Yashika Dhir

Author | Researcher | CTF Player at Hacking Articles

Yashika Dhir is an experienced author, researcher, CTF player, and Cyber Security Researcher who has worked in companies like Hacking Articles, VIBRANT INTERNATIONAL, and Vayam Technologies Ltd. Yashika specializes in web application penetration testing, network penetration testing, vulnerability assessment, identifying threats, incident responding, and has a dedicated role in OSINT with a focus on researching latest tools for information gathering and penetration testing.

Location

Delhi, India

Links

Previous companies


Org chart

No direct reports

Teams

This person is not in any teams


Offices


Hacking Articles

What do we do? Ignite Technologies and Hacking Articles have been working together to build a global reputation in the IT industry for more than ten years. Ignite has been offering top-notch cybersecurity training and consulting services that meet the needs of students, government employees, and business personnel.. Additionally, Ignite's advisors and consultants are knowledgeable, skilled specialists with years of expertise to assist and manage their clients in order to detect any existing vulnerabilities in their infrastructure and applications and fix them BEFORE they are exploited by attackers. Accreditations include ISO-9001, Certified Trainer in OSCP, CEH, ECSA, ISO-Lead Auditor, OSWP, CRTP, CISM CISA, and CHFI. What are the services we provide ? 1.Individual and Corporate Training -(Ethical, Penetration Testing and Red Teaming) 2.Seminar and Workshop: School, College and Corporate Companies. 3.Penetration Testing -Black/Grey/ White -Infrastructure -Web Application -Mobile -Active Directory 4.Compliance Audit -ISO 27001 -HIPAA -PCI-DSS -GDPR 5.Design and organize CTF Hackathon What drives us? 1.Hacking Articles (www.hackingarticles.in) is a leading security blog that offers real-time practice-based sessions. 2.The course content provided by Ignite Technologies is exclusive and tailored to meet the needs of the participants. 3.To ensure continuity in the learning process, backup sessions are also provided in case of any unforeseen circumstances. 4.After completing the training, participants can also avail post-training assistance from the experts at Ignite Technologies to further enhance their skills. To whom do we cater? 1.College Students 2.IS/IT specialist, analyst, or manager 3.IS/IT auditor, security officer, engineer or consultant 4.Network security officers 5.Site administrators 6.Technical support or senior engineer 7.Systems analyst or administrator Website https://www.ignitetechnologies.in/about-us.html


Headquarters

Delhi, India

Employees

51-200

Links