First Name* Last Name* Email* Phone Number*City*Select the CityBangaloreChennaiDelhiHyderabadKolkataMumbaiAhmedabadPuneOtherUpload CV*Accepted file types: doc, docx, pdf, Max. file size: 2 MB.Do you have any blogs or page (github, reddit etc.) to show your research?* Yes No Have you worked on any of the vulnerability testing tools such as NMap, Nessus, Burp suite, Metasploit?* Yes No Have you used Kali Linux?* Yes No Vulnerability Scan check for known vulnerabilities in configuration?* Yes No Metasploit can be used for vulnerability scanning?* Yes No Qualys is used to exploit the vulnerabilities?* Yes No Vulnerability scanning is the test for exploitability of vulnerabilities and test for how much data leak if an attacker successfully exploits the vulnerability?* Yes No Using Penetration Test, it is difficult to find all possible vulnerabilities and exploit them in limited time?* Yes No Nikto is used to launch attack on databases?* Yes No If organization has a firewall, there is no need to perform penetration test.* True False * “Yes, I would like ControlCase to contact me based on the information provided above. Read our Privacy Policy for details on how your information may be used.”CommentsThis field is for validation purposes and should be left unchanged.