Syed Ubaid Ali Jafri
163
Followers
Personal Information
Organization / Workplace
Pakistan, Sindh Pakistan
Occupation
Information Security Consultant at KPMG
Industry
Technology / Software / Internet
Website
About
Expertise in developing Web Based Application, Database Applications and Desktop Applications
Working experience in distributed environment and distributed applications
Expertise in ISA Configuration, Network Security include:· Penetration Testing·
Stress Testing·
Anti-Phishing·
Anti-Hacking·
Social Engineering.
Programming Languages:
Microsoft Visual C#. NET,
Turbo C++,
Asp. Net,
Assembly
Xml
Networking Skills:
Active Directory, ISA Server 2000,2003, Exchange Server 2003, Simulation on (GNS 3, Packet Tracer 5.3, Boson Netsim)Inter V-LAN Routing,
Deployment of different Routing protocols and WAN Protocols in Professional Environment ·
Network Infrastructure.·
Network Deploy...
Contact Details
Tags
network security
projects ideas bs
bs projects
final year projects
computer science
cryptography
data encrption
pentesting
blackbox pentesting
information system
network structure review
network review
network review checklist
transport layer security
local area network
lan security
security over wired networks.
black box audit
auditing
network performance
lan network
blackbox audit
ethernet security
pestest
information gathering
internet
des encryption
information security
security algorithms
algorithm
iis configuration
microsoft internet information services
iis 6.0
web hosting service
web hosting
windows 7
iis
iis 7.5
web 2.0
fyp
lan hacking
man
latest projects ideas
lan networks
vpn security
security vpn
ipsec
layer 2 protocols
wireless lan
wireless access point
wireless sensor network
wireless data
wireless network
802.11
vpn tunneling
esxi
san
computer data storage
vmware vsphere
esx installation
wired networks security
vmware esx
storage area network
lan communication
storage area networks
network lan
i.t
syed ubaid ali jafri
ubaid ali jafri
ubaid jafri
internal audit
penetration testing
audit
point of sale technical security
pos testing pci
pos va-pt
point of sale security
pos checklist
network structure review checklist
network diagram review checklist
network architecture review information security
network diagram review
network architecture review
network components review checklist
network architecture
network review information security
network diagram
network architecture checklist
tcp/ip security
application security
lab requirement for pt
lab for penetration testing
requirement for creating a pentest lab
pentest lab requirement
lab requirement for penetration testing
penetration testing lab
pentest lab
information security pos
pos security from hackers
pos vulnerability assessment
pos penetrationt testing
hacking pos
pos hardening
pos hacking
pos device security
pos security checklist
pos va/pt
tcp/ip hacking
get data from web into c#
get data from web
web data calling
data retrieving
data calling
mobile hacking
mobile data
android
cell phone data hacking
mobile vulnerability
cell phone steal
steal cell phone data
android forensics
mobile forensics
data hiding
steganalysis
stegnography
data security
threat in osi model
osi security
information security threats
osi 7 layer security breach
layered based osi model
information security final year projects
project ideas
information security projects
computer security
final year project computer
pulling values into c#
pulling data into c#
get/post data c#
get data
c# data calling
.net data recieving
hide data
See more