
Download
File | |
---|---|
PenTest_08_2014.zip |
Configuring your machine for Pentesting by Cristian Stoica ARMED WITH:
- EC-Council: Certified EC-Council Instructor, CICISO, CEH, CHFI
- ISACA: CISA, CISM, CRISC,
- Mandiant: Advanced Malware Analysis,
- ISC2: SSCP, ISO 27001 Lead Auditor,
- IAEA & CNCAN: Information and Computer Security for Strategic and Critical Infrastructure,
- CISCO: CCAI,
- SonicWALL: CSSA, Symantec, IBM, McAfee, Veeam and other institutions
- Certified in Security, Risk, Weapons and Ammunition, Strategic Management, Leadership and Managerial Communication.
https://linkedin.com/in/cristianstoica
Pentesting Mobile by Longinus Timochenco ARMED WITH:
- Knowledge about CISO INTERNAL CONTROLS as Chief Information Security Officer
- Chief Information Security Officer at SPC Brasil
- CHIEF SECURITY OFFICER–Modulo Education Center
- COBIT, ITILV2, BS7799 and ISO´s20000/27001-2
- VPN-1 Firewall-1 Application Intelligence
- Certified Digital VeriSign Trust Network (CertiSign)
- SmartCards / Tokens - RSA, CRYPTOCARD, VASCO, ALLADIN
- Unix Management Advanced
- ICND – Interconnecting Cisco Network Devices
- BCMSN – Building Cisco Multilayer Switched Networks
- TCP/IP for Networking Professionals
Building a Versatile Pentesting Machine by Gabriele Biondo ARMED WITH:
- CISSP,
- CISM,
- OPST,
- ITIL,
- COBIT,
- ISO 27001 LEAD AUDITOR,
- PRINCE 2
Linkedin profile twitter: @gb700823 Blog
Download
File | |
---|---|
PenTest_08_2014.zip |
Post Comment