
Kuldeep Sonar
CISM | CEH | CSAP | ECSA | CSA | CND | CHFI | Security+ | CYSA+ | ITIL
Foundation v4
M.S.IET | MCA | BCA | Diploma in Education, Teaching and Learning
With over 14 years of experience in IT infrastructure and cyber security training, I am a Principal Corporate Technical
Trainer, a leading provider of customized and innovative learning solutions.
I hold CISM, CEH, Security+, CYSA+, CSAP, ECSA, CSA, CHFI, CND certifications, as well as skills in Cyber Security, Information
Security, Governance, Risk and Compliance (GRC), IAM, VAPT, Digital Forensics, Cloud Security, Incident Response, and
Ethical Hacking.
Delivering certifications training of various renowned global certifications institutions Ec-Council, CompTIA, ISACA, ISA,
SANS, Cyber Ranges, OffSec, Microsoft, CISCO, Okta, Tenable, Qualys, Symantec, Maltego, Port Swigger, OWASP, Wireshark,
MacAfee, ISC2, Sophos, Rapid7, Splunk, AlienVault, MITRE, NIST etc.
I deliver engaging and effective training programs, both online and in-person, for various sectors, including Information
Technology, Automation, Automobile, SOC and NOC, Datacentres, Government, BFSI, Telecom, Education, Healthcare and
Manufacturing.
I design and develop course content, study notes, lab guides, and assessments, tailored to the needs and levels of the
audience.
My mission is to help organizations and individuals enhance their IT and cyber security competencies and capabilities, and
to foster a culture of security awareness and best practices.
Security Tools
■ Security OS : Kali Linux, Parrot OS
■ Cloud Security : Defender, InsightCloudSec, Orca, Vision One, Infoblox
■ OSINT :Maltego, Recon-Ng, Shodan, Censys
■ Sandbox : Any.Run, Hybrid Analysis, Virustotal
■ Vulnerability Assessment : Tenable Nessus, OpenVas, Qualys, GVM
■ Penetration Testing : Metasploit, Armitage
■ CTI : Abuse.ch, Alienvault, MISP, OpenCTI, STIX, xForce
■ Web Security : BurpSuite, OWASP ZAP, Ivanti, Accunetix, Thales
■ Digital Forensics : Autopsy, Sleuth Kit, CAINE, DFF, Volatility, Encase
■ Wireless : Aircrack-ng, Fern, Mana Toolkit
■ Reverse Engineering : Ghidra, Bytecode, Binwalk, Fiddler, IDA
■ Social Engineering : Social Engineering Toolkit (SET), BeEF
■ SIEM : Splunk, LogRhythm, Hunters SOC, Rapid7 SIEM, ELK Stack
(Elasticsearch, Logstash, Kibana)
■ Database Security :sqlmap
■ Mobile Security : MobSF
■ DLP : Symantec, Palo Alto, ForcePoint
■ EDR/XDR : McAfee, Kaspersky, ME, Sophos, Trend Micro, Ivanti
■ Email Security : Proofpoint, Mimecast, Darktrace, Fortimail,
■ SOAR : Splunk, Rapid7 InsightConnect , Log360, Palo Alto Cortex
■ IAM : Okta, Auth0, Ping, SailPoint, Duo, CyberArk, Thales
■ PAM : One Identity, Ping, Entra ID, Okta, BeyondTrust
■ Framework : CSF, RMF,OWASP, REBIT, GDPR, MITRE Attack
■ MDM : Airwatch, Soti, SMM, Soti MobiControl, Ivanti, ME, Microsoft
■ Data Security : CyberChef, OpenSearch, Seclore, A10 Networks
■ Asset Management : Manage Engine, Spiceworks, Ivanti, Lansweeper
■ Patch Management : SolarWinds, Action1, Atera
■ IoT/OT Security : Tenable, Microsoft Defender, Darktrace, Trend Micro
■ IPS/IDS : Snort, Suricata, OSSEC
■ Network Traffic Analysis: Malcolm, Hedgehog, Suricata
■ Network Monitoring : Arkime, Zeek, Nmap,Legion, Attivo, FireMon
■ Firewall : OPNsense, F5 Big IP & APM, Forta
■ WAF : Imperva, Modsecurity, Akamai
■ Threat Modelling : Threat Dragon, Cairis, Threat Modeler, Threagile
■ Governance, Risk and Compliance (GRC) : RSA Archer, LogicManager,
Riskonnect, Fusion , OneTrust, OvalEdge, Omnissa, Cybereason
IT Infrastructure Tools
■ OS Linux : Ubuntu Server and Client, Ubuntu Server and Client
■ Networking : GNS3, Packet Tracer
■ Packet Monitoring : Wireshark
■ Hypervisor : Hyper-V, VMware, VirtualBox
■ OS Windows : Server 2012/16/19, Windows 10/11
■ ITSM : ServiceNow, Jira, OPSi, Zendesk
■ Data center : DCIM
■ Storage-Backup : Veritas NetBackup, NetApp
■ Workflow : Tines Administration
■ Wireless :PRPL WRT, WIFI-7
■ Deploying Managing Endpoint : Symantec – GHOST® Solution Suite
■ Infrastructure Monitoring and Management :SolarWinds Orion Platform, ManageEngine, Spiceworks, Nagios
Certification Details
1 Certified Information Security Manager (CISM)
2 Certified SOC Analyst v1 (CSA) 321-39
3 Certified Ethical Hacker (CEH v12) 312–50
4 Certified Security Analyst: Penetration Testing (ECSA) 312-50
5 Computer Hacking Forensic Investigator (CHFI) 312-49
6 Certified Network Defender (CND) 312-38
7 Security+ SY0-601 and SY0-701
8 CompTIA CYSA+ CS0-003
9 Security Analytics Professional (CSAP)
10 ITIL Foundation v4



