You will get a penetration testing for your company
You will get a penetration testing for your company
Penetration testing
Penetration testing for network, web, cloud assets
- Delivery Time 5 days
- Application Audit
5 days
delivery —
Oct 11, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Ashish gets paid once you are satisfied with the work.
Project details
I am a cybersecurity professional with an experience of more than 8 years, my skills can definitely help in application security(web, mobile), network security, cloud security and penetration testing as a whole.
Cybersecurity Assessment Type
Penetration TestingCybersecurity Expertise
Audit, Risk Assessment, Gap AnalysisTechnology Type
Computer Network, Database, Operating System, SaaS, Web Application, CRM, Email System, ERP, Mobile DeviceCybersecurity Regulation
GDPR, ISO, HIPAA, NIST Cybersecurity Framework, PCI DSS$250
- Delivery Time 5 days
- Application Audit
Optional add-ons
You can add these on the next page.
Fast 1 Day Delivery
+$200
1 review
(1)
(0)
(0)
(0)
(0)
This project doesn't have any reviews.
BO
Ben O.
Apr 19, 2022
Ethical Hacker for penetration testing and cyber threats modeling
Ashish is an excellent Ethical hacker! He was able to find critical vulnerabilities in my web app. Ashish outsmarted 2 other ethical hackers that I hired for the same project. If you are looking for a web vulnerability expert I strongly recommend him! Thank you and we will work again for sure!
About Ashish
Expert Cybersecurity Professional with 8+ Years of Experience.
Ahmedabad, India - 4:07 pm local time
Steps for completing your project
After purchasing the project, send requirements so Ashish can start the project.
Delivery time starts when Ashish receives requirements from you.
Ashish works on your project following the steps below.
Revisions may occur after the delivery date.
Project Prompts
Prompting the client for starting and ending the day for the assessment every day to make sure we maintain transparency with the client.
Stop and report strategy
If we identify a critical vulnerability which is affecting the client, we have a strategy of stop and report, where we will report the identified vulnerability to the client as soon as identified.