Personal Information
Entreprise/Lieu de travail
Greater Jakarta Area, Indonesia Indonesia
Profession
Cyber Security Enthusiast
Secteur d’activité
Technology / Software / Internet
Site Web
inan.tibandung.com/
À propos
I am an IT professional with 10+ years experience for cyber security, with expertise in comprehensive security assessment of IT infrastructure & applications from both attack and defense perspective. I have done various cyber security professional services such as cyber risk assessment, vulnerability assessment, penetration testing, threat hunting, digital forensic, enterprise security architecture, cyber security consulting & training.
I also have experience on implementation and use of these various cyber security technology from many security vendors/products: Firewalls, Web Application Firewall (WAF), Intrusion Detection System (IDS), Intrusion Prevention System (IPS)
Mots-clés
cyber security
information security
hacking
information technology
threat
tutorial
hacker
lab
email
spam
cyber threats
malware
phishing
ethical hacking
ethical hacker
vulnerability
defense
linux
honeypot
iptables
snort
ips
security
cyber
anatomy
simulation
networking
computer
tracer
packet
cisco
Tout plus
Présentations
(4)Personal Information
Entreprise/Lieu de travail
Greater Jakarta Area, Indonesia Indonesia
Profession
Cyber Security Enthusiast
Secteur d’activité
Technology / Software / Internet
Site Web
inan.tibandung.com/
À propos
I am an IT professional with 10+ years experience for cyber security, with expertise in comprehensive security assessment of IT infrastructure & applications from both attack and defense perspective. I have done various cyber security professional services such as cyber risk assessment, vulnerability assessment, penetration testing, threat hunting, digital forensic, enterprise security architecture, cyber security consulting & training.
I also have experience on implementation and use of these various cyber security technology from many security vendors/products: Firewalls, Web Application Firewall (WAF), Intrusion Detection System (IDS), Intrusion Prevention System (IPS)
Mots-clés
cyber security
information security
hacking
information technology
threat
tutorial
hacker
lab
email
spam
cyber threats
malware
phishing
ethical hacking
ethical hacker
vulnerability
defense
linux
honeypot
iptables
snort
ips
security
cyber
anatomy
simulation
networking
computer
tracer
packet
cisco
Tout plus