Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.102880 értékelés alapján az ügyfelek 5-ből 4.86 csillagot adtak nekik: Computer Security Consultants .
my firm is in need for 20 network engineers for remote support. the job is fulltime job. skills there is need. Aruba Access points and switches, setting vlans and SSID's. Knowledge of IP Subnets and DHCP Cisco CCNP or Cisco CCIE 3-5 years experience, wifi experience is a must !!! english speak and text is a must have sent CV and lets go from there.
Need roadmap of what to study to become an ethical hacker.
Wanted: Experience with TrueNAS CORE (free edition) current version Needs: 1. Configure test TrueNAS Core (already installed on hardware) to interface with Windows domain for a. User and group security (username, password, group membership) b. Setting up and configuring SMB shares to work properly in a Windows domain environment c. Permissions (ACL) connecting multiple SMB shares to multiple Windows users/groups d. General system security and tone 2. Training for administrator at the company for a. Setting up production system b. Administering production system c. Basic troubleshooting d. Basic cybersecurity BID: Project based (fixed price). Must be able to be paid by bank transfer (1099 or W9/W8BEN required).
Looking for anyone who can support with basic to advance cybersecurity knowledge. Please let me know anyone who can support on call daily basis based on need. Must have technical expertise on any of the below Firewall Email gateway Antivirus SIEM tools DLP Data Classification Servers Red teaming and Pentesting Cyber Security Consultation FreePBX Firewall Configuration My FreePBX Server is having issues with call deployment due to the firewall and fail2ban. I need someone who has hands on knowledge of configuring it all way to make it work. I am myself ...
o Read research literature related to your field of interest and brainstorm an interesting research problem: ▪ Write a statement about your research problem identifying why you are interested in pursuing this research: • Describe your problem or question clearly and completely • Think through the feasibility of the project that your ▪ Identify the subproblems: • Use brainstorming/mind-mapping software to construct graphic networks of interrelated concepts, terms, and principles linked to your main problem ▪ Identify your research hypothesis: • Make sure that your hypothesis is intelligent, reasonable, and logical guesses about how your research problem or question might be resolved. ▪ Identify your assumptions if needed: • Remember: Assumption in a statement ...
I have 2 files that are getting flagged by VirusTotal as having a Trojan Malware (screenshots attached). I need to remove the malware so the files are SAFE to run. The software is a simple Windows app to swap the main button of Mouse in Windows using AutoHotKey. The files are here (EXE + AHK):
Looking for anyone sho can support with basic to advance cybersecurity knowledge. Please let me know anyone who can support on call daily basis based on need. Must have technical expertise on any of the below Firewall Email gateway Antivirus SIEM tools DLP Data Classification Servers Red teaming and Pentesting
1. looking for an expert to remotely troubleshoot the issues in TP Link ER605 SMB Router. a. Want to ensure failover is working as intended - have 2 ISP WANs enabled b. When there is LOS in one of the ISP's router, the entire network stops working 2. Need an automated monitoring tool configured to check if internet is working and is within acceptable speed limits. In case not, an SMS / Whatsapp notification should be triggered
Здравствуйте! Мне нужно сделать отчёты по 4 практическим работам в word. Версия программы должна быть Cisco Packet Tracer 6.2 Student Version. Образец титульного листа и требования к оформлению прикрепил (оформление я, если что, сам подправлю). Главное описать каждый шаг и прикреплять скриншоты. В общем, мне нужны 4 отчёта в word и 4 файла из Cisco в формате PKT. Срок: до конца месяца (чем быстрее, тем лучше).
I have a protective order against a person who is tech knowledgeable and has gained the aid of other like minded individuals. Not just a few but all my devices are under his manipulation. Since late 2019 I have not had privacy. All though we’re separated this guy is still around preventing me to recover, or access proper legal aid. I am in need of a person who can review logs undo log modifications and plainly document what is being done to the devices. Essentially, I am looking for a competent cyber forensic with experience and preferably qualification. I understand the difficulty of proving who is do the attacks and remote managing of devices but I will cross that road when the time comes. My priority is detailing the crimes and demonstrating that it is occurring and to nearly all...
Sophos firewall is currently working with Comcast xfinity IPv4 configuration. However ipv6 configuration has some issues . Wan interface can ping IPv6 from sophos diagnostic , but computers connected with sophos , have IPv6 ip assigned but not communicating on wan network
my instagram id got hacked need someone who can recover asap.
My house is in Gurgaon and I need someone to do networking of my house. I have two connections for broadband Fibre, Airtel and Jio. Mine is a villa. I want to have a two access points, preferably Ubiquity. One on the ground floor and the other on the first floor. I want a switch on the first floor as well. I want the networking to be done in such a way that I can get both airtel and jio connections at all locations so that if one fails the other can take over. If there is a bonding option, which can combine both it will be great.
Necesitamos un especialista en Ciberseguridad para esta tarea, precio a negociar.
In this lab you will design the virtualization infrastructure for an organization based on an analysis of the organization’s current applications running on standalone physical servers. The results of the analysis are summarized in the table at the end of this document. Senior management have instructed you to submit to them the capacity requirements required for the new virtual environment, building in 10% growth and 1 additional host to allow for continuous operation in the event that 1 host should fail. Your boss would also like you to show a breakdown for the Business Unit Managers of their own requirements for this new environment. In this instance, “Business Unit” is equivalent to “Workload”. There are no plans at the current time to virtualize any other...
I am looking for someone who could show me on zoom how to hack all the machines on cybernetics on I would like you to start the lab from the very beginning until we finish it so that I could see how you do it and learn from it.
Busco persona con conocimientos SEO para que redacte contenido referente a : Ciberseguridad IT/OT (Industrial) Tecnología Innovación Todo con foco en Ciberseguridad. La idea principal es posicionarme con referente del área y atraer potenciales clientes. 2 o 3 veces a la semana. Tengo ideas y material que podemos ir revisando en conjunto 1 vez a la semana.
Seriously talented ethical Data Network and Application Security professional needed. We have an application and platform that requires an external security assessment. Your role will be confidential and you will report to the internal data security team leader. Your funtion is to find the weaknesses and exploitable areas of our environment, apps code, APIs etc. before the bad actors can find them. We will reward you for helping us to secure the areas and vulnerabilities that we are not aware of. Accuracy, Detail, Speed, and Clever Tactics will be your strengths. You should be prepared to write up a clear assessment with recommendations that can be implemented. You may be requested to assist in remediation wnd implementation if needed for an additional engagement.
High Level Approach · Vendor will perform the health, capacity and security assessment of existing AD for Client. · As part of the testing, vendor will perform gap assessment of the below outlined task and share the report with current status along with recommendation to enhancement and resolution for the gap if any identified during the assessment. Existing Infrastructure assessment · Current OS · Current Domain Functional Level · Current Forest Functional Level · Replication health Access reconciliation · Normal user access reconciliation · Privilege/admin user access reconciliation · Computers, groups and other objects reconciliation · Security controls to perform strong governance across the AD for onboard...
Need Freelancers who can provide a long term support for securing our dedicated server and monitor and protect from being abused . There job will be to monitor ,report and fix This will be a long term arrangement
I currently use an Apple box as a cable box for Altice one. It only works in home connected to a Ubee modem/router combo. It does not work out of the home, says to connect to home network. Can someone setup a vpn on the Ubee modem/router so that when I use the Apple box in a remote location, it will work as an in home cable box???
1) Title ▪ Create a PowerPoint presentation ▪ Title slide with Add Name, Student number to 1st slide ▪ Please see the following instructions. Assignment 2) Part 1 In the PowerPoint presentation describe the following ▪ ITSM and ITIL (Short answer) • Describe what ITSM provides. • Describe how ITIL relates to ITSM. ▪ Processes and Outcomes. (Short answer) • Describe two examples of a service and their outcomes. ▪ List the Five Lifecycle stages ▪ List the four basic ITIL functional roles. 3) Part 2 • You are tasked with creating a business case for a new IT service. • Consider what type of IT service you may want to offer and remember this is the basis for all your assignments going forward. The service can be either a product or service. Add to the document outlin...
We need CEH: Certified Ethical Hacker for our work in hindi or urdu