About Me
Talented individual with information technology background, strong desire to grow technical skills, and ability to learn new technologies swiftly. Hopeful for a Cyber Security/ IT support position coming with internship experience, great communication skills, and proficiency in all Microsoft Office tools, as well as high attention to detail.
- Name: Alance Bhandari
- Website: www.alancebhandari.com.np
- Phone: 9742424182
- City: Kathmandu
- Age: 20
- Degree: Bachelor
- Email: [email protected]
- Freelance: Not available
Projects: Security Pen Tester, VAPT, Library Management System (Python), GUI Registration Form
Years of experience: Vairav Technology
Awards: AWS, Cyber attack
My Resume
Hello I am a Ethical Hacker
Summary
Alance Bhandari
Highly motivated and skilled hacker with experience in penetration testing, network security, and ethical hacking. Proven ability to identify and exploit vulnerabilities in systems, as well as implement security measures to protect against cyber threats.
- Kathmandu, Nepal
- 9742424182
- [email protected]
Education
Bsc (Hons) Computer Network & IT Security
2021 - Present
Islington College
London Metropolitan University
Kamalpokhari, Kathmandu, Nepal
+2 Management
2018 - 2020
National College Of Computer Studies
Paknajol, Kathmandu, Nepal
Professional Experience
Security Pen Tester
2021
Vairav Technology
- Gathering information about the target system, including IP addresses, open ports, and running services.
- Identifying potential vulnerabilities in the target system using automated tools.
- Attempting to exploit identified vulnerabilities to gain access to the target system.
- Documenting the results of the penetration test and providing recommendations for improving security.
Vulnerability Assessment and Penetration Testing.
2022
Vairav Technology
- Attempting to exploit identified vulnerabilities to gain access to the target system, this step can be done manually or by using automated tools.
- Gathering information about the target system, including IP addresses, open ports, and running services.
- Attempting to exploit identified vulnerabilities to gain access to the target system.
- Documenting the results of the VAPT process and providing recommendations for improving security.