Skip to content

Mover and Shaker

In between traffic and disruptive technology

  • Home
  • Courses
    • Information Security
      • Module 1: General Security Concepts
      • Module 2: Operational & Organizational Security
      • Module 3: Legal Issues
      • Module 4: Privacy and Ethics
      • Module 5: Infrastructure Security
      • Module 6: Cryptography
      • Module 7: Public Key Infrastructure
      • Module 8: Physical Security
      • Module 9: Types of Attacks and Malware
      • Module 10: Security Operations and Baselining
    • Ethical Hacking
      • Module 1: Introduction to Ethical Hacking
      • Module 2: System Fundamentals
      • Module 3: Popular Attacks and Vulnerabilities
      • Module 4: Reconnaissance
      • Module 5: Scanning
      • Module 6: Gaining Access
      • Module 7: Maintaining Access and Covering Tracks
      • Module 8: Reporting
    • Cybersecurity Defense
      • Module 1: Risk Management
      • Module 2: Business Continuity
      • Module 3: Legal Investigation
      • Module 4: Computer Forensics
      • Module 5: Security Operations Center
    • Web Application Security
  • About
  • Welcome!

7 reasons why you should take up a Master’s degree

7 reasons why you should take up a Master’s degree

Unknown's avatar
Posted on 7 Jan 201727 Aug 2022 by Justin PinedaIn Academic, Experiences, Personal3 Minutes Read

Presented at the 14th NCITE and toured Dipolog City 2016

Presented at the 14th NCITE and toured Dipolog City 2016

Unknown's avatar
Posted on 2 Jan 20173 Jan 2017 by Justin PinedaIn Research, Travel2 Minutes Read

A Primer on Ethical Hacking & Information Security for Senior High

A Primer on Ethical Hacking & Information Security for Senior High

Unknown's avatar
Posted on 21 Mar 201621 Mar 2016 by Justin PinedaIn Talks1 Minute Read

Ethical Hacking & Information Security for PATTS faculty

Ethical Hacking & Information Security for PATTS faculty

Unknown's avatar
Posted on 21 Mar 201621 Mar 2016 by Justin PinedaIn Talks1 Minute Read

Vulnerability Proof-of-Concept and Analysis

Vulnerability Proof-of-Concept and Analysis

Unknown's avatar
Posted on 20 Feb 201612 Apr 2020 by Justin PinedaIn Academic, Blogs, COMSEC2, Research1 Minute Read

Machine Project in Infosec

Machine Project in Infosec

Unknown's avatar
Posted on 20 Feb 201612 Apr 2020 by Justin PinedaIn Academic, Blogs, INFOSEC, Research1 Minute Read

Research Paper on Emerging Technologies

Research Paper on Emerging Technologies

Unknown's avatar
Posted on 20 Feb 201612 Apr 2020 by Justin PinedaIn Academic, Blogs, INFOSEC, Research4 Minutes Read

Protected: Process Scheduling Course Notes in Operating Systems 1 (OPESYS1)

Protected: Process Scheduling Course Notes in Operating Systems 1 (OPESYS1)

Unknown's avatar
Posted on 22 Nov 201512 Apr 2020 by Justin PinedaIn COURSES, OPESYS15 Minutes Read

Is there really value in an IT Certification?

Is there really value in an IT Certification?

Unknown's avatar
Posted on 2 Oct 201512 Apr 2020 by Justin PinedaIn Blogs3 Minutes Read

Vulnerability Scanning & Risk Mitigation Project

Vulnerability Scanning & Risk Mitigation Project

Unknown's avatar
Posted on 19 Sep 201512 Apr 2020 by Justin PinedaIn Academic, Blogs, COMSEC1, Research1 Minute Read

Information Security & Ethical Hacking 101 @ PATTS

Information Security & Ethical Hacking 101 @ PATTS

Unknown's avatar
Posted on 11 Aug 2015 by Justin PinedaIn Blogs, Talks1 Minute Read

PCI-DSS and Vulnerability Management

PCI-DSS and Vulnerability Management

Unknown's avatar
Posted on 11 Aug 2015 by Justin PinedaIn Blogs, Research1 Minute Read

Posts navigation

← Older Posts
Newer Posts →

Preparing a Data Privacy Compliant Organization

https://www.youtube.com/watch?v=fGlbwHDR4oU&t=1s

Tags

acunetix apc seminar vulnerabilities indsutry daniel suarez burp suite business continuity bypass ssl pinning ccs week covid-19 cspc nabua bicol youth congress csrf cybersecurity cybersecurity career cybersecurity education data privacy diskriminasyon distance learning dpa dvwa ethical hacking exam preparation frida genymotion giac gmob gwapt high demand hydra information security INFOSEC infosec FUS model formula IT certification IT security low supply malware mensrea mobile security mobsf nessus networking education network security nmap online learning owasp pamantasan ng lungsod ng pasig patts pci-dss penetrationtesting pinedacybersecurity poc port scan privacy remote work research conference sans scan type secure web application coding workshop bancnet bitshield security awareness security mechanisms security services security testing sequencer skills gap social engineering surveillance teaching technology token vapt version scan vulnerability management vulnerability scan web goat websecurity wfh wireshark work from home

Blog at WordPress.com.

Proudly powered by WordPress | Theme: Carbon by Codestag.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Mover and Shaker
    • Join 29 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Mover and Shaker
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar

Loading Comments...