Strategy to develop a system for Cyber Emergency Response on the Internet
All the events that occur in the field of security for example vulnerabilities, compromises from live, various identification of attacks or analysis of the cause of the event, take as a basis and starting point the Flow of information. Challenge Information flow control – This process or cycle that completely defines the whole model, the… Continue reading Strategy to develop a system for Cyber Emergency Response on the Internet
E01 Live DEMO on Penetration Testing Linux
A demonstration hands-on in cybersecurity area, Penetration Testing by using Linux virtual environment by Atdhe Buja CEH was conducted.
E02 Live DEMO on Penetration Testing Linux
As a part of education program and in regard to October which is CyberSecurity Month in European continent Atdhe Buja CEH provides E02 demonstration livestream resources on Penetration Testing.
Activities
We provide a variety of planning & organizing activities on our site or customer site, by following all project management phases and making evaluation of it. Hackathons | Cyber Exercise different models | Workshops | Conferences | ICT Academy has organize & coordinated activities listed below: Cyber Security Hackathon (CTF) #1 Mitrovica Kosovo Safer Internet Day in… Continue reading Activities