SlideShare a Scribd company logo
IT GRADUATE from Mumbai University
TRAINER FOR CYBER SECURITY
VA/PT ANALYST FOR WEB APPLICATION
NETWORK SECURITY CONSULTANT
MEMBER OF INDIAN SECURITY HACKERS
WEB APPLICATION SECURITY EXPERT CERTIFIED
NETWORK SECURITY EXPERT CERTIFIED
CISE –CERTIFIED INFORMATION SECURITY EXPERT
CYBER CRIME PROTECTION PROGRAM
DATA PRIVACY LAW CERTIFIED
CCNA CERTIFIED –CISCO NETWORKING ACADEMY
MBA+PGDM TELECOM SYSTEMS – MITSOT
WIRESHARK CERTIFIED NETWORK ANALYST
MEMBER OF INDIAN MAD HUNTERS
ADMIN OF CYBER SECURITY PROFESSIONALS
PROPERTY OF AMITKUMAR DEKATE
ETHICAL HACKING TRAINER
Pakistan TV channel pakgeo.TV
Management Institute
Government School
Police training institute
Some Hacked website in our Lab
PROPERTY OF AMITKUMAR DEKATE
ETHICAL HACKING TRAINER
The Indian Institute of Planning and Management
PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
IBM
PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
Property of Amitkumar Dekate CEH Trainer
Property of Amitkumar Dekate CEH Trainer
Property of Amitkumar Dekate CEH Trainer
Property of Amitkumar Dekate CEH Trainer
Property of Amitkumar Dekate CEH Trainer
Property of Amitkumar Dekate CEH Trainer
PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
Seminar Conducted
Feedback from Seminars
Conducted at TSEC
college
Note:- THIS IS COMPLETE SOLE PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
MISUSE OR ILLEGAL DISTRIBUTION OF ANY CONTENT POSSES BY AMITKUMAR DEKATE CAN LEAD
TO COPYRIGHT ISSUES AND LEGAL CASE AGAINST HIM/HER.
IT IS TO NOTE DOWN THAT ALL THE PENTESTING AND OTHER WORK IS DONE IN PRESENCE OF
AUTHORIZED PERSONEL AND NO OTHER HARM IS SUBJECTED TO ANYONE.
AMITKUMAR DEKATE IS A CERTIFED ETHICAL HACKING TRAINER.

More Related Content

Similar to AMIT 2

How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
Edureka!
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
Purple Cube Technologies Profile-LATEST
Purple Cube Technologies Profile-LATESTPurple Cube Technologies Profile-LATEST
Purple Cube Technologies Profile-LATEST
Priyadarshini Ramalingam
 
Comprompt Solutions Presentation
Comprompt Solutions PresentationComprompt Solutions Presentation
Comprompt Solutions Presentation
comprompt
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Edureka!
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
CSSRL PUNE
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
Ammar WK
 
Cyber cure tech. pvt. ltd. copy
Cyber cure tech. pvt. ltd.   copyCyber cure tech. pvt. ltd.   copy
Cyber cure tech. pvt. ltd. copy
cybercure82
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
Edureka!
 
Vivek_New_Resume
Vivek_New_ResumeVivek_New_Resume
Vivek_New_Resume
Vivek Jain
 
Surging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS GlobalSurging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS Global
rakeshkichu578
 
Surging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS GlobalSurging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS Global
rakeshkichu578
 
Building your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipBuilding your cybersecurity apprenticeship
Building your cybersecurity apprenticeship
Zeshan Sattar
 
IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...
IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...
IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...
cmrishad9
 
CSSRL Official Introduction
CSSRL Official IntroductionCSSRL Official Introduction
CSSRL Official Introduction
CSSRL Laboratories
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
omgmaxsmith
 
EC-Council Cybersecurity Certifications
EC-Council Cybersecurity Certifications EC-Council Cybersecurity Certifications
EC-Council Cybersecurity Certifications
JW CyberNerd
 
Bt profile
Bt profileBt profile
Securing Your BBC Identity
Securing Your BBC IdentitySecuring Your BBC Identity
Securing Your BBC Identity
Marc Littlemore
 
CEH
CEHCEH

Similar to AMIT 2 (20)

How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Purple Cube Technologies Profile-LATEST
Purple Cube Technologies Profile-LATESTPurple Cube Technologies Profile-LATEST
Purple Cube Technologies Profile-LATEST
 
Comprompt Solutions Presentation
Comprompt Solutions PresentationComprompt Solutions Presentation
Comprompt Solutions Presentation
 
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
Complete Ethical Hacking Course | Ethical Hacking Training for Beginners | Ed...
 
C-Sec Pro
C-Sec Pro C-Sec Pro
C-Sec Pro
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
Cyber cure tech. pvt. ltd. copy
Cyber cure tech. pvt. ltd.   copyCyber cure tech. pvt. ltd.   copy
Cyber cure tech. pvt. ltd. copy
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Vivek_New_Resume
Vivek_New_ResumeVivek_New_Resume
Vivek_New_Resume
 
Surging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS GlobalSurging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS Global
 
Surging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS GlobalSurging Lawsuit Feast - Join IPCS Global
Surging Lawsuit Feast - Join IPCS Global
 
Building your cybersecurity apprenticeship
Building your cybersecurity apprenticeshipBuilding your cybersecurity apprenticeship
Building your cybersecurity apprenticeship
 
IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...
IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...
IPCS GLOBAL KANNUR. digital marketing, bms and cct ,automation, python and da...
 
CSSRL Official Introduction
CSSRL Official IntroductionCSSRL Official Introduction
CSSRL Official Introduction
 
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
Secure Your Digital Fortress with SumaSoft's VAPT Services: Uncover, Protect,...
 
EC-Council Cybersecurity Certifications
EC-Council Cybersecurity Certifications EC-Council Cybersecurity Certifications
EC-Council Cybersecurity Certifications
 
Bt profile
Bt profileBt profile
Bt profile
 
Securing Your BBC Identity
Securing Your BBC IdentitySecuring Your BBC Identity
Securing Your BBC Identity
 
CEH
CEHCEH
CEH
 

AMIT 2

  • 1. IT GRADUATE from Mumbai University TRAINER FOR CYBER SECURITY VA/PT ANALYST FOR WEB APPLICATION NETWORK SECURITY CONSULTANT MEMBER OF INDIAN SECURITY HACKERS WEB APPLICATION SECURITY EXPERT CERTIFIED NETWORK SECURITY EXPERT CERTIFIED CISE –CERTIFIED INFORMATION SECURITY EXPERT CYBER CRIME PROTECTION PROGRAM DATA PRIVACY LAW CERTIFIED CCNA CERTIFIED –CISCO NETWORKING ACADEMY MBA+PGDM TELECOM SYSTEMS – MITSOT WIRESHARK CERTIFIED NETWORK ANALYST MEMBER OF INDIAN MAD HUNTERS ADMIN OF CYBER SECURITY PROFESSIONALS PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
  • 2. Pakistan TV channel pakgeo.TV Management Institute Government School Police training institute Some Hacked website in our Lab PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
  • 3. The Indian Institute of Planning and Management PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
  • 4. IBM PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
  • 5. Property of Amitkumar Dekate CEH Trainer
  • 6. Property of Amitkumar Dekate CEH Trainer
  • 7. Property of Amitkumar Dekate CEH Trainer
  • 8. Property of Amitkumar Dekate CEH Trainer
  • 9. Property of Amitkumar Dekate CEH Trainer
  • 10. Property of Amitkumar Dekate CEH Trainer
  • 11. PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
  • 12. PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER
  • 15. Note:- THIS IS COMPLETE SOLE PROPERTY OF AMITKUMAR DEKATE ETHICAL HACKING TRAINER MISUSE OR ILLEGAL DISTRIBUTION OF ANY CONTENT POSSES BY AMITKUMAR DEKATE CAN LEAD TO COPYRIGHT ISSUES AND LEGAL CASE AGAINST HIM/HER. IT IS TO NOTE DOWN THAT ALL THE PENTESTING AND OTHER WORK IS DONE IN PRESENCE OF AUTHORIZED PERSONEL AND NO OTHER HARM IS SUBJECTED TO ANYONE. AMITKUMAR DEKATE IS A CERTIFED ETHICAL HACKING TRAINER.