I am Collin Berman, an experienced cybersecurity professional dedicated to protecting businesses from digital threats.
Contact Me
×
Web Application Penetration Testing
I offer Web Application Penetration Testing to identify security vulnerabilities in your web applications before they can be exploited. I conduct comprehensive automated and manual testing using the latest techniques and tools to ensure your applications are secure against common and uncommon vulnerabilities. I look for the OWASP Top 10 risks to web applications, including broken access controls, injection, cross-site attacks, and other web vulnerabilities.
×
Cloud Security Evaluation
My Cloud Security Evaluation focuses on assessing the IAM security posture of your cloud environments. I evaluate your cloud configurations, identity and access management practices, and overall cloud infrastructure to identify potential security risks and recommend best practices for securing your cloud assets.
×
Cybersecurity Speaking and Training
I provide expert-led cybersecurity speaking engagements and training workshops designed to educate your team on the latest security threats and defense strategies. My programs are tailored to your organization's needs, helping to enhance awareness and foster a culture of security.
×
Pentest Scoping
The Initial Scoping Call is an essential part of the penetration testing process. During this call, we discuss the scope of the test, identify key assets and nightmare risk scenarios, and establish testing boundaries to ensure a thorough and effective security assessment tailored to your needs.
×
Penetration Testing
My Penetration Testing process involves a rigorous examination using tools like Burp Suite Professional to detect and exploit vulnerabilities in your system. This methodical approach helps me uncover critical security weaknesses that could be exploited by attackers.
×
Pentest Report
After completing the pentest, I provide a detailed report outlining my findings, the impacts of each identified vulnerability, recommended remediations, and steps to reproduce the vulnerabilities yourself. I also conduct a review up meeting to discuss these findings in detail, ensuring you fully understand the risks and recommended steps to secure your systems. See an example of my reports here.
×
Pentesting Follow Ups
My follow-up services after a pentest include retesting to verify remediation of previously discovered issues and subsequent testing to cover new features or changes in your environment. This ensures ongoing protection and adaptation to new security challenges.