LinkedInThis field is for validation purposes and should be left unchanged.First Name*Last Name*Email* Phone Number*City*Select the CityBangaloreChennaiDelhiHyderabadKolkataMumbaiAhmedabadPuneOtherUpload CV*Accepted file types: doc, docx, pdf, Max. file size: 2 MB. Do you have any blogs or page (github, reddit etc.) to show your research?* Yes No Have you worked on any of the vulnerability testing tools such as NMap, Nessus, Burp suite, Metasploit?* Yes No Have you used Kali Linux?* Yes No Vulnerability Scan check for known vulnerabilities in configuration?* Yes No Metasploit can be used for vulnerability scanning?* Yes No Qualys is used to exploit the vulnerabilities?* Yes No Vulnerability scanning is the test for exploitability of vulnerabilities and test for how much data leak if an attacker successfully exploits the vulnerability?* Yes No Using Penetration Test, it is difficult to find all possible vulnerabilities and exploit them in limited time?* Yes No Nikto is used to launch attack on databases?* Yes No If organization has a firewall, there is no need to perform penetration test.* True False * “Yes, I would like ControlCase to contact me based on the information provided above. Read our Privacy Policy for details on how your information may be used.”