Skip to content

Justin Pineda

Cybersecurity • Education • Practice

  • Home
  • Courses
    • Information Security
      • Module 1: General Security Concepts
      • Module 2: Operational & Organizational Security
      • Module 3: Legal Issues
      • Module 4: Privacy and Ethics
      • Module 5: Infrastructure Security
      • Module 6: Cryptography
      • Module 7: Public Key Infrastructure
      • Module 8: Physical Security
      • Module 9: Types of Attacks and Malware
      • Module 10: Security Operations and Baselining
    • Ethical Hacking
      • Module 1: Introduction to Ethical Hacking
      • Module 2: System Fundamentals
      • Module 3: Popular Attacks and Vulnerabilities
      • Module 4: Reconnaissance
      • Module 5: Scanning
      • Module 6: Gaining Access
      • Module 7: Maintaining Access and Covering Tracks
      • Module 8: Reporting
    • Cybersecurity Defense
      • Module 1: Risk Management
      • Module 2: Business Continuity
      • Module 3: Legal Investigation
      • Module 4: Computer Forensics
      • Module 5: Security Operations Center
    • Web Application Security
    • OSINT
    • IT Audit
    • Software Security
    • Threat Analysis and Detection
    • Cryptography
    • Investigating the Surface, Deep, and Dark Web
    • Data Structures
    • Design of Computer Networks
  • About

Securing the Organization’s IT Assets Amidst COVID-19

Securing the Organization’s IT Assets Amidst COVID-19

Posted on 29 Apr 202011 Dec 2021 by Justin PinedaIn Blogs, INFOSEC, Research5 Minutes Read

Lesson 10: What are Security Services and Mechanisms?

Lesson 10: What are Security Services and Mechanisms?

Posted on 5 Apr 202027 Aug 2022 by Justin PinedaIn INFOSEC, Lessons2 Minutes Read

Lesson 9: How a Court Decision Changed Privacy Laws in the World

Lesson 9: How a Court Decision Changed Privacy Laws in the World

Posted on 4 Apr 202012 Apr 2020 by Justin PinedaIn INFOSEC, Lessons2 Minutes Read

Lesson 8: What are the challenges in responding to cybercrimes?

Lesson 8: What are the challenges in responding to cybercrimes?

Posted on 3 Apr 202012 Apr 2020 by Justin PinedaIn INFOSEC, Lessons3 Minutes Read

Lesson 7: Why HR Policies complement Information Security

Lesson 7: Why HR Policies complement Information Security

Posted on 2 Apr 202027 Aug 2022 by Justin PinedaIn INFOSEC, Lessons1 Minute Read

Lesson 6: Organizational Security

Lesson 6: Organizational Security

Posted on 1 Apr 202012 Apr 2020 by Justin PinedaIn INFOSEC, Lessons2 Minutes Read

Exploring the Security Issues behind Facebook’s User Tracking from its ‘Big Data’ for Competitive Intelligence

Exploring the Security Issues behind Facebook’s User Tracking from its ‘Big Data’ for Competitive Intelligence

Posted on 9 Mar 202020 Mar 2020 by Justin PinedaIn Blogs, Research11 Minutes Read

Tips and Reasons: A Career in Cybersecurity

Tips and Reasons: A Career in Cybersecurity

Posted on 8 Feb 202027 Aug 2022 by Justin PinedaIn Blogs, Research, Talks4 Minutes Read

4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

Posted on 26 Dec 201920 Mar 2020 by Justin PinedaIn Blogs, Research4 Minutes Read

Proud of my students’ achievements @ UA&P event

Proud of my students’ achievements @ UA&P event

Posted on 1 Mar 201729 Jun 2017 by Justin PinedaIn Academic, Blogs, Experiences, Research1 Minute Read

8 Helpful Things You can do to Prepare and Pass a GIAC exam

8 Helpful Things You can do to Prepare and Pass a GIAC exam

Posted on 19 Feb 201719 Feb 2017 by Justin PinedaIn Blogs, Experiences, Personal6 Minutes Read

7 reasons why you should take up a Master’s degree

7 reasons why you should take up a Master’s degree

Posted on 7 Jan 201727 Aug 2022 by Justin PinedaIn Academic, Experiences, Personal3 Minutes Read

Posts navigation

← Older Posts
Newer Posts →

Preparing a Data Privacy Compliant Organization

https://www.youtube.com/watch?v=fGlbwHDR4oU&t=1s

Tags

bcp burp suite business school child pornography cyber insurance cybersecurity data-protection data-protection-law data breach data lifecycle data privacy defense in depth diskriminasyon dpa dvwa Education equifax ethical hacking evidence handling exam preparation finance giac gmob google auth gwapt implicit deny INFOSEC investing iso 27001 keepass lastpass least privilege legitimate purpose mfa mobile app development mobile security money national privacy commission nist 800-207 npc owasp password manager pdi people personal-finance personal data inventory philippines pia pineda cybersecurity privacy privacy engineering privacy impact assessment process proportionality qualys ssl labs ransomware sans sase screenshots security security awareness security testing sequencer shopee snapshot social-media social engineering supreme court surveillance survey technology vapt zero trust zta ztn

Powered by WordPress.com.

Powered by WordPress.com.

Loading Comments...