• Boot camps & training
  • Awareness & anti-phishing
  • Community
    • Topics
    • Certification Prep
    • Cyber Work
    • About us
    • Back
    • Industry insights
    • Phishing
    • Hacking
    • Capture the flag (CTF)
    • Professional development
    • Security awareness
    • Penetration testing
    • Cyber ranges
    • General security
    • Management & compliance
    • Malware analysis
    • MITRE ATT&CK™
    • News
    • Application security
    • Digital forensics
    • View all
    • Back
    • Back
    • (ISC)² CISSP
    • (ISC)² CCSP
    • (ISC)² CAP
    • Cisco CCNA
    • CMMC
    • CompTIA A+
    • CompTIA Network+
    • CompTIA Security+
    • CompTIA CySA+
    • CompTIA PenTest+
    • CompTIA CASP+
    • EC-Council CEH
    • ISACA CDPSE
    • ISACA CGEIT
    • ISACA CISA
    • ISACA CISM
    • ISACA CRISC
    • Microsoft Azure
    • PMP
    • View all
    • Back
    • Cyber Work Podcast
    • Cyber Work Live
    • Back
    • Contact us
    • Contributors

Shubham Vashist

Shubham Vashist, from India, is an enthusiastic Information Security Researcher & Web application Security Tester. Having earned a Computer Science and Engineering degree, he has gained experience by learning, practicing and reporting loopholes to application vendors. His passion is to secure applications from attackers and make them reliable.

Management, compliance & auditing December 10, 2019 Shubham Vashist

Secure process audit

A secure process audit is a type of security audit in which the tester (auditor) tests the application or server or any network device where he or she captures...
Penetration testing May 8, 2019 Shubham Vashist

Segmentation penetration testing for PCI compliance

Network segments are now a part of any organization or business’s infrastructure. Network segmentation is the splitting of a computer network within the infrastructure...
Penetration testing July 10, 2018 Shubham Vashist

Top 5 (deliberately) vulnerable web applications to practice your skills on

The OWASP Top 10 includes the top 10 vulnerabilities which are followed worldwide by security researchers and developers. You must have heard or used lots of...
Infosec logo

Topics

Hacking Penetration testing Cyber ranges Capture the flag Malware analysis Professional development General security News Security awareness Phishing Management, compliance & auditing Digital forensics Threat intelligence DoD 8570 View all topics

Certifications

CISSP CCSP CGEIT CEH CCNA CISA CISM CRISC A+ Network+ Security+ CASP+ PMP CySA+ CMMC Microsoft Azure View all certifications

Careers

IT auditor Cybersecurity architect Cybercrime investigator Penetration tester Cybersecurity consultant Cybersecurity analyst Cybersecurity engineer Cybersecurity manager Incident responder Information security auditor Information security manager View all careers

Company

Contact us About Infosec Work at Infosec Newsroom Partner program
  • Infosec, part of Cengage Group — ©2023 Infosec Institute, Inc.
    • Trademarks
    • Privacy Policy