Posts by Collection

portfolio

publications

talks

Certified Network Security Specialist (CNSS)

Published:

This course by the International Cybersecurity Institute – Certified Network Security Specialist a.k.a ICSI CNSS provides a detailed overview of modern network security including operating system hardening, firewalls, intrusion-detection systems, VPNs, and Encryption. The course also includes topics such as physical security standards, system security, and security policies..

Certification

Certified Secure Computer User (CSCU)

Published:

The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

Stellar Cyber Certified Associate

Published:

Stellar Cyber unifies currently disjointed security tools and data sources to fully visualize, correlate through AI, and automatically detect, investigate and respond to all attack activities.

Elearn Security Junior Penetration Tester (eJPT)

Published:

eLearnSecurity Junior Penetration Tester (eJPT) is a 100% practical certification on penetration testing and information security essentials. Passing the exam and obtaining the certificate will prove your shills as a penetration tester.

Certified Ethical Hacker (CEH)

Published:

A Certified Ethical Hacker (CEH) is a person trained to penetrate their own computer system or that of a client in order to determine what vulnerabilities exist and how to apply protective, corrective, and preventive countermeasures. This helps to mitigate risk and protect the system from being compromised by an unethical hacker or cybercriminal. The CEH is trained to look for weaknesses that can be exploited using the same tools a hacker would use to attack. Their job may include making recommendations for how to patch vulnerabilities or creating strategies to prevent malicious attacks.

Microsoft Certified: Security Operations Analyst Associate (SC-200)

Published:

The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders.

Certified SOC Analyst (CSA)

Published:

The Certified SOC Analyst has an in-depth understanding of various attack methodologies, to collaborating with the IRTs in case of an incident. A certified member has adequate knowledge to bring people, process and technology together and provide a comprehensive skill set to manage a robust security operation centre with enhanced incident detection and response capabilities.

teaching

Teaching experience 1

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Teaching experience 2

Workshop, University 1, Department, 2015

This is a description of a teaching experience. You can use markdown like any other post.