Tutor HuntSubjects

Srikanth

Srikanth
Srikanth
Tutor
Bangalore, Karnataka
Home Town: Bangalore
Member Since: 26-11-2013
Last Login: 10 years ago
Response Rate: no data
Expected Response : no data

Qualifications

The Facilitator is post graduate with more than a decade of experience in IT Infrastructure, Network, Security and Technical Support. He is a Certified Lead ISMS implementer and implemented the ISMS for Customers. He is a Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI) possessing certifications such as CompTIA Security+, CCNA, CCNP, ITIL Foundation. He also has the distinction of clearing the GIAC Certified Penetration Tester (GPEN), The GIAC Certified Forensic Analyst (GCFA) and The GIAC Certified Revers Engineering and Malware Analyst (GREM) from SANS Institute.

He has worked on security for a range of operating systems, databases, web servers, mail servers, directory services and applications and has exposure to a wide range of security systems and solutions as Manager - IT Security for large corporations. With experience in designing secure network topology for business enterprises, he has sound knowledge about collection, examination, and analysis of data stored on networks with exposure to analyzing packet logs and handling security incidents.


He is well versed with Forensics tools such as Encase, Autopsy, FTK, Winhex, Rifiuti, windows file analyzer, mount image pro, user assist decryption, filealyz, e-mail investigation, Windows registry recovery, Rootkit analysis, IE history viewer, access data password recovery toolkit, ultimate zip crack, Passware, web historian, strings, Helix, recycle bin analysis, CD/DVD inspector, CD/DVD diagnostic, Vinetto, alternate data stream, praben’s registry analyzer etc. and has knowledge about email investigation.

He studied details of imaging and analysis including the use of manual and automatic processes. He is well familiar with command line (Linux) imaging tools like dd, dcfl, dd and has used FTK academic bundle including FTK imager, FTK registry viewer, and FTK password recovery toolkit. He also has exposure to data carving, search methods (i.e. file search vs. logical volume searches) and data reduction. He has the experience of designing secure network topology for business enterprises, knowledge about collection, examination, and analysis of data stored on networks, as well creating pre-incident network collection plans.

He has complete knowledge of Intrusion Deduction Systems which include McAfee Intrushield Manager and various firewalls such as Cisco Pix and Netscreen. He also has good knowledge on Enterprise Network Scanner Qualys. He has handled Penetration Testing and Vulnerability Assessment for a number of corporate customers and has consistently impressed clients with his ability to think out of the box and creatively attack systems and applications.

He represents Security Tech Labs as Principal Security Consultant and handles assignments on ISMS implementations, penetration testing & vulnerability assessment besides providing technical support on firewall security and intrusion analysis for customers in India, US and the Middle East on a regular basis.

This tutor has provided no information about subjects

Information about Srikanth

Security Tech Labs is a premium IT Security & IS Training and Consulting Company in India, a reputation best owned for Quality and Excellence. Security Tech Labs provide Real time and hands-on-experience and offers a comprehensive package of trainings to Companies and individuals.

Our training is Value for money, affordable and designed to meet the needs of everyone. We are involved in every step of the way in security consultation process that has been improving the IS and IT Security. Security Tech Lab`s in house grown course will have a package of trainings to suit your IT and IS security requirements which fill the gap between the industries and the unemployed/employed professionals. We have courses that impart training on the start to end of skill sets. Unlike other training providers, we offer a free initial consultation prior to the training to get an insight into the requirements and needs. In today`s busy world if time is an issue, then we can arrange to contact you by telephone or via email.


TrainingS Offered

CEH
CISSP
CISA
CHFI
ECSA / LPT
CISM
Application Security
Wireless Security
Firewall / IDS / IPS
Malware Analysis – Reverse Engineering

Consulting

VA / PT
IT Security Assessment
Information Systems Audit
SOC Implementations
SOX / SAS – 70 Assessment
ISO 27001 (ISMS)
ISO 20000 (ITSM)

Availability: Can be done over skype/webmeeting, in person

Willing to travel: 30 miles

Experience: The Facilitator is post graduate with more than a decade of experience in IT Infrastructure, Network, Security and Technical Support. He is a Certified Lead ISMS implementer and implemented the ISMS for Customers. He is a Certified Ethical Hacker (CEH) and Computer Hacking Forensic Investigator (CHFI) possessing certifications such as CompTIA Security+, CCNA, CCNP, ITIL Foundation. He also has the distinction of clearing the GIAC Certified Penetration Tester (GPEN), The GIAC Certified Forensic Analyst (GCFA) and The GIAC Certified Revers Engineering and Malware Analyst (GREM) from SANS Institute.

He has worked on security for a range of operating systems, databases, web servers, mail servers, directory services and applications and has exposure to a wide range of security systems and solutions as Manager - IT Security for large corporations. With experience in designing secure network topology for business enterprises, he has sound knowledge about collection, examination, and analysis of data stored on networks with exposure to analyzing packet logs and handling security incidents.


He is well versed with Forensics tools such as Encase, Autopsy, FTK, Winhex, Rifiuti, windows file analyzer, mount image pro, user assist decryption, filealyz, e-mail investigation, Windows registry recovery, Rootkit analysis, IE history viewer, access data password recovery toolkit, ultimate zip crack, Passware, web historian, strings, Helix, recycle bin analysis, CD/DVD inspector, CD/DVD diagnostic, Vinetto, alternate data stream, praben’s registry analyzer etc. and has knowledge about email investigation.

He studied details of imaging and analysis including the use of manual and automatic processes. He is well familiar with command line (Linux) imaging tools like dd, dcfl, dd and has used FTK academic bundle including FTK imager, FTK registry viewer, and FTK password recovery toolkit. He also has exposure to data carving, search methods (i.e. file search vs. logical volume searches) and data reduction. He has the experience of designing secure network topology for business enterprises, knowledge about collection, examination, and analysis of data stored on networks, as well creating pre-incident network collection plans.

He has complete knowledge of Intrusion Deduction Systems which include McAfee Intrushield Manager and various firewalls such as Cisco Pix and Netscreen. He also has good knowledge on Enterprise Network Scanner Qualys. He has handled Penetration Testing and Vulnerability Assessment for a number of corporate customers and has consistently impressed clients with his ability to think out of the box and creatively attack systems and applications.

He represents Security Tech Labs as Principal Security Consultant and handles assignments on ISMS implementations, penetration testing & vulnerability assessment besides providing technical support on firewall security and intrusion analysis for customers in India, US and the Middle East on a regular basis.

Contact this Tutor

Nearby Locations

BangaloreBangalore EastBangalore NorthBangalore SouthDevanahalliHoskote