Deepak Garg

Deepak Garg

Teaching Professional IN Hardware / Networking

Followers of Deepak Garg12000 followers
location of Deepak GargDelhi, India

Connect with Deepak Garg to Send Message

Connect

Connect with Deepak Garg to Send Message

Connect
  • Timeline

  • Skills

    Amazon Web Services (AWS)
    CCNA
    Cybersecurity
    Microsoft Azure
    Network Computing
    Networking
    Red Hat Linux
    Windows Server
  • About me

    I'm a passionate Cyber security Researcher as well as an Ethical Hacker. Competent and skilled IT & Web Security Researcher. Apart from this, have a passion and diligence for hacking, finding new bugs and vulnerabilities in Ethical India Delhi. AREAS OF EXPERTISE:- =================== * Web-App Penetration Testing * Vulnerability Researcher * Vulnerability Assessment * Bug Bounty Hunting * Routing Protocols * NAT/ PAT * WAN (Wide Area Network) I have 6+ years of hands-on teaching experience in the field of Cyber Security and CISCO Networking in Ethical India Delhi and I am also a Certified Ethical Hacker and Secure Computer User by EC-Council...

  • Education

    • HimalayanUniversity

      2017 - 2021
      B.Tech Computer Science
    • Central Board of Secondary Education

      2016 - 2017
      Intermediate (12th) Science
  • Experience

    • APSMiND TECHNOLOGY PVT. LTD.

      Jul 2018 - Mar 2019
      Teaching Professional IN Hardware / Networking
    • Ethicalindia

      Mar 2019 - now
      Founder & CEO
    • Jetking Azadpur

      Mar 2020 - Aug 2021
      Cyber Security Instructor
    • IInfotanks

      Mar 2020 - Jun 2022
      Information Technology Network Manager

      - Ban all entertainment, social media, ISP domains, sports, torrent websites for selected networks and employees.- Restrict Installation of Software/Updates- Create an Administrator Login for all 15 Systems which would handle all employee logins.- Restriction for Uploading and Downloading files, No one can transfer data can at any time through wireless or wire or through uploading files.Query – Our data team uses Linked IN to verify data of professionals and through LinkedIn messages you can still upload files and documents. How can we restrict this?- IP restriction for account logins, Cpanel access, crm access (with exceptions)- Restrict access of Hard-drives and Pendrives through USB Ports- Track on Router level as to how many devices are connected- Need to take computer screenshots at regular intervals.- Delisting of IP from Spamhaus, SORBS etc. - Infotanks Media uses GSuite ID’s and static Networks privately for client communications. The IP is whitelisted, although sometimes our email goes to spam/junk folder of our clients. How best we can stop this issue? - We have a lead generation team of 8 members who use 6 different dynamic IP’s to send out 170,000 emails daily. They use VPN to mask the dynamic IP’s. They use Godaddy CPanel Email System to send out emails for lead generation. All the 6 Dynamic IP’s from ISP’s like Airtel, TTN, Hathaway are blacklisted. What we can do to ensure all dynamic IP’s are whitelisted?If we have all Whitelisted IP’s then we would have more leads as all our emails would go to the inbox rather than spam or junk folders.- Continuous Monitoring of all Systems, Networks, and IP’s Show less

    • Avodha

      Jun 2021 - Nov 2021
      Ethical Hacker
  • Licenses & Certifications

    • CNSS (Certified Network Security Specialist)

      ICSI (International CyberSecurity Institute), UK
      May 2020
      View certificate certificate
    • Google Analytics

      Google
    • Google Adwords

      Google
    • Autopsy Digital Forensic

      Autopsy
      May 2020
      View certificate certificate
    • Certified Secure Computer User (C/SCU)

      EC-Council
      Oct 2017
    • Certified Ethical Hacker (CEH)

      EC-Council
      Mar 2019
    • Introduction To Cyber Security

      Cisco
      May 2020
      View certificate certificate