You will get a professional network pen test and web apps vulnerability assessment

Peter C.
Peter C.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Peter, priced and ready to go.

You will get a professional network pen test and web apps vulnerability assessment

Peter C.
Peter C.

Select service tier

Basic security assessment

Basic network and web apps security penetration testing using automated tools

  • Delivery Time 1 day
    • Application Audit
    • Project Plan
    • Cost Estimation
1 day delivery — Oct 5, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Peter gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Assessments & Penetration Testing services from Peter, priced and ready to go.

Project details

You will get the best web application security vulnerability assessment in order to mitigate modern-day cyber security threats. I will not leave any endpoint not tested. You will get a detailed security assessment report and mitigation solutions to protect your assets from hackers or cyber criminals. I submit timely reports that are clear to understand. I test web applications against XXS, business logic vulnerabilities, SQL injections, SSRF attacks, CSRF attacks, broken authentication, security misconfiguration, and social engineering attacks among other security vulnerabilities. I do network penetration testing on computer networks, searching for flaws in wireless configurations, network server configurations, and routing protocols. I provide security threat mitigation solutions and post-cyber attack solutions. I follow industry network penetration testing and web application vulnerability assessment standards such as ISO27001, OWASP, and NIST framework.
Cybersecurity Assessment Type
Penetration Testing
Cybersecurity Expertise
Audit, Cyber Threat Intelligence, Risk Assessment
Technology Type
Firewall, Web Application
Cybersecurity Regulation
ISO, HIPAA, NIST Cybersecurity Framework, PCI DSS, SOC 2
What's included
Service Tiers Starter
$100
Standard
$550
Advanced
$1,000
Delivery Time 1 day 5 days 10 days
Application Audit
Project Plan
Cost Estimation
Peter C.

About Peter

Peter C.
Cybersecurity Analyst | DevOps| AWS| Huawei Cloud & Content Writer
Harare, Zimbabwe - 5:14 pm local time
Professional Summary
A Cyber Security Analyst with 3+ years of experience in information systems security, and web application penetration testing. I do application continuous integration and deployment(CI/CD) and I do web application vulnerability assessment and Web Application Firewall bypass security testing. An InformationTechnology Technician with over 10 years of experience supporting IT systems for universities, schools, and private organizations. I conduct network penetration testing on LANS, network infrastructure, firewall bypass, and wireless network cracking., I have experience with network design, computer servicing, Linux and Windows server configuration, and administration. I have worked with various college instructors to develop cybersecurity and network course content. I have trained dozens of students in Germany and Zimbabwe in courses ranging from Cyber Security and Digital Forensics, Linux Server Administration, Cisco Router and Switch configuration, and Network design. I do proofreading and help to collect data for research projects and presentations. I have a deep understanding of cybersecurity standards such as ISO27001, ISO27002, NIST Cybersecurity Framework, HIPPA, and OWASP.

Key InformationTechnology and Cybersecurity Expertise:
-Web application security penetration testing.
-Network penetration testing.
-Automated security vulnerability scanning using Burpsuite, CURL, Nmap, SQLMap, Nessus, Qualys, Metasploit, etc.
-Application integration and deployment.
-I have experience with Git, Docker, AWS Cloud, Huawei Cloud
-Data encryption and privacy.
-Design and install computer LAN infrastructure.
-Computer Servicing and Maintenance.
-Configure Linux servers and Windows Servers.
-Configure network firewall.
-Configure web application firewall.
-Information systems security auditing and assurance.
-Cybersecurity threat hunting and attack surface management.
I have deep experience with tools such as Burpsuite, CURL, NMap, SQLMap, CyberChef, Kali Linux,Metasploit, TCPDump,Nikto,Splunk etc.
I have a CEH Practical Certificate, CCNA CyberOp Certificate, CCNA Security, CCNP Routing and Switching, AWS, Huawei Cloud Engineer certificate, and a Higher National Diploma in Information Technology.

Steps for completing your project

After purchasing the project, send requirements so Peter can start the project.

Delivery time starts when Peter receives requirements from you.

Peter works on your project following the steps below.

Revisions may occur after the delivery date.

Step 1

Provide a general cyber security problem statement. e.g "We have finished developing our company website and we would like to have it tested for security vulnerabilities"

Step 2

The client provides expected project delivery time frames.

Review the work, release payment, and leave feedback to Peter.