Kutsu freelancer projektiin
Sinulla ei vaikuta olevan aktiivista projektia tällä hetkellä. Miksi et ilmoittaisi projektia nyt? Se on ilmaista!Ilmoita projekti
- N/ASuoritetut työtehtävät
- N/ABudjetin mukaisesti
Founder and CEODec 2016
We offer you VAPT (vulnerability assessment & penetration testing) with easy-to-read report and a free re-test after your servers would be secured. I can help you with all aspects of securing your servers, since I have a strong background in Systems Administration. An NDA (Non-Disclosure Agreement) will be signed upon request. Ethical hacking only, fraudsters don't waste your time contacting me
Assistant ProfessorMar 2016 - Mar 2018 (2 years)
Assistant Professor in information security engineering at UCAS as part time lecturer, teaching the course Ethical of information technology, System Analysis, Emergency and incidents response, ... etc
Assistant ProfessorMay 2015
Assistant Professor in information security engineering at UCAS as part time lecturer, teaching the course C/C++ programming languages, introduction to computer network,System Analysis, Network security,Emergency and incidents response, ... etc
networking technicianAug 2002 - Oct 2002 (2 months)
Under general supervision, identify, troubleshoot and resolve problems encountered by District-wide users of various servers, the mainframe, desktop systems, District network Internet and other computer technology; troubleshoot and solve local-area network problems; provide technical support to end-users regarding computer hardware and software; install, test, certify and troubleshoot networking cabling systems; install configured network equipment; provides technical
PhD, Cloud Computing Security2011 - 2015 (4 years)
Certified Ethical Hacker Certification (2016)Rewaq
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
Cyber Security Incident Handling and Response (2017)Udemy
It was a very comprehensive set of presentations. Obviously created with a lot of thought and business experience. It's focus is a high level for how to build the business processes on dealing with threats before and after. If business were to adopt these concepts and spend the money to implement his suggestions this would be a very good thing.
Building a Cyber-security Strategy for your Business (2016)Udemy
Understand how to Protect a Business from being hacked. Learn the Tricks To Winning At Cyber-security.
Trusting Identity Based Authentication on Hybrid Cloud Computing.
Recently identity based cryptography and Hierarchical identity based cryptography have been proposed to solve the internet applications threads. This paper based on using identity management on hybrid cloud, each user and server will have its own trusted unique identity, the unique key distribution and mutual authentication can be greatly simplified.
A Secure Electronic Student Record using HIBA over University Cloud Storage.
This archetype enable to achieve better interoperability and lower operational cost with other university providers, instead of building and maintaining dedicated data centers. However, many security challenges associated with authentication, identity management, access control, trust management, and so on, may raise in the adaptation of cloud computing in electronic student records (ESR) systems
Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool
In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyze the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.