Is your country on the list?
Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.From 103162 reviews, clients rate our Computer Security Consultants 4.86 out of 5 stars.
Create an Active Directory environment in virtualbox. -DomainServer - 2 Windows 10 clients Create a tutorial on different types of vulnerabilities in active directory in Word and ppt - kerberos brute force - Overpass The Hash/Pass The Key (PTK) - AS-REP Roasting - Pass The Ticket (PTT) - Kerberoasting - Golden Ticket and Silver Ticket
We are a growing MSP that is partnered with Fortinet and under contract to support a large scale Fortinet network for a major ISP. This huge core network requires a Fortinet NSE4 or 7 with an NSE5 (FortiManager / FortiAnalyzer) specialty to assist us with both scoping and providing support, configuring the equipment per the client's spec and troubleshooting both the old and the new infrastructure as needed. This network is 100% managed via FortiManager. There will also be other assignments available to support other large Fortinet client networks & projects. Possible Contract to Hire Opportunity for someone looking at Charlotte, NC as a potential place to build a tech career. We have many other network projects and client networks to manage and support to offer as well.
Basically, this task is a kind of writing a comprehensive research report (5000 to 6000 words) into a specific domain. In that specific domain, how can we make any that organization digitized and equipped with the latest information technologies and tools. or it could be how can we improve, enhance, modernize and make ready any specific organization for the future information technology and cyber challenges. The exact title for the report has to be discussed in detail and finalized yet. As an expert you have to talk about different strategies and frameworks and latest upcoming technologies ahead (say; within time frame of 25 years) with as much updated references as possible. It should also reflect some kind of forecasting a possible change in that specific technology field till 2050. Some...
Introduction to computing and information technology 1 This is the first of two OU level one modules that introduce you to key concepts in computing and information technology (IT), such as digital technologies, programming and networking. This module will equip you with a comprehensive toolbox of relevant knowledge, understanding and skills and introduce you to issues encountered in computing and IT, including the profound social and ethical challenges posed by these technologies. You will also develop your key skills including communication, numeracy and digital and information literacy (DIL). This will give you a firm basis for further study, especially Introduction to computing and information technology 2 (TM112
Need roadmap of what to study to become an ethical hacker.
Wanted: Experience with TrueNAS CORE (free edition) current version Needs: 1. Configure test TrueNAS Core (already installed on hardware) to interface with Windows domain for a. User and group security (username, password, group membership) b. Setting up and configuring SMB shares to work properly in a Windows domain environment c. Permissions (ACL) connecting multiple SMB shares to multiple Windows users/groups d. General system security and tone 2. Training for administrator at the company for a. Setting up production system b. Administering production system c. Basic troubleshooting d. Basic cybersecurity BID: Project based (fixed price). Must be able to be paid by bank transfer (1099 or W9/W8BEN required).
Looking for anyone who can support with basic to advance cybersecurity knowledge. Please let me know anyone who can support on call daily basis based on need. Must have technical expertise on any of the below Firewall Email gateway Antivirus SIEM tools DLP Data Classification Servers Red teaming and Pentesting Cyber Security Consultation FreePBX Firewall Configuration My FreePBX Server is having issues with call deployment due to the firewall and fail2ban. I need someone who has hands on knowledge of configuring it all way to make it work. I am myself ...
o Read research literature related to your field of interest and brainstorm an interesting research problem: ▪ Write a statement about your research problem identifying why you are interested in pursuing this research: • Describe your problem or question clearly and completely • Think through the feasibility of the project that your ▪ Identify the subproblems: • Use brainstorming/mind-mapping software to construct graphic networks of interrelated concepts, terms, and principles linked to your main problem ▪ Identify your research hypothesis: • Make sure that your hypothesis is intelligent, reasonable, and logical guesses about how your research problem or question might be resolved. ▪ Identify your assumptions if needed: • Remember: Assumption in a statement ...
Looking for anyone sho can support with basic to advance cybersecurity knowledge. Please let me know anyone who can support on call daily basis based on need. Must have technical expertise on any of the below Firewall Email gateway Antivirus SIEM tools DLP Data Classification Servers Red teaming and Pentesting
1. looking for an expert to remotely troubleshoot the issues in TP Link ER605 SMB Router. a. Want to ensure failover is working as intended - have 2 ISP WANs enabled b. When there is LOS in one of the ISP's router, the entire network stops working 2. Need an automated monitoring tool configured to check if internet is working and is within acceptable speed limits. In case not, an SMS / Whatsapp notification should be triggered
I have a protective order against a person who is tech knowledgeable and has gained the aid of other like minded individuals. Not just a few but all my devices are under his manipulation. Since late 2019 I have not had privacy. All though we’re separated this guy is still around preventing me to recover, or access proper legal aid. I am in need of a person who can review logs undo log modifications and plainly document what is being done to the devices. Essentially, I am looking for a competent cyber forensic with experience and preferably qualification. I understand the difficulty of proving who is do the attacks and remote managing of devices but I will cross that road when the time comes. My priority is detailing the crimes and demonstrating that it is occurring and to nearly all...
Sophos firewall is currently working with Comcast xfinity IPv4 configuration. However ipv6 configuration has some issues . Wan interface can ping IPv6 from sophos diagnostic , but computers connected with sophos , have IPv6 ip assigned but not communicating on wan network
my instagram id got hacked need someone who can recover asap.
My house is in Gurgaon and I need someone to do networking of my house. I have two connections for broadband Fibre, Airtel and Jio. Mine is a villa. I want to have a two access points, preferably Ubiquity. One on the ground floor and the other on the first floor. I want a switch on the first floor as well. I want the networking to be done in such a way that I can get both airtel and jio connections at all locations so that if one fails the other can take over. If there is a bonding option, which can combine both it will be great.
In this lab you will design the virtualization infrastructure for an organization based on an analysis of the organization’s current applications running on standalone physical servers. The results of the analysis are summarized in the table at the end of this document. Senior management have instructed you to submit to them the capacity requirements required for the new virtual environment, building in 10% growth and 1 additional host to allow for continuous operation in the event that 1 host should fail. Your boss would also like you to show a breakdown for the Business Unit Managers of their own requirements for this new environment. In this instance, “Business Unit” is equivalent to “Workload”. There are no plans at the current time to virtualize any other...
I am looking for someone who could show me on zoom how to hack all the machines on cybernetics on I would like you to start the lab from the very beginning until we finish it so that I could see how you do it and learn from it.
Seriously talented ethical Data Network and Application Security professional needed. We have an application and platform that requires an external security assessment. Your role will be confidential and you will report to the internal data security team leader. Your funtion is to find the weaknesses and exploitable areas of our environment, apps code, APIs etc. before the bad actors can find them. We will reward you for helping us to secure the areas and vulnerabilities that we are not aware of. Accuracy, Detail, Speed, and Clever Tactics will be your strengths. You should be prepared to write up a clear assessment with recommendations that can be implemented. You may be requested to assist in remediation wnd implementation if needed for an additional engagement.
High Level Approach · Vendor will perform the health, capacity and security assessment of existing AD for Client. · As part of the testing, vendor will perform gap assessment of the below outlined task and share the report with current status along with recommendation to enhancement and resolution for the gap if any identified during the assessment. Existing Infrastructure assessment · Current OS · Current Domain Functional Level · Current Forest Functional Level · Replication health Access reconciliation · Normal user access reconciliation · Privilege/admin user access reconciliation · Computers, groups and other objects reconciliation · Security controls to perform strong governance across the AD for onboard...
We're looking for cybersecurity professional, preferably someone local (Seattle) or at least in the US. Looking for knowledgeable data security expert to examine our data storage and security for vulnerabilities, especially our usage of Synology NAS and Norton 360 with Lifelock. Must have experience: - Setting up Synology NAS local and remote with backup and security; - Setting up Norton 360 with LifeLock; - Network security for family and small-business assets. Thank you!
Здравствуйте! Мне нужно сделать отчёты по 4 практическим работам в word. Версия программы должна быть Cisco Packet Tracer 6.2 Student Version. Образец титульного листа и требования к оформлению прикрепил (оформление я, если что, сам подправлю). Главное описать каждый шаг и прикреплять скриншоты. В общем, мне нужны 4 отчёта в word и 4 файла из Cisco в формате PKT. Срок: до конца месяца (чем быстрее, тем лучше).
Necesitamos un especialista en Ciberseguridad para esta tarea, precio a negociar.