Irfan Shakeel

Irfan Shakeel is the founder & CEO of An engineer, penetration tester and a security researcher. He specializes in Network, VoIP Penetration testing and digital forensics. He is the author of the book title “Hacking from Scratch”. He loves to provide training and consultancy services, and working as an independent security researcher.
Irfan Shakeel

Risk management concepts and the CISSP (Part 2) [Updated 2022]

Risk management is an important component of the CISSP exam. Learn more of what it's all about in part two.

Risk management concepts and the CISSP (part 1) [updated 2021]

Risk management is an important component of the CISSP exam. Learn what it's all about.

Nmap from beginner to advanced [updated 2021]

Network Mapper (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to m

Top 8 reverse engineering tools for cyber security professionals [updated 2021]

Whether it is rebuilding a car engine or diagramming a sentence, people can learn about many things simply by taking them apart and putting them back togethe

Average SSCP Salary [Updated 2021]

The (ISC)2 Systems Security Certified Practitioner (SSCP) is an entry-level data security certification. It focuses on these primary domains of knowledge:

Nmap evade firewall and scripting [updated 2019]

Nmap is the most powerful scanner that is used to perform so many functions including port scanning, service detection, and even vulnerability detection. Nma

Top ten hacking tools of 2019

Ethical hacking tools Hacking, which was once considered the exclusive domain of the "experts" has become a very common phenomenon with the rise of technolo

Computer Forensics: Overview of Malware Forensics [Updated 2019]

Introduction Investigating the competence of malicious software enables the IT team to enhance the assessment of a security incident, and may help prevent mo

Top 5 Web Application Security Scanners of 2018

Intro to Web Application Security Scanners Web application plays an important role in an organization and possesses a great impact and gateway to organizatio

9 free risk management tools for IT & security pros

Selecting and following the appropriate risk assessment methodology is key to creating a safe computing environment. However, the reality is that assessing r

Top 10 Linux distro for ethical hacking and penetration testing

A security-focused operating system is a hacker's best companion as it helps them to discover the weaknesses in computer systems or computer networks. Whethe

Top 5 Free Intrusion Detection Tools for Enterprise Network

Due to the complexity of today's data breaches and intrusions, deploying and maintaining network security more frequently requires a promising system to defe