loading
SP CV

Support System Engineer - Digital Consultant - Web MasterCyberSecurity

Digital Content Producer - Web Developer - Networker

Download CV

Blog Category: IT

CERTIFIED ETHICAL HACKING – MASTER COURSE 2021 – Mastering Access Control in Data Security

[kc_row][kc_column width="12/12" video_mute="no" _id="753466"][education-block _id="799217" heading="Mastering Access Control in Data Security" edu_qual="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"][skills-block _id="684267" skills_list="eyIxIjp7InNraWxsX3RpdGxlIjoiTWFzdGVyaW5nIEFjY2VzcyBDb250cm9sIGluIERhdGEgU2VjdXJpdHkgLSBGb3JtYXRpb24gZGUgNEgiLCJ5ZWFyc19leHBlcmllbmNlIjoiIiwic2tpbGxfcGVyY2VudCI6IjEwMCUifX0="][/kc_column][/kc_row]

Read More

CERTIFIED ETHICAL HACKING – MASTER COURSE 2021 – Operating Systems Security 2021

Operating Systems Security 2021 Operating Systems Security 2021 @ Eskills Academy 2021 - Operating Systems Security 2021 - Formation de 6H Introduction to Operating Systems Security Assesing Security Boundaries Three Core Security Boundarie Concept of

Read More

CERTIFIED ETHICAL HACKING – MASTER COURSE 2021 – Comprehensive Computer Network Designing

Comprehensive Computer Network Designing Comprehensive Computer Network Designing @ Eskills Academy 2021 - Comprehensive Computer Network Designing - Formation de 4H Introduction to Designing Computer Networks Subnetting IPv6 Subnetting IPv4 IPv6 Address Notation Using DMZ

Read More

CERTIFIED ETHICAL HACKING – MASTER COURSE 2021 – Understanding Social Engineering Attacks

Understanding Social Engineering Attacks Understanding Social Engineering Attacks @ Eskills Academy 2021 - Understanding Social Engineering Attacks - Formation de 2H Social Engineering attacks Using KALI What a Social Engineering Attack Looks Like Identifying Fraud

Read More

Guide Complet | Hacking & Sécurité

Guide Complet | Hacking & Sécurité @ Udemy 2018 - Guide Complet | Hacking & Sécurité - Formation de 8H Présentation de la formation Introduction à la sécurité informatique Préparation Lab Prise d'informations Vulnérabilités postes

Read More

Hacking Éthique : Le Cours Complet

Hacking Éthique : Le Cours Complet @ Udemy 2018- Formation de 13H50 Introduction Démarrer en Sécurité Informatique Le Hacking éthique : fondamentaux etpréparation du Lab La Reconnaissance Le Scanning Réseau & Web Gagner l'accès Le

Read More

Intelligence Artificielle de A à Z

Intelligence Artificielle de A à Z @ Udemy 2018- Fomation de 14H  Les Fondamentaux del'Apprentissage par Renforcement  Q-Learning : Intuition Voiture autonome(Deep Q-Learning) Deep Q-Learning : Intuition Installation pour le chapitre 1 Création de l'environnement

Read More

Java les fondamentaux

Java les fondamentaux @ Tuto.com 2017 - Formation de 13h Présentation de la technologie JAVA Associer JAVA à d'autres langages Décrire le téléchargement, l'installation et la configuration de Java Les technologies Java : JavaEE, JavaME,

Read More

Microsoft Certified System Engineer Windows 2003

Microsoft Certified System Engineer Windows 2003 Global Knowledge - Rueil-Malmaison 2007 Réseau et système d’exploitation Microsoft Windows 2000 Conception de la sécurité pour les réseaux Microsoft Administration d’un environnement Microsoft® Windows Server™ 2003 Maintenance d’un

Read More

Les Clients Légers

Les Clients Légers COMPAQ - Issy Les Moulineaux 2002 Présentation de TSE Utiliser les représentations physiques et logiques d’un client léger Utiliser un plan d’adressage IP Configurer le serveur TSE Configurer le poste client TSE

Read More