Aananth kumar Cyber Security, Ethical Hacker, OSCP, CEH
1 Review

A Certified Ethical Hacker and a highly self-motivated professional having over 9+ years a of experience in the field of Cyber Security with hands-on knowledge of Web Application, Network & Mobile Application Security, IoT security, Source code Analysis, Threat Analysis, Security Posture, Vulnerability Management, Blockchain security, Cryptography, Cyber Awareness, Threat Hunting & Analysis, Dark Web Analysis, Source code Reviews, Threat Intelligent, Infrastructure Security Posture Reviews, Vulnerability Management, Malware Analysis, Development, and Bug Bounty.

I've done various assessments for Government entities - UAE, INDIA, Qatar, United States, and the major Banking & Financial Sectors in INDIA, UAE, Global Hospital sectors across South East ASIAN Countries( Singapore, Malaysia, Hong Kong, China & United States)

I have taught various subjects like Data Structures & C Language, Computer Networks, Cybersecurity, Machine learning, etc. I support students even after completing their courses for any doubts related to their courses. since I have practical solid/Real-time work experience in Networking, so it will definitely help all students who want to become Cyber Security engineers to start their careers. You can contact me for the subject as well as research purposes of cybersecurity. I am also a blog writer and consultant.

Skills:
•Python programming
• Penetration Testing tools
• Application, Infrastructure, Mobile, Wireless Penetration Testing, etc.
• Advanced Persistent Threat (APT) attacks and Spear Phishing attacks
• Firewall rule base Analysis
• Blockchain Security
• Cyber Awareness
• Secure Configuration Review
• Insider Threat Assessment
• Network Architectural Review
• Perimeter security (WAF/IPS/Firewall security review)
• Active Directory security review
• Red Team Exercise
• Source code Reviews
• Security Posture Reviews
• Web Application Security
• Network Security
• Mobile Application Security
• Vulnerability Management Service
• Vulnerability Assessment
• Development Security
• Docker and Container security
• Python Automation
• Malware Analysis
• IoT Security

Teaching techniques:
Any courses for example web application, mobile application, python, network security, ethical hacking, penetration testing .. etc let it be any course i will be started from the basics.

The Travel from Basics --> Advanced

Basic: Everything from Computer networks starting from how the internet works, Programming to getting hands-on with Operating systems like Windows and Linux would fall in together with basic Architecture and Cyber World. Which would slowly then put us to an Intermediate level.

Intermediate: Everything from here on out gets practical. Here the labs get into practice. From Homemade labs to Hack the Box in this section, I'll teach you with some real-world examples.

Advance: This is where the real taste is Customizing exploits, Writing your own Malware, Exploit Development are some of the things that'd be covered in this Section.All you need is to be attentive and focused.

The word for Starters and Beginners:

Trust me I know the struggle and I've been through it too, I'll put forth the road-map and help you be on the track.

[NOTE: In case you want to take some Specialized course (Advanced) focusing entirely on a specific domain like DFIR, Threat Hunting, Web Application Pen-test, Network Pen-test, etc. do mention it.]

More than a Cyber trainer,
* I'm a social activist, stage motivational speaker, blogger.
* I've hacked into 300 web applications and 3 lakhs of network IPs
* Recognized by US Govt - US hospitality for saving their hospital environment from Ransomware and Indian Govt for securing their websites and networks
* Bug Bounty - Acknowledged for best findings in various sites.
* More than Cyber Security i am very very good at research activities . i have been a part of many world famous security products and i was also a part of that research team.
* Tool related certifications - Qualys, Nessus.
* Have other certification based on Cloud computing,Network security, firewall configuration, Security postures,Web application security.

What I will Expect from You:
* Knowledge Thirst
* Active Mindset and Exploration
* Good Internet Connection & System

What you'll get :

* You'll be Prioritized for your self betterment on your skills than payment.
* You'll be trained on committed TIME. nothing more or nothing less.
* You'll be helped to acquire hands on experience on any cyber assessments, web hacking and penetration testing.
* You'll be meeting an outgoing character who can support you in your consistency, accountability and exploring more topics on any desired course that you engage yourself with.
* You'll be valued based on the purpose you chose to study than the money that you give.

You can make a difference in Cyber security domain once after spending time with this trainer who teaches based on industrial experience and methodology with examples.

Your added assessments, assignments and homework can equip you as a beginner to intermediate person & an intermediate person to expert. An expert will grow together by enhancing own thoughts and cognitive thinking.

Subjects

  • Cybersecurity Grade 1-Doctorate/PhD

  • Mobile Applications Grade 1-Doctorate/PhD

  • Penetration testing Grade 1-Doctorate/PhD

  • Network Security Grade 1-Doctorate/PhD

  • Docker Grade 1-Doctorate/PhD

  • Ethical hacking Grade 1-Doctorate/PhD

  • Cyber Security Grade 1-Doctorate/PhD

  • Network Security Analysis Grade 1-Doctorate/PhD

  • Cyber researcher Grade 1-Doctorate/PhD

  • Web Application Security Grade 1-Doctorate/PhD

  • Vulnerability Assessment and Penetration Testing Grade 1-Doctorate/PhD

  • Web application Grade 1-Doctorate/PhD

  • IoT security Grade 1-Doctorate/PhD

  • Network and Security Beginner-Expert

  • Security Audit Grade 1-Doctorate/PhD

  • Cryptography and Network security Grade 1-Doctorate/PhD

  • Threat Risk Assessment Grade 1-Doctorate/PhD

  • Threat Intelligence Grade 1-Doctorate/PhD

  • Advanced Persistent Threat Grade 1-Doctorate/PhD

  • Threat Intelligence, Advanced Persistent Threat and Vulnerability Management Grade 1-Doctorate/PhD


Experience

  • Manager (Jun, 2022Present) at Ernst & Young
  • Senior Cyber Security Engineer (Sep, 2021Jun, 2022) at Etisalat uae
  • Cyber Security Analyst (Sep, 2019Aug, 2021) at Cybersecurityworks
  • Security Analyst (Jun, 2016Sep, 2019) at Comodo Security Solutions Pvt. Ltd.

Education

  • OSCP (Oct, 2022now) from Offensive Security
  • Certified Ethical Hacker (Mar, 2021Apr, 2021) from EC Council
  • MSC CyberForensics and Information Security (Aug, 2017Jun, 2019) from MADRAS UNIVERSITY, CHENNAI, INDIAscored 9.4 CGPA
  • Bachelor of Enginerring (Jul, 2012May, 2016) from Sree sastha institute of engineering and technologyscored 8.7 CGPA

Fee details

    5003,000/hour (US$5.9935.95/hour)

    Pricing always depends on quality, time, location and student's knowledge level and syllabus covered in the subject.


1 Review
5 out of 5

User Photo January 3, 2023
Payment verified US$ 1 (50 Coins)

Highly skilled, knowledgeable, and trustworthy cybersecurity mentor of all time.

I requested him for my Final year project help and he highly support and helped in all aspects to complete the project(technical, Report and also teaching). Thank you so much @Aananth.