Käyttäjän vw1067862vw profiilikuva
@vw1067862vw
Jäsen alkaen 31. joulukuuta 2003
0 Suositukset

vw1067862vw

Online-tilassa Offline-tilassa
Penetration Tester | Certified Ethical Hacker CEH Certified Ethical Hacker and penetration tester, with 6+ years of experience in Information Security, specializing in Cloud Security, Network Pentesting. I offer you VAPT (vulnerability assessment & penetration testing) with easy-to-read report and a free re-test after your servers would be secured. I can help you with all aspects of securing your servers, since I have a strong background in Systems Administration. An NDA (Non-Disclosure Agreement) will be signed upon request. Areas of expertise: - Web Application Vulnerability Assessment & Penetration Testing - Network Penetration Testing - Patch Management - Information Security Consulting and Research Ethical hacking only, fraudsters don't waste your time contacting me.
$15 USD/hr
0 arvostelua
0.0
  • N/ASuoritetut työtehtävät
  • N/ABudjetin mukaisesti
  • N/AAjallaan
  • N/AUudelleenpalkkaamisaste

Portfolio

Viimeaikaiset arvostelut

Ei arvosteluja.

Kokemus

Founder and CEO

Dec 2016

We offer you VAPT (vulnerability assessment & penetration testing) with easy-to-read report and a free re-test after your servers would be secured. I can help you with all aspects of securing your servers, since I have a strong background in Systems Administration. An NDA (Non-Disclosure Agreement) will be signed upon request. Ethical hacking only, fraudsters don't waste your time contacting me

Assistant Professor

Mar 2016 - Mar 2018 (2 years)

Assistant Professor in information security engineering at UCAS as part time lecturer, teaching the course Ethical of information technology, System Analysis, Emergency and incidents response, ... etc

Assistant Professor

May 2015

Assistant Professor in information security engineering at UCAS as part time lecturer, teaching the course C/C++ programming languages, introduction to computer network,System Analysis, Network security,Emergency and incidents response, ... etc

networking technician

Aug 2002 - Oct 2002 (2 months)

Under general supervision, identify, troubleshoot and resolve problems encountered by District-wide users of various servers, the mainframe, desktop systems, District network Internet and other computer technology; troubleshoot and solve local-area network problems; provide technical support to end-users regarding computer hardware and software; install, test, certify and troubleshoot networking cabling systems; install configured network equipment; provides technical

Koulutus

PhD, Cloud Computing Security

2011 - 2015 (4 years)

Pätevyydet

Certified Ethical Hacker Certification (2016)

Rewaq

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

Cyber Security Incident Handling and Response (2017)

Udemy

It was a very comprehensive set of presentations. Obviously created with a lot of thought and business experience. It's focus is a high level for how to build the business processes on dealing with threats before and after. If business were to adopt these concepts and spend the money to implement his suggestions this would be a very good thing.

Building a Cyber-security Strategy for your Business (2016)

Udemy

Understand how to Protect a Business from being hacked. Learn the Tricks To Winning At Cyber-security.

Julkaisut

Trusting Identity Based Authentication on Hybrid Cloud Computing.

Recently identity based cryptography and Hierarchical identity based cryptography have been proposed to solve the internet applications threads. This paper based on using identity management on hybrid cloud, each user and server will have its own trusted unique identity, the unique key distribution and mutual authentication can be greatly simplified.

A Secure Electronic Student Record using HIBA over University Cloud Storage.

This archetype enable to achieve better interoperability and lower operational cost with other university providers, instead of building and maintaining dedicated data centers. However, many security challenges associated with authentication, identity management, access control, trust management, and so on, may raise in the adaptation of cloud computing in electronic student records (ESR) systems

Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool

In this paper, we clarify Hierarchical Identity Based Authentication Key Agreement (HIB-AKA) protocol, providing lightweight key management approach for cloud computing users. Then, we analyze the security properties of HIB-AKA protocol. We also show, a HIB-AKA security protocol proof using formal automated security analysis Scyther tool.

Varmennukset

  • Facebook yhdistetty
  • Suositeltu freelancer
  • Maksutapa varmennettu
  • Puhelin varmennettu
  • Henkilöllisyys varmennettu
  • Sähköposti varmennettu

Selaa samanlaisia freelancereita