Syed Ubaid Ali Jafri
163
Followers
Personal Information
Organization / Workplace
Pakistan, Sindh Pakistan
Occupation
Information Security Consultant at KPMG
Industry
Technology / Software / Internet
Website
www.habibmetro.com
About
Expertise in developing Web Based Application, Database Applications and Desktop Applications
Working experience in distributed environment and distributed applications
Expertise in ISA Configuration, Network Security include:· Penetration Testing·
Stress Testing·
Anti-Phishing·
Anti-Hacking·
Social Engineering.
Programming Languages:
Microsoft Visual C#. NET,
Turbo C++,
Asp. Net,
Assembly
Xml
Networking Skills:
Active Directory, ISA Server 2000,2003, Exchange Server 2003, Simulation on (GNS 3, Packet Tracer 5.3, Boson Netsim)Inter V-LAN Routing,
Deployment of different Routing protocols and WAN Protocols in Professional Environment ·
Network Infrastructure.·
Network Deploy...
Tags
network security
network review checklist
network review
network structure review
projects ideas bs
bs projects
final year projects
computer science
cryptography
data encrption
pentesting
blackbox pentesting
information system
transport layer security
security over wired networks.
lan security
local area network
lab requirement for pt
lab for penetration testing
requirement for creating a pentest lab
pentest lab requirement
lab requirement for penetration testing
penetration testing lab
pentest lab
information security pos
pos security from hackers
pos vulnerability assessment
pos penetrationt testing
hacking pos
pos hardening
pos hacking
pos device security
pos security checklist
pos va/pt
point of sale technical security
pos testing pci
pos va-pt
point of sale security
pos checklist
network structure review checklist
network diagram review checklist
network architecture review information security
network diagram review
network architecture review
network components review checklist
network architecture
network review information security
network diagram
network architecture checklist
tcp/ip security
application security
tcp/ip hacking
data security
threat in osi model
osi security
information security threats
osi 7 layer security breach
layered based osi model
information security final year projects
project ideas
information security projects
computer security
final year project computer
pulling values into c#
pulling data into c#
get/post data c#
get data
c# data calling
.net data recieving
get data from web into c#
get data from web
web data calling
data retrieving
data calling
mobile hacking
mobile data
android
cell phone data hacking
mobile vulnerability
cell phone steal
steal cell phone data
android forensics
mobile forensics
data hiding
steganalysis
stegnography
hide data
latest projects ideas
fyp
web 2.0
iis 7.5
iis
windows 7
web hosting
web hosting service
iis 6.0
microsoft internet information services
iis configuration
algorithm
security algorithms
information security
des encryption
information gathering
pestest
blackbox audit
network performance
auditing
black box audit
audit
penetration testing
internal audit
ubaid jafri
ubaid ali jafri
syed ubaid ali jafri
i.t
storage area networks
storage area network
vmware esx
esx installation
vmware vsphere
computer data storage
san
esxi
802.11
wireless network
wireless data
wireless sensor network
wireless access point
wireless lan
layer 2 protocols
ipsec
security vpn
vpn security
vpn tunneling
wired networks security
lan communication
network lan
lan network
ethernet security
internet
lan hacking
man
lan networks
See more