My Bio date Details
Sucessfully completed Regular B.tech in Electronic and Communication from Symbiosis Institute Of Technology & Science which affliated to JNTU, located in Hyderabad, and one of the India's leading educational university focusing on engineering.
NIOS is a national board that administers examinations for Secondary and Senior Secondary examinations of open schools similar to the CBSE and the CISCE.
Sucessfully Completed Highschool Certiicate Examination from BSE (Boar of Secondary Education)
Monitoring and conducting security assessments through vulnerability testing and hazard analysis and Performing both internal and external security audits. Analyzing security breaches to identify the base drive also perform penetration testing.
Monitor computer networks for security events. Investigate security breaches and other cyber security incidents. Set up security bars and operate software to protect systems and information base, including firewalls and data encryption programs
Provided technical assistance and support for incoming queries and issues related to computer systems, software, and hardware. Respond to queries either in person or over the phone. Respond to email messages for customers seeking help. Install, modify, and repair computer hardware and software
CEH is a certification offered by EC-Council. It's useful to master hacking methodology in an ethical way.
Increase knowledge in Cisco networking and widen your understanding of the concept on how it works.
MCP cover's a wide range of Microsoft products, technologies and solutions.
The Department of Electronics and Accreditation of Computer Courses is an autonomous scientific society under the Ministry of Electronics and Information Technology, Government of India.
What we provide you !
An authorized simulated attack on a computer system, performed to evaluate the security of the system.
Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various system.
The cognitive operation of identifying , measuring, and prioritizing the vulnerabilities in a organization.
To protect digital data confidentiality as it is stored on computer system and transmitted using the internet or networks.
Psychological manipulation of people into performing actions or divulging confidential information.
the process by which a man-made object is deconstructed to reveal its designs & architecture
Happy Clients Say ?
“ Great work Shiba! I appreciate your hard work, commitment and deep understanding of cyber security knowledge “
“ Extremely delighted and would love to work together at any given opportunity “
“ Shiba's knowledge sharing helped me understand a lot about the internet marketing and its benefits. I am grateful “
“ Shiba responded very quickly anytime I needed his help. I highly recommend his service. “
Let’s Keep in Touch