{"id":8,"date":"2024-01-27T12:48:31","date_gmt":"2024-01-27T12:48:31","guid":{"rendered":"https:\/\/shadowprofiler.com\/?page_id=8"},"modified":"2024-01-27T12:48:48","modified_gmt":"2024-01-27T12:48:48","slug":"my-certifications","status":"publish","type":"page","link":"https:\/\/shadowprofiler.com\/?page_id=8","title":{"rendered":"My Certifications"},"content":{"rendered":"\n<p>Misc CEC Certifications, these certifications demonstrate my knowledge and understanding of the tools or concepts\/topics mentioned below.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Micro Expressions\nOpen Source Intelligence by IntelTechniques\nIdentifying Web Attacks Through Logs\nAdvanced Cyber Threat Intelligence\nIntro to Cyber Threat Intelligence\nBasic Evimetry Deadboot Forensic Acquisition: Wireless Network\nFortinet Web Application Firewall\nCybersecurity Audit Overview\nOSINT Fundamentals\nAnalyzing Attacks for Incident Handlers\nFundamental Windows Security Overview\nLinux Fundamentals for Security Practitioners\nMonitoring Network Traffic with SIEM\nFundamental Cryptography: Data Protection\nPentest Fundamentals: Scanning Networks (another NMAP course)\nWeb Defense Fundamentals\nIncident Handling Fundamentals \/ CSIRT (There is an average of 206 days to detect a breach!)\nSecurity Analytics with CyberEASY (recommended, free for personal use, your own SIEM).\nWindows Forensics and Tools\nAPT Group Fundamentals\nInsider Threats training course\nOnline Reconnaissance (OSINT)  (Incident Handler Course).\nCISSP\nCompTIA Network+\nISC2 Certified Cloud Security Professional (CCSP)\nCISA \/ Certified Information Systems Auditor\nCertified Information Security Manager (CISM)\nComputer Hacking and Forensics\nOWASP Open Web Application Security Project\nSystems Security Certified Professional (SSCP)\nCompTIA Security+\nCRISC Certified Risk and Information Systems Control\nMTA 98-367 Security Fundamentals\nScanning, Enumeration, and Vulnerabilities\nNMAP\nPenetration Testing and Ethical Hacking\nRisk Management Framework\nSocial Engineering and Manipulation\nPCI\/DSS\nCyber Threat Intelligence\nAccess Control and Identity Management\nInfosec\nFootprinting and Reconnaissance\nKali Linux Fundamentals\nPhishing\nSniffing<\/code><\/pre>\n\n\n\n<p>More certifications<\/p>\n\n\n\n<p>400.1 Cybersecurity Basic<\/p>\n\n\n\n<p>400.1 Cybersecurity Basic<br>600.1 RAA Registrar Training<\/p>\n\n\n\n<p>600.1 RAA Registrar Training<br>501.1 Digital Trade and Global Internet Governance<\/p>\n\n\n\n<p>501.1 Digital Trade and Global Internet Governance<br>500.1 Internet Diplomacy<\/p>\n\n\n\n<p>500.1 Internet Diplomacy<\/p>\n\n\n\n<p>IT Governance<br>Staff awareness: General Data Protection Regulation<\/p>\n\n\n\n<p>Staff awareness: General Data Protection Regulation<br>Staff awareness: Information security and cyber security<\/p>\n\n\n\n<p>Staff awareness: Information security and cyber security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Misc CEC Certifications, these certifications demonstrate my knowledge and understanding of the tools or concepts\/topics mentioned below. More certifications 400.1 Cybersecurity Basic 400.1 Cybersecurity Basic600.1 RAA Registrar Training 600.1 RAA Registrar Training501.1 Digital Trade and Global Internet Governance 501.1 Digital Trade and Global Internet Governance500.1 Internet Diplomacy 500.1 Internet Diplomacy IT GovernanceStaff awareness: General Data &#8230; <a title=\"My Certifications\" class=\"read-more\" href=\"https:\/\/shadowprofiler.com\/?page_id=8\" aria-label=\"Read more about My Certifications\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=\/wp\/v2\/pages\/8"}],"collection":[{"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8"}],"version-history":[{"count":3,"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":12,"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=\/wp\/v2\/pages\/8\/revisions\/12"}],"wp:attachment":[{"href":"https:\/\/shadowprofiler.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}