Dedicated Information Security Specialist with expertise in utilizing security solutions to ensure the Confidentiality, Integrity, and Availability of Organizational Data.
a)Configuring firewalls,
b)Configuring IDS,
c)Installing, exploiting, and blocking off a malware-based backdoor.