Pritam S


Pritam currently serves as a Trainer at IIS/NII. His work mainly focuses on Cyber Security Trainings, Vulnerability Assessment and Penetration Testing. His Technical abilities span a very wide range of technologies across Development, Digital Forensics, Reverse Engineering and Operating Systems.

Educational Qualification

  • BSc.IT (2018)


  • Certified Ethical Hacker (CEH) EC-Council
  • Certified Information Security Consultant (CISC) - IIS Mumbai
  • Certified Professional Forensics Analyst (CPFA) - IIS Mumbai

Detailed Experience & Expertise

1 years of experience in the IT Training Industry with exposure in various Linux/Windows Operating Systems, Network Security, Web Application Security, Mobile Security and Malware Analysis.

  • Programming/Scripting Languages
    • X86 Assembly Language
    • Python
    • C/C++
    • Java
    • C#
    • Powershell Scripting
    • Shell Scripting
  • Network Security
    • Good Understanding of Netoworking and TCP/IP
    • Well versed with Network based exploitation
    • Wireless Security
  • Web Application Security
    • Good Understanding of Owasp Top 10 and Sans top 25 Vulnerabilities
    • Secure Coding in Java, ASP.NET framework, Django framework
    • Threat Modelling
  • OS Security
    • Ubuntu Workstations/Servers
    • Windows Workstations/Servers
  • Database Security
    • MySQL
    • Oracle DB
  • Digital Forensics
    • Disk Forensics with Encase
    • Memory Forensics
    • Network Forensics
    • Live Response
  • Malware Analysis
    • Reverse Engineering of Malware using disassemblers and debuggers
    • Behaviour based analysis of Malware
    • Decent knowledge of Assembly Language and writing shellcodes
    • Working Knowledge of networking concepts and protocols
    • Good working knowledge of PE Header
    • Decent knowledge of Anti Debugging and Anti Emulation Techniques used by malwares


  • Keen Interest in Reverse Engineering of Malwares, Secure Coding, Digital Forensics

Technical Skills

  • Malware Analysis Tools
    • Ghidra, IDA, Ollydbg, x64dbg, x32dbg, PE Studio, PE View, GDB, SysInternal Tools, CMD Watcher, Wireshark, Network Miner, Procmon, Process Explorer, Volatility, Windows Utility
  • VAPT Tools
    • Burpsuite, Nmap, Nessus, Metasploit


  • Certified Information Security Consultant (CISC)