Journal #5

C – Create app that rates software

Y – Yacht GPS software that I secure

B – Bug bounty hunting

E – Ethical Hacking

R – Risk/Vulnerability testing

S – Security architecture designing

E – Encryption services

C – Cloud security specialist

U – Undercover intrusion testing

R – Reporting risks in the infrastructure and monitoring them

I -Incident response planning

T – Threat detection

Y – Yara Development

Leave a Reply

Your email address will not be published. Required fields are marked *