You are on page 1of 1

CISSP, CISA, CISM, GIAC, CCNA, Security +,

CISSP, GIAC, ISA, and PCIP, ISO 27001 framework


SANS, OSCP, MCSE, CISSP
Cisco CCIE, SANS GCIA, SANS GCIH, SANS CEH, Offensive Security
OSCP, EC-Council E|CIH, EC-Council E|CEH
Identity Access Management (IAM)
2) AKAMAI and DDOS (Distributed Denial of Service)

LAN/WAN, intrusion detection and prevention, network security, host


security, secure remote access, firewalls, and vulnerability
management (i.e. Nessus)

Software security (source code analysis, application penetration


testing)
Database security (database management and configuration)
Network security (Firewall management, network zone policies)
Knowledge in vulnerability scanning, intrusion detection, anomaly
detection, and associated technologies and intrusion
detection\prevention systems
Understanding of tools, techniques, and standards used to conduct
penetration testing of networks and applications
Best practices related to information and computer forensic
investigation processes and techniques

You might also like