Siguria e Kompjuterave Jobs
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.
Punësoni Computer Security ConsultantsI want to monitor FileZillaServer log on Wazuh. Need to view who and when user logon/logoff on Filezilla Server on a Windows Srv 2016
Security checklist Firewall Servers Desktops and Laptops Network
Cyber Security Writing ! Different documents to be written on different topic under the main topic of cyber security . you must be experienced one and must have cyber security background. thanks
i need the cyber security coder for multiple jobs. Details will be discussed..
I have a project that need developers or experts from security cyber. If you have such experiences, please send me a chat to discuss in more details. TQ
I am searching for ethical hacker for learning purpose
This challenge consists of two phases. In the first phase you will construct a simple network server. The next phase will consists of convincing multiple such servers to work together.
Hello, we have integrated the cyber section in our agency. We are looking for cyber experts able to detect flaws in company websites. Our niche is cryptocurrency/NFT companies.
I am in the process of building a software and would like a cyber security expert's opinion on the best way to go about it would be.
I NEED SOMEONE WHO KNOW HOW TO CONFIGURE VPN ON THE ROUTER. REASON: I'M CHANGING COUNTRIES AND I NEED TO EMULATE MY LOCATION ON THE MODEM NOTE: I NEED IT TO WORK IN FORTCLIENTE, FORTINET.
Need to fix the security issue related to IIS server.
Preparing a security assessment that will combine 5 different security standards related to Information Security, Industry Control Systems, and the convergence between them to be presented into one excel checklist sheet that will be used to review compliance with an objective of evaluating and mitigating risks in various types of organizations, Standards Name of Standards: 1) Local Governing Authority (Standard pdf. Available, you are required to convert it to excel assessment sheet) List of Standards falling user the purview of Local Governing Authority. Will be provided by my end 2) NESA - National Electronic Security Authority (excel checklist available & I will be providing it) UAE-NESA 3) NIST - National Institute of Standards & Technology (NIST SP 800-53 R5 & NIST SP 800...
I need Cryptography dev expert who knows ciphers
I would like to create two honeypots and apply attack patterns on both the honeypots. I would like to recommend which honeypot is better for organisation.
I NEED SOMEONE WHO KNOW HOW TO CONFIGURE VPN ON THE ROUTER. REASON: I'M CHANGING COUNTRIES AND I NEED TO EMULATE MY LOCATION ON THE MODEM. NOTE: I NEED IT TO WORK IN FORTCLIENTE, FORTINET.
I am trying to create an optimized home network and am looking for the best advice as for how to accomplish that. My ISP: Comcast Xfinity 1200Mbps subscription My current gear: Netgear Nighthawk CAX80 DOCSIS3.1 Wireless Combo (Multigig 2.5 + Aggregate options) Netgear Nighthawk SX10 (GS810EMX) smart switch (also has aggregate or multigig) Netgear Nighthawk EAX80 "Mesh" Extender Netgear Nighthawk R6080 Router (setup in Access Point mode) My configuration is using the Multigig port out of the CAX80 using a Cat6 cable into the Multigig input of the SX10 switch. The switch out then outputs to my major media devices. (gaming PC, Nvidia Shield, as well as some smarthome devices like Hue Bridge, and now recently added the access point. Currently the EAX80 extender is unplugged...
Hy, I need an expert, who has previous experience in Cuckoo Sandbox and Window API for malware analysis. The analysis should be static and dynamic. I need implementation and report within 24 hours. My maximum budget is 100 AUD. Please see the attached file for detail. All requirements must be completed according to the attachment. The samples of the malware can be download from this link There should be at least 5 minimum qakbot malware analyzed using Sandbox and Window API also with static and dynamic techniques. In the report all the questions given in the attachment file must be addressed in detailed like execution time, compilation time, entry point, file singed or not, if singed which certificate etc. All these questions in the static and dynamic parts should be addressed in de...
It would be like Minecraft where you can build stuff and experiment second life like an economy jobs and the metaverse where you can create and earn money have fun
The suitable candidate must be able to work independently and support a range of networking solutions. Experience in network security is preferred but not compulsory.
Need someone good in CISCO networking
a description of the methodology and the required components following a specific format will be provided the work is urgent and needs to be done in 5-6 hours time around 3000 words
LAPTOP REPAIR TECHNICIANS NEEDED! Are you great at repairing PC's and laptops? Want to work for one of the world's biggest technology companies? Are you located in or close to (PUT IN LOCAL AREA HERE)? If you thrive on taking a customer centric based approach and have experience with hardware repairs for notebooks/laptops and printers, then we want to hear from you! A tech giant through Freelancer.com - the world's largest freelancing marketplace - is looking for Field Hardware Engineer candidates! Some responsibilities may include but are not limited to: Perform preventative maintenance and repair services on equipment by analysing system problems, troubleshooting, ordering and gathering components and parts, completing installation and performing tests Replace...
Need Ethical hacker to do long term project
develop a SecuriCAD model which consists of at least three networks. • The first network is an employee environment, which can be seen as a public access network. • The second network is an administration network having an internal Web Application and Database server that can be accessed internally. • The third network is an IT Management network, where IT technicians can manage all servers over SSH or Web Application. Additionally, the third network has a Database and Web Application that can only be accessible from the third network. All networks must contain at least one Windows and one Linux host. The networks are connected using routers. You have freedom in choosing high-value assets for analysis. The analysis must be done on the following threats: • Denial of Serv...
I want to be able to connect multiple networks together. I need guidance/assistance in achieving the setup. Please see image
You must develop a SecuriCAD model which consists of at least three networks. • The first network is an employee environment, which can be seen as a public access network. • The second network is an administration network having an internal Web Application and Database server that can be accessed internally. • The third network is an IT Management network, where IT technicians can manage all servers over SSH or Web Application. Additionally, the third network has a Database and Web Application that can only be accessible from the third network. All networks must contain at least one Windows and one Linux host. The networks are connected using routers. You have freedom in choosing high-value assets for analysis. The analysis must be done on the following threats: • Denia...
looking for an ethical hacker for my project
We are looking for a Freelancer Ethical Hacking Trainer for the duration of 1 month, who can take classes of student for 5 days a week for 1.5 hour. Candidate must have good practical knowledge of Ethical Hacking. Experience in giving training in the given field will be preferred.
hello i need someone who can do webshell backdoor service
Hello, I need help troublshotting ntopng with mikrotik its installed, configured somehow traffic is not coming probably problem with nprobe. if you have prior experience please bid. Thanks
Need Ethical hacker to do long term project
Looking for a cyber security trainer with experience in one or more of the following domains. 1. VAPT 2. Network Security 3. Risk analysis and Mitigation 4. Information Security Auditing 5. Cryptography
I would like to create a platform that allows me to share information in a secure way. I was thinking some form of 2FA however I am open to suggestions.
Need Ethical hacker to do long term project
I would like to create two honeypots where one without any attacks and other with different attacks like bruteforce, ddos and finally comparison between honeypots and attack patterns. We are finally proving which honeypot is best for the organisation.
Fix my small office network with 2 printers and 2 computer
I have basic CTF quiz I need to submit 1- Linux 2- Network ( Wireshark ) 3-Reverse Engineering its all level 1 CTF ,
I need a paper with simulations either done with MATLAB or R for some techniques to comparative analyse some techniques of cloud security. In the experiment some screen shots must be taken,it has a soon Deadline.
i need the cyber security coder for multiple jobs. Details will be discussed..