To obtain a crowning status in the IT industry as efficient information secures Professional and demonstrate apical skills and talents linked with the profile.
The ability to serve as a corporate security guru by ensuring technical security planning, testing, verification and risk analysis in accordance with TCP/IP protocols. Capable of defining, deploying and monitoring risk management, compliance, and information security programs while functioning as a primary IT disaster recovery coordinator.
Programming: C++,python
Network and Security: LAN, WAN, Internet Security & Protocols.
Operating System: MS Windows, Linux,Backtrack 5,Kali linux.
Software Tools: Nmap, Nessus, Metasploit, ...