Implementing and Administering Security in a Microsoft Windows Server 2003 Network. Designing Security for a Microsoft Windows Server 2003 Network

Size: px
Start display at page:

Download "Implementing and Administering Security in a Microsoft Windows Server 2003 Network. Designing Security for a Microsoft Windows Server 2003 Network"

Transcription

1 Sohrab (Mohsen) Valipour Karimi Web Application & Network Penetration Testing and Security Darvaze Shemiran, Sadat St, Sepehr St, NO 36 Telephone: EDUCATION Feb/85 Feb/89 Elm o Honar (Yazd governmental University), B.C Computer of Science CERTIFICATIONS Implementing and Administering Security in a Microsoft Windows Server 2003 Network Designing Security for a Microsoft Windows Server 2003 Network Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network MCITP: Enterprise Administrator on Windows Server 2008 Planning, Implementing, and Maintaining a Microsoft Windows Server 2008 Active Directory Forefront Threat Management Gateway 2010 Cisco Router & Switch Certified security Associate (CCNA) Cisco Router & Switch Certified Network professional(ccnp) EC-Council s Licensed Penetration Tester (LPT) Certified Ethical Hacker (CEH) EC-Council s Security Administrator (ECSA) EC-Council s Network Security Administration (ENSA) 1

2 Offensive Security Advance Web Attack & Exploitation (OSWE) Computer Hacking Forensic Investigator (CHFI) Offensive Security Penetration Testing with Kali Linux and Back Track (OSCP) Offensive Security Wireless Attacks (OSWP) Advance Web Attack & Exploitation (SANS ) Javascript For Penetration Testing (Petester Academy) Python For Penetration Testing (SANS) EC-Council Certified Secure Computer User (CSCU) - Juniper Firewall SRX Series (Junos) PROFESSIONAL APPOINTMENTS International Experiences Jun 2017 Cgitems Company (England) o Web application and Server Penetration Testing Internal Experience Aug/2017 Radin Behkar Company o Network Penetration Testing o Web Application Penetration Testing o Install and Configuration Firewall and WAF o Security Designingting Jul/2017 Phoenix Training Academy o Web Application Penetration 2

3 May/2017 Iranian Mandegar Company o Web Application Penetration Jan/2017 Nov /2016 Mar/2016 Website and Webapp Design and Mobile App o PHP, My SQL, Node js, Android Hackingtutorial.org Individual Exprince o Penetration Testing Online Trader web App Until Now The Ministry of Justice o Direct Manager Of Penetration Testing Team o Pentration Testing Web Application o Pentration Testing Servers and LAN o Hardening Web Application codes o Firewall tunning - Fortigate o Protocol capture, Trace and Sniffing with Wireshark Mar/2016 Sep/2015- Mar/2016 Until Now Center Of Information & Technology Statistics judiciary o Pentration Testing Web Application (#2) o Pentration Testing Servers and LAN o Hardening Web Application codes o Firewall tunning - Juniper and Fortigate Solico Group o Supervisor Network Security o DMZ Designing o Firewall& UTM Configuration (Fortigate,ASA) o Pentration Testing Web Portal o SysLog and Log Analyzer Installation & Configuration o Penetration Testing Interor Web portal and Website o Penetration Testing LAN o Pentration Testing FireWall Apr/ Apr/2015 Apr/ Jun/2015 Jun/2014 March Shemiran Legal Institute,Tehran o Penetration Testing Web site and Secure Coding o Website Design Saba Pardazesh, Tehran o Bank TejaratWebSitePentration testing o HoneyPot Installation and Configuration Council dispute resolution, Tehran o Microsoft Network Domain Designing For 600 Client o NetworkAdministrator, SecurityConsultant o Penetration Testing WIFI, Interor Portal & Network 3

4 o Firewall Tuning, WAF implementation, Hardening Servers o Firewall Juniper configuration o IPS Snort installation o VmwareEsx Installation Jul/2011 Dec/2011 Refinement Oil.Co, Tehran o Network Administrator (Microsoft -Security) Individual Teaching Experiences -Sep/2017 -Aug/2017 Phoenix Penetration Academy o Network Penetration o Web Application SANS (sec and sec ) MFT o Network Penetration Seminar MFT o Web Application Penetration Security - Jul/2017 Hamedan University (APA center) - Jun/2017 Iranian Information Institute (Ahvaz) -Nov/2016 -Jul /2106 -Dec / Jun / May Dec/2013 Cando Institute o Hacking and web hacking Online The Ministry of Justice o Linux Lpi1, CEH, WebHacking Forozan Group o ECSA, Web Pentest, OSCP Council dispute resolution o CEH,ECSA,CHFI,Web Pentest, OSCP Oil Ministry o Information Security,CEH - May/ May 2012 Iran Science Institute o Security+,CEH,Microsoft Security (Telecommunications) Seminar -Jan/2017 Cando Institute Information Security and Hacking (Oil and Gas Company) 4

5 -Jan/2107 IT-college Ahvaz CEH V9 Hacking Seminar (Petrochemical company) (Ahvaz University) P.S: Because Of Security Reason, I can t explain about another place, that I have trained their network administrators. Some course for example: Cracking and Assembly Advance Web Hacking (private course), Metasploit, Nmap Scripting, and Sniffing are parts of theme. 5

Unlocking Potential Through Learning

Unlocking Potential Through Learning Unlocking Potential Through Learning CORPORATE HEAD OFFICE: 6, Babatola Drive, Off Obafemi Awolowo way, Behind Awolowo Glass house, Ikeja, Lagos. 08 Training Calender @ Newhorizonsnige @ new horizon solution

More information

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

EC-Council - EC-Council Certified Security Analyst (ECSA) v8 EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

Certified Ethical Hacker V9

Certified Ethical Hacker V9 Certified Ethical Hacker V9 Certificate: Certified Ethical Hacker Duration: 5 Days Course Delivery: Blended Course Description: Accreditor: EC Council Language: English This is the world s most advanced

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs

NetCom Learning Training Courses Pre-Approved for CompTIA CEUs NetCom Learning Training Courses Pre-Approved for CompTIA CEUs CE System Activity Name: Completed a Training Course Max CEUs Earned Per CE Cycle: CompTIA A+ - 16 CEUs CompTIA Network+ - 24 CEUs CompTIA

More information

CALENDAR FOR THE YEAR 2018

CALENDAR FOR THE YEAR 2018 27 Dubai 08-12 Jan 1 Advance Budgeting Workshop 386 Istanbul 11-1 Mar 396 London 13-17 May 2 Advance Business Writing 296 Abu Dhabi 1-19 Jan 3 Contract Management 396 London 22-26 Jan 27 Dubai 18-22 Mar

More information

ACTIVE MICROSOFT CERTIFICATIONS:

ACTIVE MICROSOFT CERTIFICATIONS: Last Activity Recorded : July 20, 2017 Microsoft Certification ID : 2665612 MARC GROTE Wittorfer Strasse 4 Bardowick, Lower Saxony 21357 DE marc.grote@it-consulting-grote.de ACTIVE MICROSOFT CERTIFICATIONS:

More information

New Horizons Computer Learning Center Training Calendar

New Horizons Computer Learning Center Training Calendar Note: New Horizons Computer Learning Center Training Calendar All classes which are running as both Classroom and OLL will have a recording of the session available for 6 months. All Microsoft OLL classes

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

Application Training Application Courses

Application Training Application Courses Office Adobe Microsoft Office 2013 (Word/Excel/Pow erpoint/outlook) Adobe CC Photoshop/InDesi gn/illustrator Quarter 1 Jan 17 - Jan 21, Mar 13 - Mar 17, Jan 24 - Quarter 2 Application Training Application

More information

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018 Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Advanced Access Control with Cisco ISE for CCNP Security (300-208) SISAS

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

Masoud Ostad Resume Release CompTIA Network + Linux + LPIC 101,102 (International-2012) LPIC 201,202 (International-2014) Security +

Masoud Ostad Resume Release CompTIA Network + Linux + LPIC 101,102 (International-2012) LPIC 201,202 (International-2014) Security + Personal Information: Full Name: Masoud Ostad. Nationality: Iranian Language: Persian and English and France Certificates Information: CompTIA Network + Linux + LPIC 101,102 (International-2012) LPIC 201,202

More information

A UNIVERSAL SECURITY GATEWAY

A UNIVERSAL SECURITY GATEWAY A UNIVERSAL SECURITY GATEWAY IDS /IPS / HTTP AV/ Web Content Filter / Web Load Balancer / Web Reverse Proxy / Multi-line Internet / Network IP &Protocol Monitor / IP Reputation Blocker / Captive Portal

More information

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing. I Introduction to Hacking Important Terminology Ethical Hacking vs. Hacking Effects of Hacking on Business Why Ethical Hacking Is Necessary Skills of an Ethical Hacker What Is Penetration Testing? Networking

More information

ACTIVE MICROSOFT CERTIFICATIONS:

ACTIVE MICROSOFT CERTIFICATIONS: Last Activity Recorded : August 03, 2017 Microsoft Certification ID : 2069071 JESSE WIMBERLEY 5421 33RD CT SE LACEY, Washington 98503 US jesse.wimberley@gmail.com ACTIVE MICROSOFT CERTIFICATIONS: Microsoft

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

ACTIVE MICROSOFT CERTIFICATIONS:

ACTIVE MICROSOFT CERTIFICATIONS: Last Activity Recorded : February 14, 2014 Microsoft Certification ID : 2997927 CHRISTIAN GYSSELS CAIXA POSTAL 22.033 FLORIANOPOLIS, Santa Catarina 88095-971 BR gyssels@dekeract.com *Charter- Certification

More information

COURSE LISTING. Courses Listed. Training for Database & Technology with Modeling in SAP HANA. 20 November 2017 (12:10 GMT) Beginner.

COURSE LISTING. Courses Listed. Training for Database & Technology with Modeling in SAP HANA. 20 November 2017 (12:10 GMT) Beginner. Training for Database & Technology with Modeling in SAP HANA Courses Listed Beginner HA100 - SAP HANA Introduction Advanced HA300 - SAP HANA Certification Exam C_HANAIMP_13 - SAP Certified Application

More information

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering:

More information

About Us. We re now the world s largest independent IT training company, and we continue to lead

About Us. We re now the world s largest independent IT training company, and we continue to lead About Us As changes in technology have accelerated, it s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions and

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

DIS10.1 Ethical Hacking and Countermeasures

DIS10.1 Ethical Hacking and Countermeasures DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for

More information

BANGLADESH UNIVERSITY OF PROFESSIONALS ACADEMIC CALENDAR FOR MPhil AND PHD PROGRAM 2014 (4 TH BATCH) PART I (COURSE WORK)

BANGLADESH UNIVERSITY OF PROFESSIONALS ACADEMIC CALENDAR FOR MPhil AND PHD PROGRAM 2014 (4 TH BATCH) PART I (COURSE WORK) BANGLADESH UNIVERSITY OF PROFESSIONALS ACADEMIC CALENDAR FOR MPhil AND PHD PROGRAM 2014 (4 TH BATCH) DAY Soci-Economic and Political History of Bangladesh PART I (COURSE WORK) 1 ST SEMESTER 2 ND SEMESTER

More information

Microsoft Technical Training Public Class Schedules Year 2019

Microsoft Technical Training Public Class Schedules Year 2019 Microsoft Technical Training View Class Schedules by Categories Below 1. Windows Server 2016 2. Windows Server 2012 3. Azure Windows 10 Skype for Business 2015 Power BI 4. SQL Server 5. Exchange Server

More information

Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018

Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018 Pluralsight CEU-Eligible Courses for CompTIA A+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Administering Office 365 Quick Start Advanced Access Control with Cisco ISE

More information

CRAW Security. CRAW Security

CRAW Security. CRAW Security Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH,

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking

More information

Job Specification & Recruiting Profile of Vacancy

Job Specification & Recruiting Profile of Vacancy Job Specification & Recruiting Profile of Vacancy 26 March 2019 The following vacancy exists at NSFAS in Cape Town. Position Information Security Analyst Type & Grade Permanent, Grade 11 Vacancy No 76

More information

Clock hour to semester credit hour conversions are made based on current academic standards as outlined in the academic policy of the University.

Clock hour to semester credit hour conversions are made based on current academic standards as outlined in the academic policy of the University. - Prior Learning Assessment - Corporate Articulation ROUGHTON INVESTMENTS Credit Recommendation Guide (CRG) The following courses have been evaluated by Corporate Articulation to potentially fulfill General

More information

A Passage to Penetration Testing!

A Passage to Penetration Testing! A Passage to Penetration Testing! EC-Council Cyber Research This paper is from EC-Council s site. Reposting is not permitted without express written permission. What Is Penetration Testing? A penetration

More information

DIS10.1:Ethical Hacking and Countermeasures

DIS10.1:Ethical Hacking and Countermeasures 1 Data and Information security Council DIS10.1:Ethical Hacking and Countermeasures HACKERS ARE NOT BORN, THEY BECOME HACKER About DIS :Data and Internet Security Council DIS is the Globally trusted Brand

More information

PC Applications Schedule

PC Applications Schedule PC Applications Schedule Word Processing and Note Taking Price Days Aug Sep Oct Nov Dec Jan Feb Mar Word Level 1 - Basic Documents, Tables & Graphics $239 1 1 14 2 1 3 3 1 4 Word Level 2 - Styles, Sections

More information

PC Applications Schedule

PC Applications Schedule PC Applications Schedule Word Processing and Note Taking Price Days Jan Feb Mar Apr May Jun Jul Word Level 1 - Basic Documents, Tables & Graphics $239 1 3 1 4 2 1 3 2 Word Level 2 - Styles, Sections &

More information

Cybersecurity Employment SecureNinja

Cybersecurity Employment SecureNinja Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,

More information

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

Study and work in a well paid career. TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING CRICOS Provider 02771G

Study and work in a well paid career. TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING  CRICOS Provider 02771G Study and work in a well paid career TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING www.acit.edu.au CRICOS Provider 02771G TELECOMMUNICATIONS AND IT NETWORK ENGINEERING: Advanced Diploma Program OVERVIEW

More information

PC Applications Schedule

PC Applications Schedule PC Applications Schedule Word Processing and Note Taking Price Days Nov Dec Jan Feb Mar Apr May Word Level 1 - Basic Documents, Tables & Graphics $239 1 1 3 3 1 4 2 1 Word Level 2 - Styles, Sections &

More information

Upgrading People Everyday 2018 T R A I N I N G C A L E N D A R. KHDA Approved Center

Upgrading People Everyday 2018 T R A I N I N G C A L E N D A R. KHDA Approved Center Upgrading People Everyday 2018 T R A I N I N G C A L E N D A R KHDA Approved Center VMware Courses Data Center Virtualization Infrastructure Learning Paths vcenter 21 Jan 2018 15 July 2018 vsphere: Install,

More information

Ethical Hacking Guide 2017

Ethical Hacking Guide 2017 Ethical Hacking Guide 2017 Excerpt from Ethical Hacking and Penetration Testing Guide by Rafay Baloch The book covers a wide range of tools, including Backtrack Linux, Google The Unofficial Guide to Ethical

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars

DIS10.2. DIS10.2:Advanced Penetration Testing and Security Analyst Certification. Online Training Classroom Training Workshops Seminars Online Training Classroom Training Workshops Seminars DIS10.2 Data and Information security Council of India DIS10.2:Advanced Penetration Testing and Security Analyst Certification HACKERS ARE NOT BORN,

More information

Course Schedule January December 2019

Course Schedule January December 2019 Course Schedule January December 2019 Freewater Technologies Service Disabled Veteran Owned Small Business 816 Greenbrier Circle, Suite 201 Chesapeake, VA 23320 (757) 499-6150 www.freewatertech.com Microsoft

More information

Knowlogy Class Schedule

Knowlogy Class Schedule Knowlogy Class Schedule 2017 Table of Contents KNOWLOGY SCHEDULE OF COURSES... 3 OFFICE 2016... 3 OFFICE 2013... 4 OFFICE 2010... CISCO... COMPTIA... 6 EXCHANGE SERVER... 6 WINDOWS SERVER... 6 OFFICE36...

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the

More information

ISDP 2018 Industry Skill Development Program In association with

ISDP 2018 Industry Skill Development Program In association with ISDP 2018 Industry Skill Development Program In association with Penetration Testing What is penetration testing? Penetration testing is simply an assessment in a industry computer network to test the

More information

CPTE: Certified Penetration Testing Engineer

CPTE: Certified Penetration Testing Engineer www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification

More information

PC Applications Schedule

PC Applications Schedule PC Applications Schedule Word Processing and Note Taking Price Mar Apr May Jun Jul Aug Sep Word Level 1 - Basic Documents, Tables & Graphics $239 4 2 1 3 2 1 3 Word Level 2 - Styles, Sections & Templates

More information

Hacker Academy UK. Black Suits, White Hats!

Hacker Academy UK. Black Suits, White Hats! Hacker Academy UK Black Suits, White Hats! Cyber Security Training and Services Do your devices Protect you against Cyber-attacks? Chinese hackers have allegedly stolen 50 terabytes of data on F-35 aircraft,

More information

(Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile:

(Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile: 1 P a g e Amer J. I. El Hilu (Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile: https://www.linkedin.com/in/amerelhilu/ Personal Details Name: Amer

More information

Skills You Will Gain. PC Component + Laptop Troubleshooting + Configuration Printers-+ peripherals Troubleshooting + NetworkSupport Technician

Skills You Will Gain. PC Component + Laptop Troubleshooting + Configuration Printers-+ peripherals Troubleshooting + NetworkSupport Technician LEVEL3 IT TECHNICIAN PATHWAY Job Prospects IT Technician 1st/2nd /3rdLine Support Hardware Engineer Prerequisite No prior experience necessary Progression Network Infrastructure Server Infrastructure Cloud

More information

WEB APPLICATION FIREWALL

WEB APPLICATION FIREWALL WEB APPLICATION FIREWALL Sdn. Bhd. (1015448-T) Unit No:9, 1 st Floor, Resource Centre, Innovation Incubation Centre (IIC), TPM, 57000 Bukit Jalil, Kuala Lumpur Tel : +603 8992 3172 Fax : +603 8998 4010

More information

Asks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down.

Asks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down. # Name Duration 1 Project 2011-INT-02 Interpretation of VAR-002 for Constellation Power Gen 185 days Jan Feb Mar Apr May Jun Jul Aug Sep O 2012 2 Start Date for this Plan 0 days 3 A - ASSEMBLE SDT 6 days

More information

COMPUTER AND INFORMATION SYSTEMS COMPUTER NETWORKING AND SYSTEM ADMINISTRATION

COMPUTER AND INFORMATION SYSTEMS COMPUTER NETWORKING AND SYSTEM ADMINISTRATION Computer and Infmation Systems 115 COMPUTER AND INFORMATION SYSTEMS Natural and Appled Sciences Division Jamie Alonzo, Division Dean Division Office, Room 701 Michael Matera, Department Chair, (831) 477-3270

More information

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT)

ThaiCERT Incident Response & Phishing cases in Thailand. By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) ThaiCERT Incident Response & Phishing cases in Thailand By Kitisak Jirawannakool Thai Computer Emergency Response team (ThaiCERT) Agenda About ThaiCERT ThaiCERT IR Phishing in Thailand About ThaiCERT Ministry

More information

New Horizons Computer Learning Center Training

New Horizons Computer Learning Center Training New Horizons Computer Learning Center Training Professional Feb Mar Apr May CND Certified Network Defender Program 12-Feb CEH v9 Certified Ethical Hacker 18-22 Jan 8-12 CNFE Certified Network Forensics

More information

TRAINING CALENDAR 2014

TRAINING CALENDAR 2014 TRAINING CALENDAR 014 Aptech Global Learning Malaysia (AGLSM Sdn Bhd) B91 Megan Avenue 1, 189 Jalan Tun Razak, 50400 Kuala Lumpur. Tel : 0775 1077/78 http://www.aptechglobaltraining.com/my email: enquiry_msia@aptech.ac.in

More information

Advanced Diploma on Information Security

Advanced Diploma on Information Security Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic

More information

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence

ITdumpsFree.   Get free valid exam dumps and pass your exam test with confidence ITdumpsFree http://www.itdumpsfree.com Get free valid exam dumps and pass your exam test with confidence Exam : 312-50v10 Title : Certified Ethical Hacker Exam (CEH v10) Vendor : EC-COUNCIL Version : DEMO

More information

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

COMPUTER AND INFORMATION SYSTEMS COMPUTER NETWORKING AND SYSTEM ADMINISTRATION

COMPUTER AND INFORMATION SYSTEMS COMPUTER NETWORKING AND SYSTEM ADMINISTRATION 2018-19 CABRILLO COLLEGE CATALOG Page 1 of 8 COMPUTER AND INFORMATION SYSTEMS Natural and Appled Sciences Division Jamie Alonzo, Division Dean Division Offce, Room 701 Michael Matera, Department Chair,

More information

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

DECAMP. Open Distributed European Virtual CAMPus on ICT Security. A brand new offer of online courses on ICT Security

DECAMP. Open Distributed European Virtual CAMPus on ICT Security. A brand new offer of online courses on ICT Security Open Distributed European Virtual CAMPus on ICT Security A brand new offer of online courses on ICT Security The need for ICT Security professionals With an increasingly complex and networked infrastructure,

More information

CCNP ROUTING & SWITCHING

CCNP ROUTING & SWITCHING CCNP ROUTING & SWITCHING ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various kinds of products

More information

Idaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day.

Idaho's Premiere Learning Center. Voted Best of Idaho Length. 5 Days Days 16. 2hrs. 1 day. Length. Length. 2 Days. 1 Day. 10051 W. Emerald Street, Suite 120 Boise, Idaho 83704 PHONE: (208) 327-0768 Idaho's Premiere Learning Center Voted Best of Idaho 2017 http://www.etidaho.com Trending Now 20740 Installation, Storage and

More information

CERTIFICATION TRAINING - ISC2

CERTIFICATION TRAINING - ISC2 MERIT CLASSES The Michigan Cyber Range features a cybersecurity education experience based upon the National Institute of Standards and Technology National Initiative for Cybersecurity Education (NICE).

More information

A Model for Penetration Testing

A Model for Penetration Testing A Model for Penetration Testing Chuck Easttom Collin College Professional Development chuck@chuckeasttom.com Research Gate Publication Abstract Penetration testing is an increasingly integral part of cyber

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

PROGRAM GUIDE CAIFORNIA INSTITUTE OF ARTS & TECHNOLOGY

PROGRAM GUIDE CAIFORNIA INSTITUTE OF ARTS & TECHNOLOGY PROGRAM GUIDE CAIFORNIA INSTITUTE OF ARTS & TECHNOLOGY Associate of Applied Science in Computer Information Systems - Networking Concentration AASCIS-101A AASCIS-101B #AASCIS-NC 95 Weeks; SOC : 15-1142

More information

COURSE LISTING. Courses Listed. with HANA Programming. 13 February 2018 (04:51 GMT) HA100 - SAP HANA

COURSE LISTING. Courses Listed. with HANA Programming. 13 February 2018 (04:51 GMT) HA100 - SAP HANA with HANA Programming Courses Listed HA100 - SAP HANA BC404 - ABAP Programming in Eclipse HA300 - SAP HANA Modeling HA400 - SAP HANA ABAP E_HANAAW_12 - SAP Certified Development Specialist - ABAP for SAP

More information

Descriptions for CIS Classes (Fall 2017)

Descriptions for CIS Classes (Fall 2017) Descriptions for CIS Classes (Fall 2017) Major Core Courses 1. CIS 1015. INTRODUCTION TO COMPUTER INFORMATION SYSTEMS. (3-3-0). This course provides students an introductory overview to basic computer

More information

Cyber Security: It s all about TRUST

Cyber Security: It s all about TRUST www.pwc.com/vn Cyber Security: It s all about TRUST 29 th March 2017 Robert Tran Cybersecurity leader, Vietnam Content s Digital IQ Survey 1 Current state of Cybersecurity in Vietnam 2 2 Our global team

More information

Docker and HPE Accelerate Digital Transformation to Enable Hybrid IT. Steven Follis Solutions Engineer Docker Inc.

Docker and HPE Accelerate Digital Transformation to Enable Hybrid IT. Steven Follis Solutions Engineer Docker Inc. Docker and HPE Accelerate Digital Transformation to Enable Hybrid IT Steven Follis Solutions Engineer Docker Inc. Containers are the Fastest Growing Cloud Enabling Technology Title source: 451 Research

More information

Becoming a Penetration Tester. An attempt to guide you from my mistakes.. By Perla Caston

Becoming a Penetration Tester. An attempt to guide you from my mistakes.. By Perla Caston Becoming a Penetration Tester An attempt to guide you from my mistakes.. By Perla Caston Introductions My name is Perla Caston and I am a Global Security consultant with IBM X-force Red. I have a bachelors

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

COURSE LISTING. Courses Listed. with SAP Hybris Marketing Cloud. 24 January 2018 (23:53 GMT) HY760 - SAP Hybris Marketing Cloud

COURSE LISTING. Courses Listed. with SAP Hybris Marketing Cloud. 24 January 2018 (23:53 GMT) HY760 - SAP Hybris Marketing Cloud with SAP Hybris Marketing Cloud Courses Listed HY760 - SAP Hybris Marketing Cloud C_HYMC_1702 - SAP Certified Technology Associate - SAP Hybris Marketing Cloud (1702) Implementation Page 1 of 12 All available

More information

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,

More information

Web Applications Penetration Testing

Web Applications Penetration Testing Web Applications Penetration Testing Team Members: Rahul Motwani (2016ME10675) Akshat Khare (2016CS10315) ftarth Chopra (2016TT10829) Supervisor: Prof. Ranjan Bose Before proceeding further, we would like

More information

OFFICIAL CERTIFIED ETHICAL HACKER REVIEW MANUAL

OFFICIAL CERTIFIED ETHICAL HACKER REVIEW MANUAL 24 December, 2017 OFFICIAL CERTIFIED ETHICAL HACKER REVIEW MANUAL Document Filetype: PDF 132.4 KB 0 OFFICIAL CERTIFIED ETHICAL HACKER REVIEW MANUAL Cyber Forensics: A Field Manual for Collecting, Ex. Since

More information

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability

More information

DIABLO VALLEY COLLEGE CATALOG

DIABLO VALLEY COLLEGE CATALOG COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in

More information

Computer Science & IT

Computer Science & IT Computer Science & IT TIDEWATER COMMUNITY COLLEGE CLOUD COMPUTING The Career Studies Certificate program in Cloud Computing prepares students to install, deploy, configure, manage, secure, and analyze

More information

Practice Labs Ethical Hacker

Practice Labs Ethical Hacker Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab will provide you with the necessary platform to gain hands on skills in security. By completing the lab tasks you will improve your

More information

Sophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central

Sophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central Sophos Central for partners and customers: overview and new features Jonathan Shaw Senior Product Manager, Sophos Central What is Sophos Central? Partner Dashboard Admin Self Service Allows Partners to

More information

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02 Semester Information Technology AS Fall 2015 Information Technology AS Proposed Network Admin & Security

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

2018 Cyber Mission Training Course Catalog

2018 Cyber Mission Training Course Catalog 2018 Cyber Mission Training Catalog 7740 Milestone Parkway, Suite 150 Hanover, Maryland 21076 2018 copyrighted by the KeyW Corp. All rights reserved. KeyWCorp.com/cyber-mission-training TABLE OF CONTENTS

More information

Definitive Guide to PENETRATION TESTING

Definitive Guide to PENETRATION TESTING Definitive Guide to PENETRATION TESTING Chapter 1 Getting To Know Penetration Testing A. What is Penetration Testing? Penetration Testing, pen testing, or ethical hacking is the process of assessing an

More information

software.sci.utah.edu (Select Visitors)

software.sci.utah.edu (Select Visitors) software.sci.utah.edu (Select Visitors) Web Log Analysis Yearly Report 2002 Report Range: 02/01/2002 00:00:0-12/31/2002 23:59:59 www.webtrends.com Table of Contents Top Visitors...3 Top Visitors Over Time...5

More information

BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS

BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS Use one form per registrant. BLACK HAT USA 2013 ADD A CLASS REQUEST FORM INSTRUCTIONS This form is for those who have existing USA 2013 Training Registration and have an existing Confirmation Number. If

More information

CYBERSECURITY PROFESSIONAL PENETRATION TESTER

CYBERSECURITY PROFESSIONAL PENETRATION TESTER 2018 CYBERSECURITY PROFESSIONAL PENETRATION TESTER DIVERGENCE ACADEMY 11/3/2018 TABLE OF CONTENTS NETWORK EXPLOITATION AND PENTESTING... 4 WIRELESS PENTESTING AND NETWORK EXPLOITATION... 6 PYTHON FOR PENTESTERS...

More information

New Horizons Computer Learning Center Training Calendar

New Horizons Computer Learning Center Training Calendar Note: VSICM6 All classes which are running as both Classroom and OLL will have a recording of the session available for 6 months. All Microsoft OLL classes will additionally have 6 months access to online

More information