Freelancers para contratar en Afghanistan

  • Criptografía
  • Seguridad informática
  • Afghanistan
Sugerencias:
más

Países

Ubicación específica

Exámenes

Tarifa por hora (USD)

Puntaje

En línea

Mostrando 13 resultados
  • Contratar     yousefsalami2023
Contratar     yousefsalami2023

    yousefsalami2023 yousefsalami2023

    Afghanistan $5 USD / hora
    I am software Engineer & CEH. Just for change
    Afghanistan
    Hi. Guys . If you want to know about BFC group just call me to tell you something about it because it is to good for all
    Hi. Guys . If you want to know about BFC group just call me to tell you something about it because it is to good for all menos
  • Contratar yousefsalami2023
  • Contratar     Abdulqarib
Contratar     Abdulqarib

    Abdulqarib Abdulqarib

    Afghanistan $15 USD / hora
    NETWORK & SECURITY ENGINEER
    Afghanistan
    0.0
    0 comentarios 0 comentarios $15 USD por hora
    Skills: 1. Proficient in designing and managing deception networks. 2. Expertise in Network Administration. 3. Competent in Cloud Administration. 4. Skilled in comprehensive email forensics. 5. Proficient in hands-on security incident handling and response. 6. Familiarity with analytics and intelligence. 7....
    Skills: 1. Proficient in designing and managing deception networks. 2. Expertise in Network Administration. 3. Competent in Cloud Administration. 4. Skilled in comprehensive email forensics. 5. Proficient in hands-on security incident handling and response. 6. Familiarity with analytics and intelligence. 7. Experienced in writing cybersecurity blogs on trending topics. 8. Active cybersecurity researcher, contributing high-quality articles on various issues. Technical Skills: Routing: OSPF LSA, area and network types, OSPF states, virtual-links, authentication, default routes and filtering, route maps, distribute-list, offset list. IBGP and EBGP peering, next-hop, Attributes, AS path filtering, Route reflectors, confederation. EIGRP features, best path, unequal cost load balancing, stub, summarization, authentication, default routes and filtering. Switching: STP, RSTP, MSTP, Etherchannel, MLS, Intervlan routing, HSRP, VRRP, GLBP, BPDU filter/guard, Root guard. Security: Site to Site VPN, Remote access VPN, Dynamic multipoint VPN (DMVPN), virtual tunnel interface based site to site VPN. Local and remote AAA, 801.x authentication, modular quality of service, CBAC, Reflexive ACL, time based ACL, dynamic ACL, MAC ACL, VACL. PIX firewall, ASA, NAT, PAT, policy NAT, object ACL, L2/Transparent FW, Failover, Context. Product Knowledge: Cisco 3560 & 2960 switches, 7600 series routers, 525 PIX FW, 5525, 5520, 5515, 5506-x ASA. PBX Phone System: Mitel (Call Center, VoIP, Call belling, Call recording), AVAYA menos
  • Contratar Abdulqarib
  • Contratar     jantanahmadi
Contratar     jantanahmadi

    jantanahmadi jantanahmadi

    Afghanistan $20 USD / hora
    Cyber security
    Afghanistan
    0.0
    0 comentarios 0 comentarios $20 USD por hora
    Cyber security Cybersecurity refers to the practice of protecting computers, servers, networks, and data from unauthorized access, theft, damage, or disruption. It involves implementing various measures and technologies to safeguard digital systems and information from cyber threats. Here are some key aspects and...
    Cyber security Cybersecurity refers to the practice of protecting computers, servers, networks, and data from unauthorized access, theft, damage, or disruption. It involves implementing various measures and technologies to safeguard digital systems and information from cyber threats. Here are some key aspects and concepts related to cybersecurity: 1. **Threats**: Cybersecurity focuses on defending against a wide range of threats, including malware (such as viruses, worms, and ransomware), hacking attempts, phishing attacks, social engineering, insider threats, and more. 2. **Protection**: Cybersecurity measures aim to protect systems and data through various means, including access controls, encryption, firewalls, intrusion detection systems (IDS), antivirus software, and secure coding practices. 3. **Network Security**: Network security involves securing computer networks and their components, such as routers, switches, and firewalls. It includes measures like network segmentation, virtual private networks (VPNs), and network monitoring to detect and prevent unauthorized access. 4. **Application Security**: Application security focuses on identifying and addressing vulnerabilities in software applications. It involves secure coding practices, regular software updates and patches, penetration testing, and the use of web application firewalls (WAFs) to protect against attacks targeting applications. 5. **Data Protection**: Protecting data is a fundamental aspect of cybersecurity. This includes implementing data encryption, access controls, regular backups, and secure data storage and transmission practices. 6. **Incident Response**: Cybersecurity menos
  • Contratar jantanahmadi
  • Contratar     habibullah57
Contratar     habibullah57

    habibullah57 habibullah57

    Afghanistan $10 USD / hora
    Software Egnineer / Web Developer
    Afghanistan
    0.0
    0 comentarios 0 comentarios $10 USD por hora
    A software Engineer / Web Developer having skills of UX/UI Design, JS, HTML 5 /CSS, PHP, MYSQL, C# , and ASP.net.
    A software Engineer / Web Developer having skills of UX/UI Design, JS, HTML 5 /CSS, PHP, MYSQL, C# , and ASP.net. menos
  • Contratar habibullah57
  • Contratar     parwizmajeadi999
Contratar     parwizmajeadi999

    parwizmajeadi999 parwizmajeadi999

    Afghanistan $500 USD / hora
    Parwiz Majeadi Born 4/6/2006 in Afghanistan ??
    Afghanistan
    0.0
    0 comentarios 0 comentarios $500 USD por hora
    Computer programmer Android programming English instructor English Translator Web development Typer Audio & video Editor Speak in 5 langauge Accounter Sound Recorder Hardware engineer Software engineer Game engineer Robot engineer Technical
    Computer programmer Android programming English instructor English Translator Web development Typer Audio & video Editor Speak in 5 langauge Accounter Sound Recorder Hardware engineer Software engineer Game engineer Robot engineer Technical menos
  • Contratar parwizmajeadi999
  • Contratar     alireza51
Contratar     alireza51

    alireza51 alireza51

    Afghanistan $5 USD / hora
    I am a Computer Engineer(Programmer & Developer)
    Afghanistan
    Sure, I can provide information about programmers. Programmers, also known as developers or software engineers, are professionals who write, test, and maintain computer programs and software applications. They use programming languages such as Python, Java, C++, and many others to create software that performs...
    Sure, I can provide information about programmers. Programmers, also known as developers or software engineers, are professionals who write, test, and maintain computer programs and software applications. They use programming languages such as Python, Java, C++, and many others to create software that performs specific tasks or solves particular problems. Programmers play a crucial role in the development of various types of software, ranging from mobile apps and web applications to operating systems and databases. They work closely with other professionals, such as software designers, project managers, and quality assurance testers, to ensure that the software meets the desired requirements and functions correctly. Here are some key points about programmers: Programming Languages: Programmers are skilled in one or more programming languages. The choice of language depends on the requirements of the project and the specific domain in which they are working. Problem Solving: Programmers are problem solvers. They analyze complex problems, break them down into smaller components, and develop algorithms and code to solve those problems efficiently. Software Development Life Cycle: Programmers follow the software development life cycle (SDLC), which includes various stages such as requirements gathering, design, implementation, testing, and maintenance. They collaborate with other team members to ensure the smooth progress of the project. menos
  • Contratar alireza51
  • Contratar     Mobeenabed50
Contratar     Mobeenabed50

    Mobeenabed50 Mobeenabed50

    Afghanistan $10 USD / hora
    Web development Web designing
    Afghanistan
    0.0
    0 comentarios 0 comentarios $10 USD por hora
    I am a web developer and web designer. I have 16 years experience of being a programmer and 13 years of being a designer. I have contribution with many German, Spanish and Afghan companies. However, I am a new seller here I have done many projects.
    I am a web developer and web designer. I have 16 years experience of being a programmer and 13 years of being a designer. I have contribution with many German, Spanish and Afghan companies. However, I am a new seller here I have done many projects. menos
  • Contratar Mobeenabed50
  • Contratar     noorulhaq4
Contratar     noorulhaq4

    noorulhaq4 noorulhaq4

    Afghanistan $8 USD / hora
    I am Website Developer
    Afghanistan
    I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing
    I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing menos
  • Contratar noorulhaq4
  • Contratar     Muzafarimahdi
Contratar     Muzafarimahdi

    Muzafarimahdi Muzafarimahdi

    Afghanistan $5 USD / hora
    Cyber Security
    Afghanistan
    Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent and detect cyber threats, as well as responding to and recovering from any incidents that may...
    Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent and detect cyber threats, as well as responding to and recovering from any incidents that may occur. Here are some key concepts and practices related to cybersecurity: Risk Assessment: Assessing and identifying potential vulnerabilities and threats to the system, including weaknesses in software, hardware, and human factors. Access Control: Implementing mechanisms to control and regulate access to computer systems and networks, ensuring that only authorized individuals can access and use them. Firewalls: Firewalls are security devices or software that monitor and control incoming and outgoing network traffic, acting as a barrier between internal and external networks to prevent unauthorized access. Encryption: Encryption is the process of converting information into a code or cipher to prevent unauthorized access. It ensures that even if data is intercepted, it cannot be understood or used without the decryption key. Malware Protection: Implementing antivirus and anti-malware software to detect, prevent, and remove malicious software such as viruses, worms, Trojan horses, ransomware, and spyware. Patch Management: Keeping software systems up to date with the latest security patches and updates to address vulnerabilities and bugs that could be exploited by attackers. Security Awareness Training: Educating users about cybersecurity best practices, such as creating strong passwords, recognizing phishing emails, and avoiding suspicious websites, to reduce the risk of social engineering attacks. Intrusion Detection and Prevention Systems (IDPS): These systems monitor network traffic and detect and respond to potential intrusion attempts in real-time, providing alerts or taking automated actions to prevent attacks. Incident Response: Establishing procedures and plans to respond to cybersecurity incidents promptly, minimize damage, and restore normal operations. Regular Auditing and Testing: Conducting regular security audits and penetration testing to identify vulnerabilities and weaknesses in systems and networks, allowing for proactive mitigation of potential threats. menos
  • Contratar Muzafarimahdi
  • Contratar     mohammadwais007
Contratar     mohammadwais007

    mohammadwais007 mohammadwais007

    Afghanistan $5 USD / hora
    ✅Service You Expect, Quality You Deserve!
    Afghanistan
    I am an intelligent, hardworking, and dedicated person who believes in perfection. I work with accuracy and keep time schedules/ deadlines as a priority. I have 5 years of experience in my field. My services are the following ✅IT( information Technology) ✅Web Scraping ✅ Web Search ✅PDF to word, excel, and text....
    I am an intelligent, hardworking, and dedicated person who believes in perfection. I work with accuracy and keep time schedules/ deadlines as a priority. I have 5 years of experience in my field. My services are the following ✅IT( information Technology) ✅Web Scraping ✅ Web Search ✅PDF to word, excel, and text. ✅PDF editing ✅Mathematics Typing ✅Photoshop * HTML ✅Data Entry ✅Data processing ✅Data Management ✅Excel, Word, and PowerPoint work ✅Formatting and Designing ✅Illustrator *Translation I’ve performed these tasks for various national and international organizations All my projects are always delivered as per the agreed-upon timeline and quality. If you have any questions about my services or professional background please feel free to contact me. Despite all these, I’d love to hear from you about your project needs, and hope to work with you soon! menos
  • Contratar mohammadwais007

Hola , aquí encontrarás algunos freelancers fuera de línea

Hola , aquí encontrarás algunos freelancers fuera de línea que coinciden con ""

Contrata a los mejores freelancers con habilidades similares