Computer Security Consultants等待雇佣在Afghanistan

  • 计算机安全
  • Afghanistan
建议:
更多

国家

精确位置

测验

时薪 (美元)

级别

在线

展示 12 结果
  • 雇用     yousefsalami2023
雇用     yousefsalami2023

    yousefsalami2023 yousefsalami2023

    Afghanistan $5 美元/小时
    I am software Engineer & CEH. Just for change
    Afghanistan
    0.0
    0条评论 0条评论 $5 美元/小时
    Hi. Guys . If you want to know about BFC group just call me to tell you something about it because it is to good for all
    Hi. Guys . If you want to know about BFC group just call me to tell you something about it because it is to good for all 收起
  • 雇用 yousefsalami2023
  • 雇用     Abdulqarib
雇用     Abdulqarib

    Abdulqarib Abdulqarib

    Afghanistan $15 美元/小时
    NETWORK & SECURITY ENGINEER
    Afghanistan
    0.0
    0条评论 0条评论 $15 美元/小时
    Skills: 1. Proficient in designing and managing deception networks. 2. Expertise in Network Administration. 3. Competent in Cloud Administration. 4. Skilled in comprehensive email forensics. 5. Proficient in hands-on security incident handling and response. 6. Familiarity with analytics and intelligence. 7....
    Skills: 1. Proficient in designing and managing deception networks. 2. Expertise in Network Administration. 3. Competent in Cloud Administration. 4. Skilled in comprehensive email forensics. 5. Proficient in hands-on security incident handling and response. 6. Familiarity with analytics and intelligence. 7. Experienced in writing cybersecurity blogs on trending topics. 8. Active cybersecurity researcher, contributing high-quality articles on various issues. Technical Skills: Routing: OSPF LSA, area and network types, OSPF states, virtual-links, authentication, default routes and filtering, route maps, distribute-list, offset list. IBGP and EBGP peering, next-hop, Attributes, AS path filtering, Route reflectors, confederation. EIGRP features, best path, unequal cost load balancing, stub, summarization, authentication, default routes and filtering. Switching: STP, RSTP, MSTP, Etherchannel, MLS, Intervlan routing, HSRP, VRRP, GLBP, BPDU filter/guard, Root guard. Security: Site to Site VPN, Remote access VPN, Dynamic multipoint VPN (DMVPN), virtual tunnel interface based site to site VPN. Local and remote AAA, 801.x authentication, modular quality of service, CBAC, Reflexive ACL, time based ACL, dynamic ACL, MAC ACL, VACL. PIX firewall, ASA, NAT, PAT, policy NAT, object ACL, L2/Transparent FW, Failover, Context. Product Knowledge: Cisco 3560 & 2960 switches, 7600 series routers, 525 PIX FW, 5525, 5520, 5515, 5506-x ASA. PBX Phone System: Mitel (Call Center, VoIP, Call belling, Call recording), AVAYA 收起
  • 雇用 Abdulqarib
  • 雇用     jantanahmadi
雇用     jantanahmadi

    jantanahmadi jantanahmadi

    Afghanistan $20 美元/小时
    Cyber security
    Afghanistan
    0.0
    0条评论 0条评论 $20 美元/小时
    Cyber security Cybersecurity refers to the practice of protecting computers, servers, networks, and data from unauthorized access, theft, damage, or disruption. It involves implementing various measures and technologies to safeguard digital systems and information from cyber threats. Here are some key aspects and...
    Cyber security Cybersecurity refers to the practice of protecting computers, servers, networks, and data from unauthorized access, theft, damage, or disruption. It involves implementing various measures and technologies to safeguard digital systems and information from cyber threats. Here are some key aspects and concepts related to cybersecurity: 1. **Threats**: Cybersecurity focuses on defending against a wide range of threats, including malware (such as viruses, worms, and ransomware), hacking attempts, phishing attacks, social engineering, insider threats, and more. 2. **Protection**: Cybersecurity measures aim to protect systems and data through various means, including access controls, encryption, firewalls, intrusion detection systems (IDS), antivirus software, and secure coding practices. 3. **Network Security**: Network security involves securing computer networks and their components, such as routers, switches, and firewalls. It includes measures like network segmentation, virtual private networks (VPNs), and network monitoring to detect and prevent unauthorized access. 4. **Application Security**: Application security focuses on identifying and addressing vulnerabilities in software applications. It involves secure coding practices, regular software updates and patches, penetration testing, and the use of web application firewalls (WAFs) to protect against attacks targeting applications. 5. **Data Protection**: Protecting data is a fundamental aspect of cybersecurity. This includes implementing data encryption, access controls, regular backups, and secure data storage and transmission practices. 6. **Incident Response**: Cybersecurity 收起
  • 雇用 jantanahmadi
  • 雇用     parwizmajeadi999
雇用     parwizmajeadi999

    parwizmajeadi999 parwizmajeadi999

    Afghanistan $500 美元/小时
    Parwiz Majeadi Born 4/6/2006 in Afghanistan ??
    Afghanistan
    0.0
    0条评论 0条评论 $500 美元/小时
    Computer programmer Android programming English instructor English Translator Web development Typer Audio & video Editor Speak in 5 langauge Accounter Sound Recorder Hardware engineer Software engineer Game engineer Robot engineer Technical
    Computer programmer Android programming English instructor English Translator Web development Typer Audio & video Editor Speak in 5 langauge Accounter Sound Recorder Hardware engineer Software engineer Game engineer Robot engineer Technical 收起
  • 雇用 parwizmajeadi999
  • 雇用     habibullah57
雇用     habibullah57

    habibullah57 habibullah57

    Afghanistan $10 美元/小时
    Software Egnineer / Web Developer
    Afghanistan
    0.0
    0条评论 0条评论 $10 美元/小时
    A software Engineer / Web Developer having skills of UX/UI Design, JS, HTML 5 /CSS, PHP, MYSQL, C# , and ASP.net.
    A software Engineer / Web Developer having skills of UX/UI Design, JS, HTML 5 /CSS, PHP, MYSQL, C# , and ASP.net. 收起
  • 雇用 habibullah57
  • 雇用     alireza51
雇用     alireza51

    alireza51 alireza51

    Afghanistan $5 美元/小时
    I am a Computer Engineer(Programmer & Developer)
    Afghanistan
    0.0
    0条评论 0条评论 $5 美元/小时
    Sure, I can provide information about programmers. Programmers, also known as developers or software engineers, are professionals who write, test, and maintain computer programs and software applications. They use programming languages such as Python, Java, C++, and many others to create software that performs...
    Sure, I can provide information about programmers. Programmers, also known as developers or software engineers, are professionals who write, test, and maintain computer programs and software applications. They use programming languages such as Python, Java, C++, and many others to create software that performs specific tasks or solves particular problems. Programmers play a crucial role in the development of various types of software, ranging from mobile apps and web applications to operating systems and databases. They work closely with other professionals, such as software designers, project managers, and quality assurance testers, to ensure that the software meets the desired requirements and functions correctly. Here are some key points about programmers: Programming Languages: Programmers are skilled in one or more programming languages. The choice of language depends on the requirements of the project and the specific domain in which they are working. Problem Solving: Programmers are problem solvers. They analyze complex problems, break them down into smaller components, and develop algorithms and code to solve those problems efficiently. Software Development Life Cycle: Programmers follow the software development life cycle (SDLC), which includes various stages such as requirements gathering, design, implementation, testing, and maintenance. They collaborate with other team members to ensure the smooth progress of the project. 收起
  • 雇用 alireza51
  • 雇用     noorulhaq4
雇用     noorulhaq4

    noorulhaq4 noorulhaq4

    Afghanistan $8 美元/小时
    I am Website Developer
    Afghanistan
    0.0
    0条评论 0条评论 $8 美元/小时
    I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing
    I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing 收起
  • 雇用 noorulhaq4
  • 雇用     Mobeenabed50
雇用     Mobeenabed50

    Mobeenabed50 Mobeenabed50

    Afghanistan $10 美元/小时
    Web development Web designing
    Afghanistan
    0.0
    0条评论 0条评论 $10 美元/小时
    I am a web developer and web designer. I have 16 years experience of being a programmer and 13 years of being a designer. I have contribution with many German, Spanish and Afghan companies. However, I am a new seller here I have done many projects.
    I am a web developer and web designer. I have 16 years experience of being a programmer and 13 years of being a designer. I have contribution with many German, Spanish and Afghan companies. However, I am a new seller here I have done many projects. 收起
  • 雇用 Mobeenabed50
  • 雇用     Muzafarimahdi
雇用     Muzafarimahdi

    Muzafarimahdi Muzafarimahdi

    Afghanistan $5 美元/小时
    Cyber Security
    Afghanistan
    0.0
    0条评论 0条评论 $5 美元/小时
    Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent and detect cyber threats, as well as responding to and recovering from any incidents that may...
    Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent and detect cyber threats, as well as responding to and recovering from any incidents that may occur. Here are some key concepts and practices related to cybersecurity: Risk Assessment: Assessing and identifying potential vulnerabilities and threats to the system, including weaknesses in software, hardware, and human factors. Access Control: Implementing mechanisms to control and regulate access to computer systems and networks, ensuring that only authorized individuals can access and use them. Firewalls: Firewalls are security devices or software that monitor and control incoming and outgoing network traffic, acting as a barrier between internal and external networks to prevent unauthorized access. Encryption: Encryption is the process of converting information into a code or cipher to prevent unauthorized access. It ensures that even if data is intercepted, it cannot be understood or used without the decryption key. Malware Protection: Implementing antivirus and anti-malware software to detect, prevent, and remove malicious software such as viruses, worms, Trojan horses, ransomware, and spyware. Patch Management: Keeping software systems up to date with the latest security patches and updates to address vulnerabilities and bugs that could be exploited by attackers. Security Awareness Training: Educating users about cybersecurity best practices, such as creating strong passwords, recognizing phishing emails, and avoiding suspicious websites, to reduce the risk of social engineering attacks. Intrusion Detection and Prevention Systems (IDPS): These systems monitor network traffic and detect and respond to potential intrusion attempts in real-time, providing alerts or taking automated actions to prevent attacks. Incident Response: Establishing procedures and plans to respond to cybersecurity incidents promptly, minimize damage, and restore normal operations. Regular Auditing and Testing: Conducting regular security audits and penetration testing to identify vulnerabilities and weaknesses in systems and networks, allowing for proactive mitigation of potential threats. 收起
  • 雇用 Muzafarimahdi
  • 雇用     Jammylife
雇用     Jammylife

    Jammylife Jammylife

    Afghanistan $5 美元/小时
    Data Entry, Marketing, Logo Design,web
    Afghanistan
    0.0
    0条评论 0条评论 $5 美元/小时
    I AM AVAILABLE 24*7 VIA FREELANCER MESSENGER Hi, I am Abdul Shakir, a full-time and individual freelancer. I am here for Data Entry Work and looking for a long-term work relationship. I provide solutions in:- * Document Conversion *Document Extraction *PDF to Excel/Word * Manual Data entry *Email collection *Web...
    I AM AVAILABLE 24*7 VIA FREELANCER MESSENGER Hi, I am Abdul Shakir, a full-time and individual freelancer. I am here for Data Entry Work and looking for a long-term work relationship. I provide solutions in:- * Document Conversion *Document Extraction *PDF to Excel/Word * Manual Data entry *Email collection *Web scraping *Google search *Web search *Handwritten to text *Resizing product images and uploading in Shopify.*All types of copy-paste work. * Watermark removal * Background removal * Download stickers from apps and make a .zip folder *Real Estate Skip Tracing You will get:- *Professionalism *Transparency *Budget Trustworthiness * Provide sample file before starting any work. * Unlimited revisions. * Quality and accuracy service. *Continue support after the delivery of the final product. Thanks and Regards Abdul Shakir NOTE: PLEASE DON'T HIRE ME IF YOU DON'T HAVE ANY REQUIREMENTS. 收起
  • 雇用 Jammylife

你好,这是一些不在线的威客

你好,这是一些符合“”的不在线的威客

雇用有相似技能的最佳威客