Freelancerı Projeye Davet Edin
Görünüşe göre şu anda aktif bir projeniz yok. Neden şimdi bir proje ilan etmiyorsunuz? Ücretsizdir!Bir Proje İlan Edin
- 95%Tamamlanmış İşler
- 58%Bütçe Dahilinde
- 17%Tekrar İşe Alım Oranı
Scan Azure resource using Metasploit -- 2
“nice work, thank you!”Neeraj G. 6 gün önce
Need a php front and mid end code security expert
“Very thorough and very professional work. managed to both diagnose AND fix many security vulnerabilities. will definitely be hiring again in the future.”William G. geçen hafta
Scan Azure resource using Metasploit
“working on the next phase...”Neeraj G. geçen hafta
“Very professional. knows his job. lacks the initiative for delivering final product in good quality. had to push him several times to finalize his milestones as expected.”Eyal N. 2 ay önce
“Great work. thank you”Phillip F. 2 ay önce
Website Security Analyst
“Thank You, the work was successfully completed and will hire again for round 2.”Scott Wayne T. 3 ay önce
Security Engineers And PentesterMar 2010 - Aug 2018 (8 years)
Main Skills: Penetration Testing, Web Application Security. Social Engineering, Red team assessment, Ethical Hacking & Countermeasures, Malware Analysis My core competency lies in performing black and gray box testing, on the live web applications/networks or in lab environments.
Bachelor of Science in Information Technology2005 - 2009 (4 years)
Website Hacking / Penetration Testing (2018)Udemy, Inc.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.
Ethical Hacking (2017)Udemy, Inc.
This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab.
Preferred Freelancer Program SLA100%
Tercih Edilen Freelancer
- Ödeme Onaylı
- Telefon Onaylandı
- Kimliği Doğrulanmış
- E-posta Onaylı