Advertisement
Kyfx

IT Laws and Politic's

Jul 12th, 2015
439
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.11 KB | None | 0 0
  1. As an Information Security my Major Strengths & Specialties are in the following Areas:
  2.  
  3. 1) Information Security Management System.
  4. 2) Design and development of Information & Network Security Policies & Procedures
  5. 3) IT Governance & Best Practices
  6. 4) Design of Business Continuity, Disaster Recovery Processes & Procedures
  7. 5) IT Audit & Compliance Management
  8. 6) Cooperation in Information Security Management related Projects
  9. 7) Phishing Defense and Attack.
  10. 8) Advance SQL Injection
  11. 9) SOCIAL Engineering.
  12. 10) Web Application Defense and Attack.
  13. 11) DNS Redirecting and Spoofing.
  14. 12) Cryptography.
  15. 13) Encryption and decryption.
  16. 14) MITM Attacks
  17. 15) Cookie jacking, sniffing ,Garbing
  18. 16) SEO Attacks
  19. 17) XSS cross Site scripting
  20.  
  21.  
  22. - IT Security Incident Response, Damage Assessment and Disaster Recovery
  23. - Network and System Security Engineering
  24. - Blackbox / Whitebox Penetration Testing
  25. - Zero-Day Vulnerability/Malware/Trojan Investigations
  26. - DoS/DDoS Mitigation and Firewall/IDS/IPS Analysis
  27. - Forensics & Research
  28. - Vulnerability Assessment
  29. - Mobile Device Security Management
  30. - Fruad Management
  31. - Cyber Defense
  32. - Web sites attacks
  33. - Client side attacks
  34. - Working on Information and Telecom Security Audit for Bahrain Bourse.
  35. - Web Vulnerability assessment for CIBAFI.
  36. - Internal Network Security Audit for Reef Real Estate.
  37. - Web vulnerability assessment for Nuwab and Shura Council.
  38. - Microsoft Exchange Server 2010 server Hardening for Reef Real Estate.
  39. - Migration from Microsoft Directory Service 2003/MS Exchange 2003 to AD 2008/Exchange 2010.
  40. - Stress Test for Microsoft Exchange 2003/2007.
  41. - Exchange 2007/2010 Clustering.
  42. - Microsoft Hyper-V Implementation and Design.
  43. - Design and implementation of Vmware ESX Server/ Vsphere 4.
  44. - Design and Implementation of Windows 2008 R2 Active Directory /DNS/DHCP/Group Policies.
  45. - Design and Implementation of a Clustered Exchange 2010.
  46. - Perform on-site and remote security consulting including penetration testing, application testing, web application security assessment, on-site Internet security assessment, social engineering, wireless assessment.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement