Skip to content

Justin Pineda

Cybersecurity • Education • Practice

  • Home
  • Courses
    • Information Security
      • Module 1: General Security Concepts
      • Module 2: Operational & Organizational Security
      • Module 3: Legal Issues
      • Module 4: Privacy and Ethics
      • Module 5: Infrastructure Security
      • Module 6: Cryptography
      • Module 7: Public Key Infrastructure
      • Module 8: Physical Security
      • Module 9: Types of Attacks and Malware
      • Module 10: Security Operations and Baselining
    • Ethical Hacking
      • Module 1: Introduction to Ethical Hacking
      • Module 2: System Fundamentals
      • Module 3: Popular Attacks and Vulnerabilities
      • Module 4: Reconnaissance
      • Module 5: Scanning
      • Module 6: Gaining Access
      • Module 7: Maintaining Access and Covering Tracks
      • Module 8: Reporting
    • Cybersecurity Defense
      • Module 1: Risk Management
      • Module 2: Business Continuity
      • Module 3: Legal Investigation
      • Module 4: Computer Forensics
      • Module 5: Security Operations Center
    • Web Application Security
    • OSINT
    • IT Audit
    • Software Security
    • Threat Analysis and Detection
    • Cryptography
    • Investigating the Surface, Deep, and Dark Web
    • Data Structures
    • Design of Computer Networks
  • About

How to Start and Grow in Cybersecurity

How to Start and Grow in Cybersecurity

Posted on 8 Apr 20268 Apr 2026 by Justin PinedaIn Blogs, Education, Talks1 Minute Read

How to Keep it Private: People, Process and Technology

How to Keep it Private: People, Process and Technology

Posted on 11 Dec 2021 by Justin PinedaIn Blogs, Lessons, Research, Talks7 Minutes Read

Effectively Conducting Networking & Cybersecurity Distance Learning Courses

Effectively Conducting Networking & Cybersecurity Distance Learning Courses

Posted on 5 Jun 202011 Dec 2021 by Justin PinedaIn Academic, Blogs, Lessons, Talks4 Minutes Read

Tips and Reasons: A Career in Cybersecurity

Tips and Reasons: A Career in Cybersecurity

Posted on 8 Feb 202027 Aug 2022 by Justin PinedaIn Blogs, Research, Talks4 Minutes Read

A Primer on Ethical Hacking & Information Security for Senior High

A Primer on Ethical Hacking & Information Security for Senior High

Posted on 21 Mar 201621 Mar 2016 by Justin PinedaIn Talks1 Minute Read

Ethical Hacking & Information Security for PATTS faculty

Ethical Hacking & Information Security for PATTS faculty

Posted on 21 Mar 201621 Mar 2016 by Justin PinedaIn Talks1 Minute Read

Information Security & Ethical Hacking 101 @ PATTS

Information Security & Ethical Hacking 101 @ PATTS

Posted on 11 Aug 2015 by Justin PinedaIn Blogs, Talks1 Minute Read

Detecting Command and Control Traffic Using Botnet Correlator Module

Detecting Command and Control Traffic Using Botnet Correlator Module

Posted on 1 Jul 2015 by Justin PinedaIn Blogs, Research, Talks, Travel2 Minutes Read

Protection through Network Security

Protection through Network Security

Posted on 1 Mar 20151 Jul 2015 by Justin PinedaIn Talks1 Minute Read

Infosec: Discipline and Opportunities at LPU Batangas

Infosec: Discipline and Opportunities at LPU Batangas

Posted on 5 Feb 2015 by Justin PinedaIn Talks1 Minute Read

Ethical Hacking Workshop with SSS

Ethical Hacking Workshop with SSS

Posted on 21 Dec 201421 Dec 2014 by Justin PinedaIn Talks1 Minute Read

Secure Web Application Coding

Secure Web Application Coding

Posted on 2 Dec 20142 Dec 2014 by Justin PinedaIn Talks1 Minute Read

Posts navigation

← Older Posts

Category: Talks

Preparing a Data Privacy Compliant Organization

https://www.youtube.com/watch?v=fGlbwHDR4oU&t=1s

Tags

bcp burp suite business school child pornography cyber insurance cybersecurity data-protection data-protection-law data breach data lifecycle data privacy defense in depth diskriminasyon dpa dvwa Education equifax ethical hacking evidence handling exam preparation finance giac gmob google auth gwapt implicit deny INFOSEC investing iso 27001 keepass lastpass least privilege legitimate purpose mfa mobile app development mobile security money national privacy commission nist 800-207 npc owasp password manager pdi people personal-finance personal data inventory philippines pia pineda cybersecurity privacy privacy engineering privacy impact assessment process proportionality qualys ssl labs ransomware sans sase screenshots security security awareness security testing sequencer shopee snapshot social-media social engineering supreme court surveillance survey technology vapt zero trust zta ztn

Powered by WordPress.com.

Powered by WordPress.com.

Loading Comments...