Skip to content
Birhane Fitwi
Cybersecurity
Menu
Home
About me
Resume
Academic Transcript
Certifications
Technical Courses
Cryptography
CRYPTOCURRENCY, CRYPTOGRAPHY AND BLOCK- CHAIN
CRYPTOGRAPHIC AND OTHER MECHANISMS THAT PREVENTS DATA TEMPERING.
Cybersecurity Fundamentals
Autonomous Vehicles and Hackings
Types of Cookies and How It Actually Works:
CYBER ATTACK vs CYBER EXPLOITATION
PROTECT, DEFEND, DETER &ATTACK
FIXES & MITIGATION OF COMMON ATTACKS.
CYBER_KILL CHAIN:
CYBER WAR AND OTHER WARFARES
CYBER OPERATION _RANSOM ATTACK _UK’S RETAIL MARKET
PEGASUS SYPWARE
#651 (no title)
CORRECT RESPONSE TO POP-UPS
WHICH THREE OF THE NICE- FRAMEWORK IS APPEALING TO ME.
Cyber Prog & Networking -CYSE 250
Internet of Things: Cybersecurity and Networking
DESIGNING THE NETWORK TOPOLOGY OF HARRISON AND ASSOCIATES
CORRECT RESPONSE TO POP-UPS
FEW NOTES AND PRACTICES _CYSE_250
Non-Technical Courses
CYSE-250- cyber War
CHINA, RUSSIA DIFFRENCE ON HACKING STRATEGY
Russian Sponsored Cyber Threat
CYBER WAR AND OTHER WARFARES
CYSE 200T Cybersecurity-tech and society
Three ways computers have made the world safer and less safe.
Three ways computers have made the world safer and less safe.
Three ways computers have made the world safer and less safe.
Costs and Benefits of Developing Cybersecurity Programs in Business
How has cyber technology created opportunities for workplace deviance?
CYBER POLICY AND INFRASTRUCTURE GIVEN THE “SHORT ARM” OF PREDICTIVE KNWOLEDGE
MALICIOS CODE and DENIAL of SERVICE ATTACK
VICTIM PRECIPITATION
CYSE200T COURSE NOTES
CYSE-201S Cybersecurity and Social science
VICTIM PRECIPITATION
Cybersecurity Career: Cybercrime Researcher and Cybersecurity Analysts
WHICH THREE OF THE NICE- FRAMEWORK IS APPEALING TO ME.
Four Majors Related to Cybersecurity
Reason For Interest In Cybersecurity
How does cyber technology impact interactions between offenders and victims?
FOUR ETHICAL ISSUES ARISING FROM STORING ELECTRONIC DATA
CYSE 406 Cyber-Law
Summary of Gained Insights on Cyber-Law course!
Cybersecurity Policy Proposal for an Ideal US Representative
DATA PROTECTION AND PRIVACY ISSUES
PHIL 355E- Cyber ethics
Case Analysis on Users Data
Case Analysis on Professional Ethics
Literature 112L
E-PORTFOLIO
Job-Ad Analysis Essay
Reflective Essay
Forensic_Lab_Midterm
Skills and Artifacts
RESEARCH
DATA PROTECTION AND PRIVACY ISSUES
Case Analysis on Users Data
CS-120 -Research Skills on Sleep Deprivation
TECHNICAL
CRYPTOCURRENCY, CRYPTOGRAPHY AND BLOCK- CHAIN
Internet of Things: Cybersecurity and Networking
Python_Prog
PROBLEM SOLVING
FIXES & MITIGATION OF COMMON ATTACKS.
CYBER_KILL CHAIN:
CYBER OPERATION _RANSOM ATTACK _UK’S RETAIL MARKET
Contact
bfitw001@odu.edu
Contact
email: bfitw001@odu.edu
OR
Bprofcs@gmail.com
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
Accept