top of page
Abstract Background

Penetration Testing & Vulnerability Assessment

- External Services Penetration Testing   
- Internal Services Penetration Testing
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- Mobile Application Penetration Testing
- Application Penetration Testing
- Physical Security Penetration Testing
- Cloud Architecture and Configuration Security Review
- Mobile Device Security Configuration Security Review
- Networking Infrastructure Security Review
- Wi-Fi Networks Penetration Testing Denial of Service Testing
- Data Leakage Testing
- Sensitive Data Identification

 

cyber.JPG
cyber2.JPG
_edited.jpg

                                              Info@Inkabb.net

 

 

                     Trust                  Consistent improvement         Excellence

bottom of page