Cisco: Cyber Threat Management
Cisco: Cybersecurity Essentials
Cisco: Get Connected
Cisco: Introduction to Cybersecurity
Cisco: Introduction to IoT
EC-Council: CEHv12 Candidate
EC-Council: SQL Injection Attacks
Forage: AIG Shields Up: Cybersecurity Virtual Experience Program on Forage
Forage: ANZ Cyber Security Management on Forage
Forage: Mastercard Cybersecurity Virtual Experience Program on Forage
Forage: PwC Switzerland Cybersecurity Virtual Case Experience on Forage
Forage: Tata Group - Cybersecurity Analyst Job Simulation
Forage: Telstra - Cybersecurity Job Simulation
Fortinet: Fortinet Network Security Expert Level 1: Certified Associate
Fortinet: Fortinet Network Security Expert Level 2: Certified Associate
Fortinet: Fortinet Network Security Expert Level 3: Certified Associate
Google: Foundations of Cyber Security
IBM: Cybersecurity Compliance Framework, Standards & Regulations
Indian Institute of Technology, Delhi: Ethical Hacking Workshop
ISC2: Certified In Cybersecurity (CC) Candidate
LinkedIn Learning: Google Cloud Foundations
LinkedIn Learning: ISO 27001:2022-Compliant Cyber Security: Getting Started
LinkedIn Learning: Learning Data Governance
LinkedIn Learning: Safeguarding Customer Credit Card Data: PCI Compliance
LinkedIn Learning: Working with the PCI DSS 4.0 Compliance Requirements
Security Blue Team: Introduction to Digital Forensics
SkillFront: ISO/IEC 27001:2022 Information Skillfront Security Associate
TCM Security: Linux 100: Fundamentals
TCM Security: Programming 100: Fundamentals
Yale University: Introduction to Psychology
Active Directory: User and group management, Firewall authentication synchronisation
Cyber Security: Incident Response, Risk Assessment, Social Engineering, Threat Analysis
Governance, Risk, and Compliance (GRC): PCI DSS, ISO 27001, SOC 1, SOC 2, GDPR, HITRUST
Incident Response: Incident Response, SIEM
Networking: Routing and Switching, WAN and LAN technologies, TCP/IP networking protocols, Network segmentation, DLP (Data Loss Prevention), Endpoint Security
Network Security: Nmap, Hping3, Wireshark, Network/System Auditing
Operating Systems: Mac OS, Linux, Windows
Penetration Testing Tools: Bettercap, OWASP Zap, HashCat, Burpsuite, Sherlock, Social-Engineering Toolkit (SET)
Python Scripting: Selenium, Raspberry PI
Scripting Languages: Python, HTML, CSS, Bash, Shell
Security Protocols: VLAN, ADCs (Application Delivery Controllers), Switching, Network Switches
SQL: Basic SQL queries, MySQL, Oracle, PL/SQL
Cisco: Cyber Threat Management
Cisco: Cybersecurity Essentials
Cisco: Introduction to IoT
Cisco: Introduction to Cybersecurity
IBM: Cybersecurity Compliance Framework & System Administration
ISC2: ISC2 Candidate
Microsoft: Microsoft Security Bootcamp 2024: Gold Attendee
Community Outreach, Mata Jai Kaur Public School: Member
Muskurahat Foundation: Fundraiser