Security is just an ILLUSION

"If we are not able to Penetrate or Hack any Technology, it means we have technical Issue. Individual or Hacker who is highly Qualified and well trained in Technological Areas or Domain then he can break any Complex Technological system within an Hour."

-- Harshad Shah
(Chief Information Security Officer)

Image placeholder

About Author

He is the Founder and CISO of CyberShield Community Pvt. Ltd. popularly known as Hacker Associate. Being a member of International Council of Hacker Association in United States of America, he is here for substantially improving the ability of cyber security in India and to defend its critical cyber crimes. He has initiated various free Penetration Testing and Hacking Conferences all over the world.

He is a Penetration Tester and he had done Penetration Testing in many Computer System, Wireless Network, Web Application, Cloud infrastructure, VOIP based System and Mobile Phone System. He has introduced various Cryptographic method to secure Cyberspace.




WORK EXPERIENCE

CFO (CO-FOUNDER)
QSPACE SOLUTIONS (QATAR)
2015-Current
FOUNDER and CISO
HACKER ASSOCIATE
2017-Current

EDUCATION

B.TECH (BACHELOR OF TECHNOLOGY)
Computer Science and Engg.
2009-2013
M.TECH (MASTER OF TECHNOLOGY)
Information Technology
2014-2016

PROFILE

Globally recognized as the Penetration tester and Computer Forensic Investigator, Harshad Shah is an active member and Chief Information Security Officer at Hacker Associate (CyberShield Community Pvt. Ltd.). As a member of the International Hacker Association in United States of America (USA), his main interest lies in instilling and improving the cyber security in India and to defend its critical cybercrimes. In order to make people aware of new cyber security techniques, he has initiated various free conferences on topics of Penetration Testing and Hacking from Hacker Associate in many colleges and corporate sector of Bengaluru. As a Penetration Tester, Harshad Shah has demonstrated (manifested) his skills in many computer systems, Cloud Infrastructure, VOIP based and Mobile Phone System. He has also conducted online sessions on the same from ECA in Kolkata and Gulf countries.

Harshad Shah started his career as a White Hat Hacker in 2013 after finishing his B.Tech degree in Computer Engineering from the Rajasthan TechnologicalUniversity. As of now, he has nearly 6 years of experience in the Penetration Testing and Cloud Security. He has been awarded for Cloud Security and Cloud Forensics by African Army Head Quarters in July 2013 for having finished a project assigned by the Ugandan Forensic Bureau. He is also an Information Security Specialist and has expertise in various operating systems like Backtrack, Kali, Redhat, Ubuntu, Bugtraq and CAINE (Computer Aided Investigative Environment). He has industrial Experience in managing the overall Wireless Security operations with key like WEP/WPA/WPA2 and Peap and Leap. Having experience in Data Storage on Cloud platforms, Harshad Shah hasintroduced the Cloud Penetration Testing to Provide Security in Cloud infrastructure and has also received an award for Cloud computing and Hacking. He has also designed a Robot based on Remote Control and this Robot named Pick & Drop could be used for Monitoring and Surveillance using Web Cam Interface. He has received the best performance award on the working model of Robot, handed over by the Disaster Management and Relief Minister of Rajasthan.

As a Researcher, Harshad Shah's research paper on Cloud computing and Hacking was published in the National Conference on Advancement of Information Computer and Communication in the year 2013. He has started the Indian Conference on Advanced Penetration Testing to introduce the latest threats and vulnerability in computer systems. He also has expertise in cybercrime/mobile crime and security, cyber law, assessing, mapping security requirements and translating these requirements into techno functional specifications, custom designing solutions and troubleshooting for complex information systems management by following the standard guidelines. Proficient at managing and leading multi-cultural teams, he has exhibited his leadership qualities in guiding those teams towards identifying factors critical to network security.

Along with this, he is also working with the Government agencies like Army, Air Force, Navy and other Intelligence Defense agencies. He has stated the 'Offensive Hacking for Defensive Purposes' for Government agencies.

He has been rewarded by many countries like Nepal, Qatar, Africa, Dubai, USA, Australia etc., for his revolutionary works. Till date, Harshad Shah has given Cyber security and Information Security services over more than 70 countries and he has Industrial Experience in Managing IOT (Internet of Things) devices and Penetration Testing of those IOT devices. He has also started IOT Penetration Testing and IOT Forensics training for Individual Professionals and Corporate people.

Apart from the Information Security, he is also an Android Developer and he has developed various Android applications using the PAAS (Platform as a Service) technology and also by using the Android Development Framework.He helps his clients in the Government, Law Enforcement, Defense, IT 86 ITES companies around the globe to identify, prevent, detect, resolve and protect from threats, crimes, Frauds and acts ofterrorismarising due to vast proliferation and usage of the Digital and Communication applications and artifacts in day to day from personal to professional lives.He is providing Cyber Security services like digital crime and fraud investigation, Incident response, Digital Evidence collection and Analysis, SOC, N0C, Malware analysis. E-discovery services, communication security, Email-security, IOT security, Mobile security, DLP and Physical Security and many more. He had started so many Security Conferences like the Indian Conference, 'Secure the Planet' Conference, Cyber Security Conference for raising awareness among the Indian public about the risk of Online activities and he has also expanded the number of skilled workers capable of supporting a cyber-secure nation. His strategic planning provides a wide spectrum of knowledge in National Cyber Security spanning from Public awareness to professional employment and development and also to develop the next generation of Cyber Security workers encouraging them in fields of Science, Technology and Engineering.

Travelling all over the world, Harshad Shah has initiated Build our own Gadget for Security and Penetration Testing and programs on Python for White Hat Hackers worldwide. He has also provided various training sessions and consulting solutions in the field of Ethical Hacking and Penetration Testing. Some of his training sessions include Android Engineering and Development Conference, Offensive and Defensive Hacking Conference, Wireless Hacking and Security Methodology Conference, Hacker Associate Licensed Penetration Testing, Offensive Hacking and Security Session at Adept Technology, Offensive Hacking and Security Session, CISSP Session (Certified Information System Security Professional), Offensive Wireless Penetration Testing, Certified Network Defense Architect Session for Gulf Country, Infrastructure Security and Network Security Session, ECSA (Penetration Testing) Online Session for Corporate (Kolkata).

As a philanthropist, Harshad Shah's vision was to make the society aware of cyber-attacks and to protect the enterprises and government organizations from "Next Generation Cyber Attacks". To achieve this, he is providing trainings and arming their IT team with the latest technologies and systems available globally. He was in media several times explaining about ATM Hacking and Security, 50km Wi-Fi Hacking, Mobile Security, and Email Security.

EXPERTISE

  • Cloud Security
  • IOT Security
  • Mobile Security
  • Server Security
  • Wireless Security
  • Web Application Penetration Testing

INFOSEC Certifications

  • Certified Ethical Hacker (CEH)
  • Licensed Penetration Tester (LPT)
  • Red Hat Certified System Administrator (RHCSA)
  • Red Hat Certified Engineer (RHCE)
  • Certified Network Defence Architecture (CNDA)
  • OSCP (Offensive Sec. Certified Prof.)
  • Certificate of Expertise in Red Hat Cloud Storage (COE - India’s First)
  • Certificate of Expertise in Open Stack (COE - Cloud Computing)
  • Red Hat Certified Visualization Administrator (RHCVA)
  • Certificate of Expertise in Directory services and Authentication (LDAP / OpenLDAP)
  • Certificate of Expertise in Cryptographic Technique (COE - CT)
  • Certified Information Security Professional (CISSP)
  • Computer Security Auditor (CSA)
  • Computer Hacking Forensic Investigator (CHFI)
  • Wireless Penetration tester
  • Certified in Micro-controller Programming from Microchip
  • Android Penetration Tester
  • Digital Evidence Collection and Management
  • Computer Security Auditor (CSA)
  • Mobile Penetration Tester
  • VOIP (Voice Over IP) Penetration Tester
  • Certified in Robotic Engineering
  • Certified in PCB designing