About Parves Kamal

Parves Kamal is a Network Security and Forensic Expert, Security+, CEH Certified. He is competent in penetration testing, vulnerability assessment, data forensics, password recovery, ethical hacking, Joomla and WordPress security, wired and wireless networking and Digital Forensics. He is currently working as a research assistant at Saint Cloud State University (United States) and as an IT training associate with Red Hat, Inc. He can be contacted via e-mail (parves.kamal@gmail.com) or Skype (parves.kamal).(parves.kamal@gmail.com) or Skype (parves.kamal).

Security Operations Center (SOC) a vital element of modern cyberwarfare

It’s a great thing to live in the age of information. With a few clicks of a mouse or keystrokes on a keyboard, we can find out almost anything we want, purchase ...

By |September 5th, 2017|

Approximate salaries for popular certifications

Globalization has led to an improved economy and massive growth in India’s information technology (IT) market. During the past 20 years, India’s IT services sector has generated more than $200 billion (U.S.). This IT boom has dovetailed with ...

By |January 17th, 2017|

RHCE certification a milestone achievement for Linux pros

Red Hat, the world’s leading provider of open source solutions is the sponsor for the Red Hat Certified Engineer (RHCE) certification. RHCE is Red Hat’s flagship certification aimed towards mid to senior level system administrators with the skills ...

By |October 5th, 2016|

CHFI certification is your gateway to computer forensics

Criminals are increasingly using digital technologies on smartphones and computers to commit crimes. As more enterprises increasingly face sophisticated cyber-attacks, the demand for highly-skilled IT security pros is

By |September 1st, 2016|

Red Hat’s RHCSA credential a great gateway into Linux realm

The Red Hat Certified System Administrator (RHCSA) credential is Red Hat’s entry-level certification for system administrators. It’s also one of the most popular certs on the market — constantly making everyone’s list of top ...

By |August 16th, 2016|

Boost your cybersecurity credibility with CompTIA’s CASP

Cybersecurity attacks at the enterprise level have become more prevalent than ever, and the increasing sophistication of such attacks makes it a top priority for employers to attract individuals who are trained and certified in advanced ...

By |July 19th, 2016|

Preventing the pernicious menace of ransomware

Ransomware is malware that makes its way, usually covertly, onto a user’s computer and then restricts access to files. Its first appearance was in 1989 with the AIDS Trojan, a virus that used a boot count to hide directories ...

By |June 7th, 2016|

Play a part in protecting the grid with these five cybersecurity certs

Today’s “Digital World” gives us a great many benefits like instantaneous communication, the ability to gather vast amounts of information ...

By |April 12th, 2016|

Do you have the skills and drive to be a certified penetration tester?

A penetration test (pen-test) is an attempt to evaluate the overall security posture of a network in order to detect vulnerabilities that could be exploited. Pen-tests are often confused with a “vulnerability scan,” “compliance audit” ...

By |March 29th, 2016|

The five most pernicious computer virus threats in India

Computer virus are as prevalent and as old as the computers they infect. The origins of computer viruses stretch all the way back to 1949 when the famous mathematician John von Neumann first published ...

By |February 9th, 2016|