Freelancers para contratar en Afghanistan
Mostrando 13 resultados
Freelancers patrocinados
-
yousefsalami2023 yousefsalami2023
$5 USD / horaI am software Engineer & CEH. Just for changeProgramación en C, Programación en C++, Seguridad informática, Full Stack Development, Google AnalyticsHi. Guys . If you want to know about BFC group just call me to tell you something about it because it is to good for allHi. Guys . If you want to know about BFC group just call me to tell you something about it because it is to good for all menos
Contratar yousefsalami2023
-
Skills: 1. Proficient in designing and managing deception networks. 2. Expertise in Network Administration. 3. Competent in Cloud Administration. 4. Skilled in comprehensive email forensics. 5. Proficient in hands-on security incident handling and response. 6. Familiarity with analytics and intelligence. 7....Skills: 1. Proficient in designing and managing deception networks. 2. Expertise in Network Administration. 3. Competent in Cloud Administration. 4. Skilled in comprehensive email forensics. 5. Proficient in hands-on security incident handling and response. 6. Familiarity with analytics and intelligence. 7. Experienced in writing cybersecurity blogs on trending topics. 8. Active cybersecurity researcher, contributing high-quality articles on various issues. Technical Skills: Routing: OSPF LSA, area and network types, OSPF states, virtual-links, authentication, default routes and filtering, route maps, distribute-list, offset list. IBGP and EBGP peering, next-hop, Attributes, AS path filtering, Route reflectors, confederation. EIGRP features, best path, unequal cost load balancing, stub, summarization, authentication, default routes and filtering. Switching: STP, RSTP, MSTP, Etherchannel, MLS, Intervlan routing, HSRP, VRRP, GLBP, BPDU filter/guard, Root guard. Security: Site to Site VPN, Remote access VPN, Dynamic multipoint VPN (DMVPN), virtual tunnel interface based site to site VPN. Local and remote AAA, 801.x authentication, modular quality of service, CBAC, Reflexive ACL, time based ACL, dynamic ACL, MAC ACL, VACL. PIX firewall, ASA, NAT, PAT, policy NAT, object ACL, L2/Transparent FW, Failover, Context. Product Knowledge: Cisco 3560 & 2960 switches, 7600 series routers, 525 PIX FW, 5525, 5520, 5515, 5506-x ASA. PBX Phone System: Mitel (Call Center, VoIP, Call belling, Call recording), AVAYA menos
Contratar Abdulqarib
-
Cyber security Cybersecurity refers to the practice of protecting computers, servers, networks, and data from unauthorized access, theft, damage, or disruption. It involves implementing various measures and technologies to safeguard digital systems and information from cyber threats. Here are some key aspects and...Cyber security Cybersecurity refers to the practice of protecting computers, servers, networks, and data from unauthorized access, theft, damage, or disruption. It involves implementing various measures and technologies to safeguard digital systems and information from cyber threats. Here are some key aspects and concepts related to cybersecurity: 1. **Threats**: Cybersecurity focuses on defending against a wide range of threats, including malware (such as viruses, worms, and ransomware), hacking attempts, phishing attacks, social engineering, insider threats, and more. 2. **Protection**: Cybersecurity measures aim to protect systems and data through various means, including access controls, encryption, firewalls, intrusion detection systems (IDS), antivirus software, and secure coding practices. 3. **Network Security**: Network security involves securing computer networks and their components, such as routers, switches, and firewalls. It includes measures like network segmentation, virtual private networks (VPNs), and network monitoring to detect and prevent unauthorized access. 4. **Application Security**: Application security focuses on identifying and addressing vulnerabilities in software applications. It involves secure coding practices, regular software updates and patches, penetration testing, and the use of web application firewalls (WAFs) to protect against attacks targeting applications. 5. **Data Protection**: Protecting data is a fundamental aspect of cybersecurity. This includes implementing data encryption, access controls, regular backups, and secure data storage and transmission practices. 6. **Incident Response**: Cybersecurity menos
Contratar jantanahmadi
-
A software Engineer / Web Developer having skills of UX/UI Design, JS, HTML 5 /CSS, PHP, MYSQL, C# , and ASP.net.A software Engineer / Web Developer having skills of UX/UI Design, JS, HTML 5 /CSS, PHP, MYSQL, C# , and ASP.net. menos
Contratar habibullah57
-
parwizmajeadi999 parwizmajeadi999
$500 USD / horaParwiz Majeadi Born 4/6/2006 in Afghanistan ??Accounting Tutoring, Audio Editing, Seguridad informática, Computer Support, English (UK) TranslatorComputer programmer Android programming English instructor English Translator Web development Typer Audio & video Editor Speak in 5 langauge Accounter Sound Recorder Hardware engineer Software engineer Game engineer Robot engineer TechnicalComputer programmer Android programming English instructor English Translator Web development Typer Audio & video Editor Speak in 5 langauge Accounter Sound Recorder Hardware engineer Software engineer Game engineer Robot engineer Technical menos
Contratar parwizmajeadi999
-
Sure, I can provide information about programmers. Programmers, also known as developers or software engineers, are professionals who write, test, and maintain computer programs and software applications. They use programming languages such as Python, Java, C++, and many others to create software that performs...Sure, I can provide information about programmers. Programmers, also known as developers or software engineers, are professionals who write, test, and maintain computer programs and software applications. They use programming languages such as Python, Java, C++, and many others to create software that performs specific tasks or solves particular problems. Programmers play a crucial role in the development of various types of software, ranging from mobile apps and web applications to operating systems and databases. They work closely with other professionals, such as software designers, project managers, and quality assurance testers, to ensure that the software meets the desired requirements and functions correctly. Here are some key points about programmers: Programming Languages: Programmers are skilled in one or more programming languages. The choice of language depends on the requirements of the project and the specific domain in which they are working. Problem Solving: Programmers are problem solvers. They analyze complex problems, break them down into smaller components, and develop algorithms and code to solve those problems efficiently. Software Development Life Cycle: Programmers follow the software development life cycle (SDLC), which includes various stages such as requirements gathering, design, implementation, testing, and maintenance. They collaborate with other team members to ensure the smooth progress of the project. menos
Contratar alireza51
-
I am a web developer and web designer. I have 16 years experience of being a programmer and 13 years of being a designer. I have contribution with many German, Spanish and Afghan companies. However, I am a new seller here I have done many projects.I am a web developer and web designer. I have 16 years experience of being a programmer and 13 years of being a designer. I have contribution with many German, Spanish and Afghan companies. However, I am a new seller here I have done many projects. menos
Contratar Mobeenabed50
-
I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing I am Expert in Website Development and Database DesigningI am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing I am Expert in Website Development and Database Designing menos
Contratar noorulhaq4
-
Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent and detect cyber threats, as well as responding to and recovering from any incidents that may...Cybersecurity refers to the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent and detect cyber threats, as well as responding to and recovering from any incidents that may occur. Here are some key concepts and practices related to cybersecurity: Risk Assessment: Assessing and identifying potential vulnerabilities and threats to the system, including weaknesses in software, hardware, and human factors. Access Control: Implementing mechanisms to control and regulate access to computer systems and networks, ensuring that only authorized individuals can access and use them. Firewalls: Firewalls are security devices or software that monitor and control incoming and outgoing network traffic, acting as a barrier between internal and external networks to prevent unauthorized access. Encryption: Encryption is the process of converting information into a code or cipher to prevent unauthorized access. It ensures that even if data is intercepted, it cannot be understood or used without the decryption key. Malware Protection: Implementing antivirus and anti-malware software to detect, prevent, and remove malicious software such as viruses, worms, Trojan horses, ransomware, and spyware. Patch Management: Keeping software systems up to date with the latest security patches and updates to address vulnerabilities and bugs that could be exploited by attackers. Security Awareness Training: Educating users about cybersecurity best practices, such as creating strong passwords, recognizing phishing emails, and avoiding suspicious websites, to reduce the risk of social engineering attacks. Intrusion Detection and Prevention Systems (IDPS): These systems monitor network traffic and detect and respond to potential intrusion attempts in real-time, providing alerts or taking automated actions to prevent attacks. Incident Response: Establishing procedures and plans to respond to cybersecurity incidents promptly, minimize damage, and restore normal operations. Regular Auditing and Testing: Conducting regular security audits and penetration testing to identify vulnerabilities and weaknesses in systems and networks, allowing for proactive mitigation of potential threats. menos
Contratar Muzafarimahdi
-
I am an intelligent, hardworking, and dedicated person who believes in perfection. I work with accuracy and keep time schedules/ deadlines as a priority. I have 5 years of experience in my field. My services are the following ✅IT( information Technology) ✅Web Scraping ✅ Web Search ✅PDF to word, excel, and text....I am an intelligent, hardworking, and dedicated person who believes in perfection. I work with accuracy and keep time schedules/ deadlines as a priority. I have 5 years of experience in my field. My services are the following ✅IT( information Technology) ✅Web Scraping ✅ Web Search ✅PDF to word, excel, and text. ✅PDF editing ✅Mathematics Typing ✅Photoshop * HTML ✅Data Entry ✅Data processing ✅Data Management ✅Excel, Word, and PowerPoint work ✅Formatting and Designing ✅Illustrator *Translation I’ve performed these tasks for various national and international organizations All my projects are always delivered as per the agreed-upon timeline and quality. If you have any questions about my services or professional background please feel free to contact me. Despite all these, I’d love to hear from you about your project needs, and hope to work with you soon! menos
Contratar mohammadwais007