Hi, I’m Bapu Kiran Malla
Area of Expertise: Cyber Security – CEH, CHFI, Computer Hardware, Networking, Cisco, EC Council, Artificial Intelligence, Mechatronics, Python
Education:B.Tech Information Technology
Certifications: 87 +
Statistics
experience
Large programs /
projects managed
Organizations
transformed to agile
“Successful Agile Transformation is all about the leadership walking and talking about their commitment to an agile enterprise. More often than not, Agility is viewed as a goal at a team level, however, without the leadership demonstrating their passion for Agile, benefits of Agile transformation are unlikely to materialize.”
Bapu Kiran Malla
Sr. Consultant/Corporate Trainer
Bapu Kiran Malla
Sr. Consultant/Corporate Trainer
About Me
Sr. Consultant/Corporate Trainer: ITES, Networking, Network Security/Security Consultant. Ethical Hacking with 12+ years of rich experience in Computer Hardware, Networking, Forensic Investigation, Penetration Testing. As an Information Security Consultant/Penetration Tester & Lead Instructor, I delivered Information Security Certification training under the Professional Development Centre at Eikon Technologies, Jayanagar, Bangalore, an accredited EC-Council training center. I am a prolific Information Security consultant/trainer and have conducted numerous security training, workshops, and seminars across India. I am a Certified EC Council Instructor (CEI), Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), EC-Council Certified Security Analyst (ECSA), and a Licensed Penetration Tester (LPT) from EC-Council Academy. Well-versed with handling a diverse range of information security domains, including policy design and development, vulnerability & risk assessment, treatment, penetration testing, intrusion detection & prevention, forensic & data recovery, deploying Firewall policy, application security testing, and vulnerability analysis. The ability to serve as a corporate security Trainer by ensuring technical security planning, testing, verification, and risk analysis by TCP/IP protocols. Capable of defining, deploying, and monitoring risk management, compliance, and information security programs while functioning as a primary IT disaster recovery coordinator.