Pentest Magazine 08/2014 - Pentestmag

Pentest Magazine 08/2014

Download
File
PenTest_08_2014.zip

Configuring your machine for Pentesting by Cristian Stoica ARMED WITH:

  • EC-Council: Certified EC-Council Instructor, CICISO, CEH, CHFI
  • ISACA: CISA, CISM, CRISC,
  • Mandiant: Advanced Malware Analysis,
  • ISC2: SSCP, ISO 27001 Lead Auditor,
  • IAEA & CNCAN: Information and Computer Security for Strategic and Critical Infrastructure,
  • CISCO: CCAI,
  • SonicWALL: CSSA, Symantec, IBM, McAfee, Veeam and other institutions
  • Certified in Security, Risk, Weapons and Ammunition, Strategic Management, Leadership and Managerial Communication.

https://linkedin.com/in/cristianstoica

Pentesting Mobile by Longinus Timochenco ARMED WITH:

  • Knowledge about CISO INTERNAL CONTROLS as Chief Information Security Officer
  • Chief Information Security Officer at SPC Brasil
  • CHIEF SECURITY OFFICER–Modulo Education Center
  • COBIT, ITILV2, BS7799 and ISO´s20000/27001-2
  • VPN-1 Firewall-1 Application Intelligence
  • Certified Digital VeriSign Trust Network (CertiSign)
  • SmartCards / Tokens - RSA, CRYPTOCARD, VASCO, ALLADIN
  • Unix Management Advanced
  • ICND – Interconnecting Cisco Network Devices
  • BCMSN – Building Cisco Multilayer Switched Networks
  • TCP/IP for Networking Professionals

Building a Versatile Pentesting Machine by Gabriele Biondo ARMED WITH:

  • CISSP,
  • CISM,
  • OPST,
  • ITIL,
  • COBIT,
  • ISO 27001 LEAD AUDITOR,
  • PRINCE 2

Linkedin profile twitter: @gb700823 Blog

 


Download
File
PenTest_08_2014.zip

July 23, 2021
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Nataliehigh
Nataliehigh
8 years ago

Post Comment

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023