Expertise in Vulnerability Assessment and Penetration Testing of Web Applications
    • Busines logic based application testing
  • Network Security
    • Good knowledge of TCP/IP fundamentals
    • Expertise in security for Operating Systems, Databases and Web Servers
    • Network Vulnerability discovery & exploitation
    • Network security auditing
  • Wireless Security
    • Cracking WEP, WPA, WPA2 encryption
    • Evil Twin or Rogue AP Attacks
    • Cloaking Hidden SSID Attacks
  • Digital Forensics
    • Disk forensics
    • Memory Forensics
    • Network Forensics & Log Analysis
    • Live Response - Windows & Linux
  • Compliance
    • ISO / IEC 27001 standards
    • Risk Assessment
    • Business Continuity Management
    • PCI-DSS

Venus has been exposed to a variety of different applications and network environments which have helped her enhance her understanding and technical skills.

  • Operating Systems: Windows XP/2000/2003/Vista/7/8/10/Linux

While conducting security assessments and researches, Venus has familiarized herself with many of the popular tools available. Few tools she regularly uses are:

  • Nmap, Nessus, Aircrack‐ng suite, Hping3, Metasploit, BurpSuite, Wireshark, NetCat, tcpdump, Nikto, SQLmap, Lynis, Yasat
  • Forensic Tools: Encase, FTK, Volatility, sysinternal,etc
  • Mobile Application Testing (Android)
  • Digital Forensics
  • Database & Server Security
  • Have good communication skills by being a trainer
  • Certified Professional Hacker (CPH)
  • Certified Information Security Consultant (CISC)
  • Certified Ethical Hacker (CEH)

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content