Jump to content

User:Dhanesh.dodia/sandbox: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Created page with 'Dhanesh has proven experience in defending Enterprise Critical Infrastructure from Global from Cyber Threats. He has demonstrated adversaries leverage existing TTP’s (tactics, techniques, and procedures) in a real attack where the key point is providing real adversary simulation vs. limited scope penetration testing. He has conducted several workshops for various Law Enforcement Departments in India to overcome the common challenges faced during Cyber Cr...'
 
m Data
 
Line 1: Line 1:
Dhanesh has proven experience in defending Enterprise Critical Infrastructure from Global from Cyber Threats. He has demonstrated adversaries leverage existing TTP’s (tactics, techniques, and procedures) in a real attack where the key point is providing real adversary simulation vs. limited scope penetration testing.
'''Dhanesh''' has proven experience in defending Enterprise Critical Infrastructure from Global from Cyber Threats. He has demonstrated adversaries leverage existing TTP’s (tactics, techniques, and procedures) in a real attack where the key point is providing real adversary simulation vs. limited scope penetration testing.


He has conducted several workshops for various Law Enforcement Departments in India to overcome the common challenges faced during Cyber Crime investigations and Electronic Crime Scene Management. His expertise includes Website Hacking Investigation, IPDR Dump Analysis, VoIP / Spoof Call Tracking, Virtual Identity Tracking (WhatsApp), Email Forensics, Simbox Fraud, Twitter account analysis, Malware Analysis, Darweb Data Breaches and Darweb markets honeypots, Fake Websites Investigation, Googlization, Ewallet Frauds & Investigations.
He has conducted several workshops for various Law E<ref>{{Cite web|last=Dodia|first=Dhanesh|date=Cyber crime investigation|title=Emerging Cyber Risk Consultant|url=https://www.google.com/maps/uv?pb=!1s0x3be7d174de0308b1%3A0x45283b1e0abbc869!3m1!7e115!4shttps%3A%2F%2Flh5.googleusercontent.com%2Fp%2FAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ%3Dw234-h176-k-no!5sindian%20cyber%20institute%20-%20Google%20Search!15sCgIgAQ&imagekey=!1e10!2sAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ&hl=en&sa=X&ved=2ahUKEwjZ2JqLrc7zAhWz7XMBHWLrA4sQoip6BAhxEAM|url-status=live|website=https://indiancyberinstitute.com}}</ref>nforcement Departments in India to overcome the common challenges faced during Cyber Crime investigations and Electronic Crime Scene Management. His expertise includes Website Hacking Investigation, IPDR Dump Analysis, VoIP / Spoof Call Tracking, Virtual Identity Tracking (WhatsApp), Email Forensics, Simbox Fraud, Twitter account analysis, Malware Analysis, Darweb Data Breaches and Darweb markets honeypots, Fake Websites Investigation, Googlization, Ewallet Frauds & Investigations.

{{Law enforcement in India}}


https://www.google.com/maps/uv?pb=!1s0x3be7d174de0308b1%3A0x45283b1e0abbc869!3m1!7e115!4shttps%3A%2F%2Flh5.googleusercontent.com%2Fp%2FAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ%3Dw234-h176-k-no!5sindian%20cyber%20institute%20-%20Google%20Search!15sCgIgAQ&imagekey=!1e10!2sAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ&hl=en&sa=X&ved=2ahUKEwjZ2JqLrc7zAhWz7XMBHWLrA4sQoip6BAhxEAM
https://www.google.com/maps/uv?pb=!1s0x3be7d174de0308b1%3A0x45283b1e0abbc869!3m1!7e115!4shttps%3A%2F%2Flh5.googleusercontent.com%2Fp%2FAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ%3Dw234-h176-k-no!5sindian%20cyber%20institute%20-%20Google%20Search!15sCgIgAQ&imagekey=!1e10!2sAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ&hl=en&sa=X&ved=2ahUKEwjZ2JqLrc7zAhWz7XMBHWLrA4sQoip6BAhxEAM

Latest revision as of 08:28, 16 October 2021

Dhanesh has proven experience in defending Enterprise Critical Infrastructure from Global from Cyber Threats. He has demonstrated adversaries leverage existing TTP’s (tactics, techniques, and procedures) in a real attack where the key point is providing real adversary simulation vs. limited scope penetration testing.

He has conducted several workshops for various Law E[1]nforcement Departments in India to overcome the common challenges faced during Cyber Crime investigations and Electronic Crime Scene Management. His expertise includes Website Hacking Investigation, IPDR Dump Analysis, VoIP / Spoof Call Tracking, Virtual Identity Tracking (WhatsApp), Email Forensics, Simbox Fraud, Twitter account analysis, Malware Analysis, Darweb Data Breaches and Darweb markets honeypots, Fake Websites Investigation, Googlization, Ewallet Frauds & Investigations.

https://www.google.com/maps/uv?pb=!1s0x3be7d174de0308b1%3A0x45283b1e0abbc869!3m1!7e115!4shttps%3A%2F%2Flh5.googleusercontent.com%2Fp%2FAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ%3Dw234-h176-k-no!5sindian%20cyber%20institute%20-%20Google%20Search!15sCgIgAQ&imagekey=!1e10!2sAF1QipNgQRSpx-JXbu5X6KC8CW6W6vsm7qNvSLO-AnVJ&hl=en&sa=X&ved=2ahUKEwjZ2JqLrc7zAhWz7XMBHWLrA4sQoip6BAhxEAM

  1. ^ Dodia, Dhanesh (Cyber crime investigation). "Emerging Cyber Risk Consultant". https://indiancyberinstitute.com. {{cite web}}: Check date values in: |date= (help); External link in |website= (help)CS1 maint: url-status (link)