Profile
Added Value
Vision and Mission
Divisions
Systems and Strategic Planning
Subject Matter Expertise
Cybersecurity
Disaster Recovery
IT Services
e-Solutions
Geographic Information Services
Validations
Benefits
Organizational Culture
Opportunities

Ethical Hacking

  • Expertise in Techniques & Methodologies
  • Attack Signatures
  • Tools (Nmap, Tripwire, Snort, Nessus, TCPdump, LanGaurd)

Computer Forensics & Crime Analysis

  • Tools (TCT, Mactimes, Sigwin, Macdaddy, and GNU Unix utlilities)

Security Assessment

  • Network Vulnerabilities Detection
  • Systems Security Assessment
  • Information & Applications Security
  • Audits and Security Policy Formulation

Incidence Logging & Response Management

Disaster Recovery

Cryptography

  • Encryption Key Development (Symmetric, Asymmetric)
  • Scripting
  • Binary Assessment
  • Tools & Techniques (SSH, RSA SecureID, IPSec)

Intrusion detection

Network Security

  • Firewalls (Stonegate, Eagle Raptor, PIX, Check Point)
  • OS (Unix, Linux, NT)

Network Administration

  • TCP/IP, NIS, NFS, SAMBA
  • Authentication
  • Firewalls
  • Sniffers

System Administration (Unix, Linux, SCO, NT, MVS)

Standards

  • DoD
  • NSA

Copyright | Terms & Conditions | Privacy Policy
© 1999- Cosmic Software Technology, Inc.