Meet Deepak Kumar Nath | India’s Leading Ethical Hacker & Entrepreneur
I hope this can inspire you to become a successful ethical hacker too! Why is it important to hear the story of a successful ethical hacker along with leading innovative Entrepreneur of Odisha?
Having the vision to become an ethical hacker is great, Making it happen is another story!
Having the passion to be successful is a choice of everyone, but making it happen with the Tag of Leading Entrepreneur in Cyber Security makes him “Deepak Kumar Nath”, and define that “ Nothing is Impossible if you have that SPARK within You”
In that frame, I had the pleasure to interview Deepak Kumar Nath, one of the Leading Ethical Hacker in India.
1. Hello Mr Deepak Kumar Nath, please introduce yourself to our readers.
Hello, I am Deepak Kumar Nath, a professional Ethical Hacker cum Entrepreneur who has started his journey in 2011-12 as someone who has a keen interest in Hacking & Innovation. I have started GTP(Global Tech Promoters) in 2013 for providing services to clients and training to students and till now I have trained more than 45k students across globe and also providing services to 500+ companies(including FirstBank Nigeria, Union Bank Kenya, Ministry of Qatar, Ministry of Ghana etc.) and moreover I have trained IPS officers for Cyber Crime Investigation. Working & Managing Team in the field of cybersecurity and presently associated with 15+ different companies who are doing the same. I am CEH, CPTE, CISSO, CEI, CISCO Certified Instructor, Lead Auditor etc. and was awarded Youth of Odisha, Innovative Entrepreneur award, etc. I went to different events like TEDx IIIT Bhubaneswar, Tech Bhubaneswar, Next-Gen IT Conclave Bangaluru, etc. As a speaker to motivate and aware & demonstrate about the scope and opportunity along with the advanced aspects in the cyber security field. I am involved in Research & Development with Innovation, Providing Unique Qualitative Services by Simplifying Technology. I got acknowledgements from Microsoft, Facebook, Mastercard, Sony, AT&T and many more as a security researcher from 2014.
2. Why you have decided to pursue Ethical Hacking as a career option.
First of all the word “hacking” excites me a lot. I had a deep sense of interest in cybersecurity and ethical hacking since 12th Class. I belonged to EEE background in college as I was keenly inspired by Nikola Tesla for his wireless transmission of energy but during my study I felt, this the traditional education we were following so that I used to do continue what I was interested in i.e “Hacking”. I do believe that if you make your interest as your career option you will never feel it like a load rather you will enjoy it and because of all this, I ended up choosing Ethical Hacking as a career option.
3. How you had started your journey in the cyber world.
During my early days, I faced a lot of difficulties as there is no one to guide and encourage and people used to tell me that I am wasting my time but I didn’t care and started learning by my own. I used to find bugs and try to hack different websites and soon We created a team of hackers named “ODISHA CYBER FORCE” with some members with great hope. But it did not happen as we thought. Thereafter, students came out of curiosity and asked me about how I hacked these websites and asked for training, this thing motivated me and made me feel that I am doing something new and productive and to let people know about this, I took my first training workshop at Rajendra College, Bolangir and received amazing feedback. So, In 2014 when I was in the third year of my college I was invited as Guest Speaker for a training program at Dr.Ambedkar Institute of Technology at Bangaluru and found my vision that is to improve and shape the technology in the cyber world and aware students about its importance. From this vision, I started my journey and every day I try to proceed it without looking back.
During initial days, got some projects and when I completed successfully one by one along with the vision that yes we can do more and now we are expanding in many countries with a huge clientele. For me, it’s huge as I never thought or imagined what I am pursuing now. My Lord Jagannath and the support of my parents, friends, students and clients are blessed me to go ahead and I am trying the same from my core of heart.
4. What are the amazing things you did in the field of Ethical Hacking?
Initially, I was just curious towards Debugging, Website Hacking and with many hacking teams, we also started to work like CODE104, Indi4n H4x0R T34M and many more. Also started as a bug bounty researcher and received many more hall of fame as acknowledgements in Microsoft, Blackberry, Sony, Mastercard, Facebook, Inflectra and many more, that boosted my encouragement and I found my bread and butter in this field and today We are operating in 12 Countries including UAE, Qatar, Nigeria, Malawi, Kenya, Saudi etc. We have 15+ associated partners and having 82+ Team Members offering Onsite and both Offsite Assessments.
5. What are useful online and offline sources to learn ethical hacking?
Nowadays a lot of educational courses are available on online platforms like Udemy but offline or physical courses always have more importance in the market because of their professionalism. The professional cybersecurity with tools and with manual testing in a live perspective gives more knowledge.
In normal training, we can absorb normal demo training but physical training the trainer gives better knowledge practically. Students can learn with live perspectives and live knowledge. You can also join our courses & Certifications as we also offer courses on cybersecurity in Global Institute of Information Security where we are offering courses & Certifications on cybersecurity and ethical hacking on the long term and short term perspective and there are a lot of job opportunities and students can avail.
Empowering Skills with the Certifications can help students to get success. We are also Offering Certifications like CEH, ECSA, CHFI, CPTE, CISCO, CCNA Security from ECCouncil, Mile2, CISCO Networking Academy and many more International Certification Provider. We are also offering CGEH, Diploma in Cyber Security, Master in Cyber Security and other Certifications as well. We have given training through Seminar, Workshops on Ethical Hacking & Cyber Security in all most 150+ Colleges all over India. Through the Cisco Networking Academy, I launched the 1st CISCO Cyber ops Workshop in Andhra Pradesh and trained huge students in Andhra Pradesh, Telangana, West Bengal, Nagaland etc. Not only in Colleges but also in Corporates we have trained Professionals including Wipro, SIDBI, Microfinance Companies and many more companies.
6. What is the scope of ethical hacking?
See, nowadays cybersecurity is growing because the no.of users keep increasing each day and all of them are involved with the internet and IT in wide perspectives. Talking of the career opportunities and the job empowerment in the society then after Engineering all the Computer Science and IT students join the IT sectors and in Corporates, all are going ahead as programmers and developers. And a time will come when the demand may decrease because increasing no.of interested people in the field. In cybersecurity, if the students are given the right direction it may add fuel to their interests and more and more people can opt for this as their career option.
Ethical hacking is full of excitement and there is a lot to study in it.
A lot of loopholes prevail in the company websites of MNC’s and they are vulnerable too, which leads to user and data leaks. No physical crime will happen in the upcoming % years if more no.of interested students involved in cybersecurity. The certifications are most needed with knowledge example CEH which is offered by GIIS. Through Bug Bounty, without any jobs, you can get hall of fame and earn in dollars.
7. What advice will you give our reader to stay safe online?
The cyber world is totally vulnerable. In the past 3 to 4 years, huge no. of user base we have after demonetization, and Jio movement a lot of users are present on the internet, and it’s essentially important to be safe and secure on the internet. It’s unpredictable to analyse how many users fall prey of online hacking because hackers have different ways and mode to hack, but several recommendations and precautions can be taken so that the amount of hacking gets reduced.
Firstly a lot of ATM’s, credit and debit card hackings are going on, and to protect the users from these high-risk attacks, simply we can use 2 numbers, one to use with the smartphone and the other one is supposed to be linked with Aadhar card, ATM no, account number and all the sensitive information that should not have any unauthorised access. The other number should be used for calling and other purposes so that the attacker does not get any close clue to hack your account details or information as they don’t have the idea of your mobile number linked to it. We can prevent it in maximum ways.
Other than that, don’t download any applications from unwanted sites or click on any pop-up links which may jitter your details and can give easy access to your hacker. The pop-up and spam messages should be avoided in mails in other platforms to reduce the risk of getting hacked. Any cards swiped in ATMs one should keep track of CCTV cameras and many magnetic strippers are attached to the card to grab information. Apart from that don’t connect your phones to open wifi connections to stop hackers from attacking and grabbing the details related.
8. Why does a company need cybersecurity, and what opportunities or services are you providing with?
Cybersecurity services are of utmost importance in today’s market. See, companies can develop wonderful software but there is a high chance of bugs and all kinds of vulnerabilities to harm the systems. Our job is to find these bugs and vulnerabilities and fix them. we are offering more than 130 services in cyber security field like WAPT, VAPT, Enterprise Security, Security Compliances i.e ISO 27001, SOC Compliance, CMMI Compliance, PCI DSS Compliance, PA DSS Compliance etc, Cyber Crime Investigation, Secure Source Code Review, Server Hardening etc. apart from it We are also provide Secure Web Development, Secure Mobile Apps Development along with Innovative Digital Marketing Services.
We are a complete package of things required for the protection and development of your software with our cybersecurity techniques. Recently, there had been news of Wipro detecting a potentially abnormal activity in a few employee accounts on their network due to an advanced phishing campaign. So if such big corporates can experience this level of data breach activities, it means things need to be taken care of. Handling Ransomware attacks, incident handling attacks, Enterprise Security and risk management are the steps mostly needed by a company, and here we are offering in a vast way with a huge number of certified professionals working with us. Cyber Security acts as a bodyguard to the computer systems and we are here to provide you with this security. We are a complete package of things required for the protection and development of your software with our cybersecurity techniques.
Sir I really liked your article, I am a web developer and it would be great if you give me some tips on how to build more secured websites.
Wow inspiring story.