Main Page: Difference between revisions
m (Qualifications section updated) |
|||
(One intermediate revision by the same user not shown) | |||
Line 18: | Line 18: | ||
== Passed exams, qualification, and certifications - at least intermediate/advanced/expert level == | == Passed exams, qualification, and certifications - at least intermediate/advanced/expert level == | ||
[https://ics-training.inl.gov/learn/course/50/210w-06-ics-cybersecurity-threats 210W-06 ICS Cybersecurity Threats] - U.S. Department of Homeland Security | === '''''Listed by degree earned''''' === | ||
[[File:Cybersecurity and infrasctructure security agency202412.jpg|thumb]] | |||
[[File:Basel institue on governance202412.jpg|thumb]] | |||
[https://ics-training.inl.gov/learn/course/50/210w-06-ics-cybersecurity-threats '''210W-06 ICS Cybersecurity Threats'''] - U.S. Department of Homeland Security | |||
Issued Dec 2024 | Issued Dec 2024 | ||
[https://learn.opswatacademy.com/certificate/jzCeu9IHcw OPSWAT Comprehensive OSINT Expert] - OPSWAT Academy | [https://learn.opswatacademy.com/certificate/jzCeu9IHcw '''OPSWAT Comprehensive OSINT Expert'''] - OPSWAT Academy | ||
[[File:Ec-council202412.jpg|thumb]] | |||
Issued Dec 2024 - Expires Nov 2025 | Issued Dec 2024 - Expires Nov 2025 | ||
[https://learn.baselgovernance.org/mod/customcert/view.php?id=546&downloadown=1 Visualise Cases and Flows of Money] - Basel Institute on Governance | [https://learn.baselgovernance.org/mod/customcert/view.php?id=546&downloadown=1 '''Visualise Cases and Flows of Money'''] - Basel Institute on Governance | ||
Issued Dec 2024 | Issued Dec 2024 | ||
[https://elearningunodc.org/admin/tool/certificate/index.php?code=9590978542AB Advanced Anti-Corruption - Prevention of Corruption] - United Nations Office on Drugs and Crime | [https://elearningunodc.org/admin/tool/certificate/index.php?code=9590978542AB '''Advanced Anti-Corruption - Prevention of Corruption'''] - United Nations Office on Drugs and Crime | ||
Issued Aug 2024 | Issued Aug 2024 | ||
[https://openwho.org/verify/xizav-nypuc-puhos-duleh-kyzob Epidemic Intelligence systems with a particular focus on event-based surveillance for pandemic preparedness] - World Health Organization | [https://openwho.org/verify/xizav-nypuc-puhos-duleh-kyzob '''Epidemic Intelligence systems with a particular focus on event-based surveillance for pandemic preparedness'''] - World Health Organization | ||
Issued Aug 2024 | Issued Aug 2024 | ||
[https://openwho.org/verify/xidet-mosyz-tucal-mihal-meput Ethics and Governance of Artificial Intelligence for Health] - World Health Organization | [https://openwho.org/verify/xidet-mosyz-tucal-mihal-meput '''Ethics and Governance of Artificial Intelligence for Health'''] - World Health Organization | ||
Issued Aug 2024 | Issued Aug 2024 | ||
[https://www.coursera.org/account/accomplishments/verify/JBSEF8P57XMS Forensic Accounting and Fraud Examination] - West Virginia University | [https://www.coursera.org/account/accomplishments/verify/JBSEF8P57XMS '''Forensic Accounting and Fraud Examination'''] - West Virginia University | ||
Issued Aug 2024 | Issued Aug 2024 | ||
[https://www.cloudskillsboost.google/public_profiles/b5a0844f-fb3b-4dc2-b817-61510821d2d7/badges/10446524?utm_medium=social&utm_source=linkedin&utm_campaign=ql-social-share Managing Security in Google Cloud] - Google | [https://www.cloudskillsboost.google/public_profiles/b5a0844f-fb3b-4dc2-b817-61510821d2d7/badges/10446524?utm_medium=social&utm_source=linkedin&utm_campaign=ql-social-share '''Managing Security in Google Cloud'''] - Google | ||
Issued Aug 2024 | Issued Aug 2024 | ||
[https://elearningunodc.org/admin/tool/certificate/index.php?code=2713184935AB Unted Nations Office on Drugs and Crime - Cybercrime (Advanced)] - United Nations Office on Drugs and Crime | [https://elearningunodc.org/admin/tool/certificate/index.php?code=2713184935AB '''Unted Nations Office on Drugs and Crime - Cybercrime (Advanced)'''] - United Nations Office on Drugs and Crime | ||
Issued Aug 2024 | Issued Aug 2024 | ||
[https://codered.eccouncil.org/certificate/a9da00ee-cb2e-46fc-84c7-8a970dcde623 Advanced OT Cyber Security (ICS-DCS-SCADA)] - EC-Council | [https://codered.eccouncil.org/certificate/a9da00ee-cb2e-46fc-84c7-8a970dcde623 '''Advanced OT Cyber Security (ICS-DCS-SCADA)'''] - EC-Council | ||
Issued Jul 2024 | Issued Jul 2024 | ||
[https://elearningunodc.org/admin/tool/certificate/index.php?code=5643194263AB Countering the Financing of Terrorism and Proliferation of Weapons of Mass Destruction (WMDs) by non-State Actors] - United Nations Office on Drugs and Crime | [https://elearningunodc.org/admin/tool/certificate/index.php?code=5643194263AB '''Countering the Financing of Terrorism and Proliferation of Weapons of Mass Destruction (WMDs) by non-State Actors'''] - United Nations Office on Drugs and Crime | ||
[[File:Google202412.jpg|thumb]] | |||
Issued Jul 2024 | Issued Jul 2024 | ||
[https://academycourses.itu.int/badges/badge.php?hash=a1f230949c5f89c5f72405666765073c7df35871 Lifecycle, principles and good-practices on national cybersecurity strategy development and implementation (2024)] - International Telecommunication UnionInternational Telecommunication Union | [https://academycourses.itu.int/badges/badge.php?hash=a1f230949c5f89c5f72405666765073c7df35871 '''Lifecycle, principles and good-practices on national cybersecurity strategy development and implementation (2024)'''] - International Telecommunication UnionInternational Telecommunication Union | ||
Issued Jul 2024 | Issued Jul 2024 | ||
[https://learn.baselgovernance.org/mod/customcert/view.php?id=561&downloadown=1 Source and Application of Funds Analysis] - Basel Institute on Governance | [https://learn.baselgovernance.org/mod/customcert/view.php?id=561&downloadown=1 '''Source and Application of Funds Analysis'''] - Basel Institute on Governance | ||
[[File:Ibm202412.jpg|thumb]] | |||
Issued Jun 2024 | Issued Jun 2024 | ||
[https://codered.eccouncil.org/certificate/c99baddc-fc29-4a65-877a-d9c2117ea017 Advanced Persistent Threat Course] - EC-Council Learning | [https://codered.eccouncil.org/certificate/c99baddc-fc29-4a65-877a-d9c2117ea017 '''Advanced Persistent Threat Course'''] - EC-Council Learning | ||
Issued May 2024 | Issued May 2024 | ||
[https://www.linkedin.com/learning/certificates/c6192a9bed17194e3f9ebc8d7fd8f6589b28efc67fd456db7acb42b08cb57112?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D Build Your Generative AI Productivity Skills with Microsoft and LinkedIn] - Microsoft | [https://www.linkedin.com/learning/certificates/c6192a9bed17194e3f9ebc8d7fd8f6589b28efc67fd456db7acb42b08cb57112?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D '''Build Your Generative AI Productivity Skills with Microsoft and LinkedIn'''] - Microsoft | ||
Issued Apr 2024 | Issued Apr 2024 | ||
[[File:Infosec202412.jpg|thumb]] | |||
[https://www.linkedin.com/learning/certificates/c2f090415901a3ea0597c37910465fce92a99a782f4724e381b7668331c4a0ff?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D How to Support Colleagues from Underrepresented Groups] - Project Management Institute | [https://www.linkedin.com/learning/certificates/c2f090415901a3ea0597c37910465fce92a99a782f4724e381b7668331c4a0ff?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D '''How to Support Colleagues from Underrepresented Groups'''] - Project Management Institute | ||
Issued Apr 2024 | Issued Apr 2024 | ||
[https://codered.eccouncil.org/certificate/87977c99-5b3b-4778-bc1f-8fe3b0dbb696 Mastering Mobile Hacking LP] - EC-Council Learning | [https://codered.eccouncil.org/certificate/87977c99-5b3b-4778-bc1f-8fe3b0dbb696 '''Mastering Mobile Hacking LP'''] - EC-Council Learning | ||
Issued Feb 2024 | Issued Feb 2024 | ||
[[File:Internation-telecommunication-union202412.jpg|thumb]] | |||
[[File:Isc2202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/0c0b80de-097f-499c-96c1-630d322cbb73?logged=true Practical Artificial Intelligence for Professionals - Advanced LP] - EC-Council | [https://codered.eccouncil.org/certificate/0c0b80de-097f-499c-96c1-630d322cbb73?logged=true '''Practical Artificial Intelligence for Professionals - Advanced LP'''] - EC-Council | ||
Issued Jan 2024 | Issued Jan 2024 | ||
[https://codered.eccouncil.org/certificate/08011e1c-1bfc-4861-ae25-16e30ee55242 Applied Threat Hunting] - EC-Council | [https://codered.eccouncil.org/certificate/08011e1c-1bfc-4861-ae25-16e30ee55242 '''Applied Threat Hunting'''] - EC-Council | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://courses.cognitiveclass.ai/certificates/dfbb8945fd0f43dd8489a27d8f2af423 Fundamentals of Encryption & Quantum-Safe Techniques] - IBM | [https://courses.cognitiveclass.ai/certificates/dfbb8945fd0f43dd8489a27d8f2af423 '''Fundamentals of Encryption & Quantum-Safe Techniques'''] - IBM | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://codered.eccouncil.org/certificate/e9ad5466-dd8a-4069-9623-d8b644bb0cea Hands-on Network Security] - EC-Council | [https://codered.eccouncil.org/certificate/e9ad5466-dd8a-4069-9623-d8b644bb0cea '''Hands-on Network Security'''] - EC-Council | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://codered.eccouncil.org/certificate/dad138d7-8086-423c-afce-56d5471e4e5b Implementing and Administering Cisco Solutions: CCNA 200-301] - EC-Council | [https://codered.eccouncil.org/certificate/dad138d7-8086-423c-afce-56d5471e4e5b '''Implementing and Administering Cisco Solutions: CCNA 200-301'''] - EC-Council | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://codered.eccouncil.org/certificate/9c6186f2-eda1-4ccf-a6f2-6eeff5250529 Planning and Implementing a Security Incident Response] - EC-Council | [https://codered.eccouncil.org/certificate/9c6186f2-eda1-4ccf-a6f2-6eeff5250529 '''Planning and Implementing a Security Incident Response'''] - EC-Council | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://codered.eccouncil.org/certificate/fe16ac01-1bf8-4bba-8bd1-02d4fbadc1e0 Practical Industrial Control System Penetration Testing] - EC-Council Learning | [https://codered.eccouncil.org/certificate/fe16ac01-1bf8-4bba-8bd1-02d4fbadc1e0 '''Practical Industrial Control System Penetration Testing'''] - EC-Council Learning | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[[File:Lund university202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/4f3fcd81-051c-4621-9fee-2a2712599a69 Securing Endpoints with Microsoft Defender] - EC-Council | |||
'''[https://codered.eccouncil.org/certificate/4f3fcd81-051c-4621-9fee-2a2712599a69 Securing Endpoints with Microsoft Defender] -''' EC-Council | |||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://codered.eccouncil.org/certificate/d59d2df9-e956-4cfe-b71c-97105e2d4be8 Transforming Business Decisions with Data Analytics - Advanced] - EC-Council Learning | [https://codered.eccouncil.org/certificate/d59d2df9-e956-4cfe-b71c-97105e2d4be8 '''Transforming Business Decisions with Data Analytics - Advanced'''] - EC-Council Learning | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://codered.eccouncil.org/certificate/d59d2df9-e956-4cfe-b71c-97105e2d4be8 Transforming Business Decisions with Data Analytics - Advanced] - EC-Council Learning | [https://codered.eccouncil.org/certificate/d59d2df9-e956-4cfe-b71c-97105e2d4be8 '''Transforming Business Decisions with Data Analytics - Advanced'''] - EC-Council Learning | ||
Issued Dec 2023 | Issued Dec 2023 | ||
[https://coursera.org/verify/K5V739XDEDC9 <nowiki>Oracle Cloud Infrastructure Architect Professional [Coursera]</nowiki>] - Oracle | [https://coursera.org/verify/K5V739XDEDC9 '''<nowiki>Oracle Cloud Infrastructure Architect Professional [Coursera]</nowiki>'''] - Oracle | ||
Issued Nov 2023 | Issued Nov 2023 | ||
[https://www.coursera.org/verify/TGME8ZPDFATJ Infrastructure and Application Modernization with Google Cloud] - Google Career Certificates | [https://www.coursera.org/verify/TGME8ZPDFATJ '''Infrastructure and Application Modernization with Google Cloud'''] - Google Career Certificates | ||
[[File:Oracle202412.jpg|thumb]] | |||
Issued Oct 2023 | Issued Oct 2023 | ||
[[File:Opswat202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/5cae77bf-8973-4cb2-b52b-56b08a6425d4 Pentesting Agent - Advanced] - EC-Council Learning | [https://codered.eccouncil.org/certificate/5cae77bf-8973-4cb2-b52b-56b08a6425d4 '''Pentesting Agent - Advanced'''] - EC-Council Learning | ||
Issued Oct 2023 | Issued Oct 2023 | ||
[[File:Microsoft202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/746389ea-cb09-4b22-a5f6-ecddac5b1ea6 Protecting Data in Microsoft Azure] - EC-Council Learning | [https://codered.eccouncil.org/certificate/746389ea-cb09-4b22-a5f6-ecddac5b1ea6 '''Protecting Data in Microsoft Azure'''] - EC-Council Learning | ||
Issued Oct 2023 | Issued Oct 2023 | ||
[https://codered.eccouncil.org/certificate/14ca480b-5c2a-4811-91c9-41c884b1df3d Cybersecurity for FinTech] - EC-Council Learning | [https://codered.eccouncil.org/certificate/14ca480b-5c2a-4811-91c9-41c884b1df3d '''Cybersecurity for FinTech'''] - EC-Council Learning | ||
Issued Aug 2023 | Issued Aug 2023 | ||
[https://codered.eccouncil.org/certificate/94051de2-4741-41c9-a274-a1f1f01f8bee Data Mining for Fraud Detection] - EC-Council Learning | [https://codered.eccouncil.org/certificate/94051de2-4741-41c9-a274-a1f1f01f8bee '''Data Mining for Fraud Detection'''] - EC-Council Learning | ||
Issued Aug 2023 | Issued Aug 2023 | ||
'''<br /> | |||
[https://codered.eccouncil.org/certificate/840a580d-b872-41a1-b201-ec93dac5073b Malware Analysis Fundamentals] - EC-Council Learning | [https://codered.eccouncil.org/certificate/840a580d-b872-41a1-b201-ec93dac5073b Malware Analysis Fundamentals] -''' EC-Council Learning | ||
Issued Aug 2023 | Issued Aug 2023 | ||
[[File:Palo-alto-networks202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/f1c74da8-c8f1-40e8-90e8-37ada700617d Mastering Digital Forensics - LP] - EC-Council Learning | [https://codered.eccouncil.org/certificate/f1c74da8-c8f1-40e8-90e8-37ada700617d '''Mastering Digital Forensics - LP'''] - EC-Council Learning | ||
Issued Aug 2023 | Issued Aug 2023 | ||
[https://www.cloudskillsboost.google/public_profiles/b5a0844f-fb3b-4dc2-b817-61510821d2d7/badges/4950333 Responsible AI: Applying AI Principles with Google Cloud] - Google | [https://www.cloudskillsboost.google/public_profiles/b5a0844f-fb3b-4dc2-b817-61510821d2d7/badges/4950333 '''Responsible AI: Applying AI Principles with Google Cloud'''] - Google | ||
Issued Aug 2023 | Issued Aug 2023 | ||
[[File:Qualys202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/6b2601c2-ec1a-454b-b46e-b2513691aada Build Security Incident Response for GDPR Data Protection] - EC-Council Learning | [https://codered.eccouncil.org/certificate/6b2601c2-ec1a-454b-b46e-b2513691aada '''Build Security Incident Response for GDPR Data Protection'''] - EC-Council Learning | ||
Issued Jul 2023 | Issued Jul 2023 | ||
[https://codered.eccouncil.org/certificate/ec19430d-6246-4191-beae-1a96268a0e70 Conducting Reconnaissance for Cybersecurity] - EC-Council Learning | [https://codered.eccouncil.org/certificate/ec19430d-6246-4191-beae-1a96268a0e70 '''Conducting Reconnaissance for Cybersecurity'''] - EC-Council Learning | ||
Issued Jul 2023 | Issued Jul 2023 | ||
[https://codered.eccouncil.org/certificate/70e55e8d-b903-4a6f-8fb7-abdeae8c0dd6 Cyber Deception Demystified] - EC-Council Learning | [https://codered.eccouncil.org/certificate/70e55e8d-b903-4a6f-8fb7-abdeae8c0dd6 '''Cyber Deception Demystified'''] - EC-Council Learning | ||
Issued Jul 2023 | Issued Jul 2023 | ||
[https://www.coursera.org/account/accomplishments/verify/REUZ5WFNWLNQ Information Systems Auditing, Controls and Assurance] - Coursera | [https://www.coursera.org/account/accomplishments/verify/REUZ5WFNWLNQ '''Information Systems Auditing, Controls and Assurance'''] - Coursera | ||
Issued Jul 2023 | Issued Jul 2023 | ||
[https://codered.eccouncil.org/certificate/84080adc-afbb-4782-968c-4d4ef83ff325 Mastering Database Reconnaissance and Exploitation] - EC-Council Learning | [https://codered.eccouncil.org/certificate/84080adc-afbb-4782-968c-4d4ef83ff325 '''Mastering Database Reconnaissance and Exploitation'''] - EC-Council Learning | ||
Issued Jul 2023 | Issued Jul 2023 | ||
[[File:Splunk202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/71a1b3ad-791d-4cd7-ae02-85114d92c15 Mastering Web and Infrastructure Reconnaissance] - EC-Council Learning | [https://codered.eccouncil.org/certificate/71a1b3ad-791d-4cd7-ae02-85114d92c15 '''Mastering Web and Infrastructure Reconnaissance'''] - EC-Council Learning | ||
Issued Jul 2023 | Issued Jul 2023 | ||
[https://www.credly.com/earner/earned/badge/51a9f351-86c5-44ad-aa09-18788d6717cc Google Cybersecurity Professional] - Google | [https://www.credly.com/earner/earned/badge/51a9f351-86c5-44ad-aa09-18788d6717cc '''Google Cybersecurity Professional'''] - Google | ||
Issued Jun 2023 | Issued Jun 2023 | ||
[https://www.linkedin.com/feed/update/urn:li:activity:7079401484542484480?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D Operational Analysis of Suspicious Transaction Reports] - Basel Institute on Governance | [https://www.linkedin.com/feed/update/urn:li:activity:7079401484542484480?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D '''Operational Analysis of Suspicious Transaction Reports'''] - Basel Institute on Governance | ||
[[File:The state university of new york202412.jpg|thumb]] | |||
Issued Jun 2023 | Issued Jun 2023 | ||
[https://www.linkedin.com/posts/bardoczi_basel-institute-on-governance-terrorist-financing-activity-7079466892813287424-3YfF/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D Terrorist Financing] - Basel Institute on Governance | [https://www.linkedin.com/posts/bardoczi_basel-institute-on-governance-terrorist-financing-activity-7079466892813287424-3YfF/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D '''Terrorist Financing'''] - Basel Institute on Governance | ||
Issued Jun 2023 | Issued Jun 2023 | ||
[https://codered.eccouncil.org/certificate/bd3adc8e-9d02-43a4-a272-e097142f86aa Master Open Source Intelligence (Advanced, renewed)] - EC-Council | [https://codered.eccouncil.org/certificate/bd3adc8e-9d02-43a4-a272-e097142f86aa '''Master Open Source Intelligence (Advanced, renewed)'''] - EC-Council | ||
Issued Mar 2023 | Issued Mar 2023 | ||
[[File:Uc irvine202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/0ae1c00d-8393-41ca-90ac-4035f1bb4436 Mastering Threat Intelligence] - EC-Council | [https://codered.eccouncil.org/certificate/0ae1c00d-8393-41ca-90ac-4035f1bb4436 '''Mastering Threat Intelligence'''] - EC-Council | ||
Issued Mar 2023 | Issued Mar 2023 | ||
[https://codered.eccouncil.org/certificate/d5b5b741-f33f-4f76-80dc-9ca45164036e Microsoft Cybersecurity Pro Track: Threat Detection] - EC-Council | [https://codered.eccouncil.org/certificate/d5b5b741-f33f-4f76-80dc-9ca45164036e '''Microsoft Cybersecurity Pro Track: Threat Detection'''] - EC-Council | ||
Issued Dec 2022 | Issued Dec 2022 | ||
[https://courses.thecyberinst.org/certificates/s9jfnzm7ul CaseFile (Maltego), CyberInst.]- Infosec | [https://courses.thecyberinst.org/certificates/s9jfnzm7ul '''CaseFile (Maltego), CyberInst.''']- Infosec | ||
[[File:United nations office-on drugs and crime202412.png|thumb]] | |||
Issued Nov 2022 | Issued Nov 2022 | ||
[https://www.credly.com/earner/earned/badge/8af51a25-7f8f-4f6c-829d-65296bf0bd45 Certified in Cybersecurity] - ISC2 | [https://www.credly.com/earner/earned/badge/8af51a25-7f8f-4f6c-829d-65296bf0bd45 '''Certified in Cybersecurity'''] - ISC2 | ||
Issued Nov 2022 | Issued Nov 2022 | ||
[https://www.linkedin.com/posts/bardoczi_basel-institute-of-governance-open-source-activity-6985739847789359104-8UmS?utm_source=share&utm_medium=member_desktop&lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D Open-source Intelligence] - Basel Institute on Governance | [https://www.linkedin.com/posts/bardoczi_basel-institute-of-governance-open-source-activity-6985739847789359104-8UmS?utm_source=share&utm_medium=member_desktop&lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D '''Open-source Intelligence'''] - Basel Institute on Governance | ||
Issued Oct 2022 | Issued Oct 2022 | ||
[[File:Universite de lausanne202412.png|thumb]] | |||
[https://www.coursera.org/account/accomplishments/specialization/YMZJ8HYJYVW8 Python for Cybersecurity Specialization] - Infosec | [https://www.coursera.org/account/accomplishments/specialization/YMZJ8HYJYVW8 '''Python for Cybersecurity Specialization'''] - Infosec | ||
[[File:Universite de geneve202412.jpg|thumb]] | |||
Issued Oct 2022 | Issued Oct 2022 | ||
[https://www.coursera.org/account/accomplishments/verify/2HVM3DD3G8PM Introduction to Python for Cybersecurity] - Infosec | [https://www.coursera.org/account/accomplishments/verify/2HVM3DD3G8PM '''Introduction to Python for Cybersecurity'''] - Infosec | ||
Issued Sep 2022 | Issued Sep 2022 | ||
[https://codered.eccouncil.org/certificate/49c5a00a-bedf-41bb-95ab-5338dd3a859a Network Automation with Python - Intermediate -] EC-Council Learning | [https://codered.eccouncil.org/certificate/49c5a00a-bedf-41bb-95ab-5338dd3a859a '''Network Automation with Python - Intermediate -'''] EC-Council Learning | ||
Issued Sep 2022 | Issued Sep 2022 | ||
[https://codered.eccouncil.org/certificate/e8e78853-b070-41a8-9b62-c574aa3ad650 Advanced Open Source Intelligence and Privacy] - EC-Council | [https://codered.eccouncil.org/certificate/e8e78853-b070-41a8-9b62-c574aa3ad650 '''Advanced Open Source Intelligence and Privacy'''] - EC-Council | ||
Issued Aug 2022 | Issued Aug 2022 | ||
[[File:University of illinois202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/8ddf310e-e60b-4681-90f7-29a5ae560435 Black Hat Python: Python For Pentesters] - EC-Council | [https://codered.eccouncil.org/certificate/8ddf310e-e60b-4681-90f7-29a5ae560435 '''Black Hat Python: Python For Pentesters'''] - EC-Council | ||
Issued Aug 2022 | Issued Aug 2022 | ||
[https://codered.eccouncil.org/certificate/8000a0ce-6c7b-466d-b5de-6cec854afcbc Blue Team Boot Camp: Defending Against Hackers] - EC-Council Learning | [https://codered.eccouncil.org/certificate/8000a0ce-6c7b-466d-b5de-6cec854afcbc '''Blue Team Boot Camp: Defending Against Hackers'''] - EC-Council Learning | ||
[[File:West virginia university202412.jpg|thumb]] | |||
Issued Aug 2022 | Issued Aug 2022 | ||
[https://codered.eccouncil.org/certificate/5cac0b85-c5d8-4b31-87a4-20f32480d427 Computer Forensics Best Practices - Intermediate] - EC-Council | [https://codered.eccouncil.org/certificate/5cac0b85-c5d8-4b31-87a4-20f32480d427 '''Computer Forensics Best Practices - Intermediate'''] - EC-Council | ||
Issued Aug 2022 | Issued Aug 2022 | ||
[https://codered.eccouncil.org/certificate/fa4dccc7-9c37-41cc-8403-678d0c074e64 IT Security with Red Hat Made Easy] - EC-Council Learning | [https://codered.eccouncil.org/certificate/fa4dccc7-9c37-41cc-8403-678d0c074e64 '''IT Security with Red Hat Made Easy'''] - EC-Council Learning | ||
Issued Aug 2022 | Issued Aug 2022 | ||
[[File:World health organization202412.jpg|thumb]] | |||
[https://codered.eccouncil.org/certificate/1f867daa-23ef-4af6-b4d3-a59bae7e2816 Power of Next Generation Firewalls - Advanced] - EC-Council Learning | [https://codered.eccouncil.org/certificate/1f867daa-23ef-4af6-b4d3-a59bae7e2816 '''Power of Next Generation Firewalls - Advanced'''] - EC-Council Learning | ||
Issued Aug 2022 | Issued Aug 2022 | ||
[https://codered.eccouncil.org/certificate/5d9c1c9b-0fa8-43d3-934a-496370a9d616 Practical Cyber Threat Intelligence Advanced] - EC-Council | [https://codered.eccouncil.org/certificate/5d9c1c9b-0fa8-43d3-934a-496370a9d616 '''Practical Cyber Threat Intelligence Advanced'''] - EC-Council | ||
Issued Aug 2022 | Issued Aug 2022 | ||
'''<br /> | |||
[https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d Real-time Threat Detection with Elastic Stack] - EC-Council | [https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d Real-time Threat Detection with Elastic Stack]''' - EC-Council | ||
Issued Aug 2022 | Issued Aug 2022 | ||
[https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ Reverse Engineering & Malware Analysis - Intermediate Level] - Udemy | [https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ '''Reverse Engineering & Malware Analysis - Intermediate Level'''] - Udemy | ||
Issued Aug 2022 | Issued Aug 2022 | ||
[https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 OSINT for Hackers and Penetration Testers] - EC-Council | [https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 '''OSINT for Hackers and Penetration Testers'''] - EC-Council | ||
Issued Jul 2022 | Issued Jul 2022 | ||
[https://www.coursera.org/account/accomplishments/verify/X4K3UYW5655K Palo Alto Networks Security Operations Fundamentals -] Palo Alto Networks Cybersecurity Academy | [https://www.coursera.org/account/accomplishments/verify/X4K3UYW5655K '''Palo Alto Networks Security Operations Fundamentals -'''] Palo Alto Networks Cybersecurity Academy | ||
Issued Jul 2022 | Issued Jul 2022 | ||
[https://www.credly.com/badges/9387a93d-59ca-4087-a7c9-1871a084520c IBM Agile Explorer] - IBM | [https://www.credly.com/badges/9387a93d-59ca-4087-a7c9-1871a084520c '''IBM Agile Explorer'''] - IBM | ||
Issued Mar 2022 | Issued Mar 2022 | ||
[https://www.credly.com/badges/6ace6a84-dabb-4a5b-9890-419b8f12e5f5 IBM Machine Learning Specialist - Associate] - IBM | [https://www.credly.com/badges/6ace6a84-dabb-4a5b-9890-419b8f12e5f5 '''IBM Machine Learning Specialist - Associate'''] - IBM | ||
Issued Mar 2022 | Issued Mar 2022 | ||
[https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 IBM Resilient SOAR] - IBM | |||
'''[https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 IBM Resilient SOAR] -''' IBM | |||
Issued Mar 2022 | Issued Mar 2022 | ||
[https://www.linkedin.com/posts/bardoczi_pci-compliance-qualys-activity-6912198075700682752-wcnH?utm_source=share&utm_medium=member_ios&lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D PCI Compliance] - Qualys | [https://www.linkedin.com/posts/bardoczi_pci-compliance-qualys-activity-6912198075700682752-wcnH?utm_source=share&utm_medium=member_ios&lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D '''PCI Compliance'''] - Qualys | ||
Issued Mar 2022 | Issued Mar 2022 | ||
[https://www.coursera.org/account/accomplishments/specialization/WZ72VP46UN8X Splunk Search Expert Specialization] - Splunk | [https://www.coursera.org/account/accomplishments/specialization/WZ72VP46UN8X '''Splunk Search Expert Specialization'''] - Splunk | ||
Issued Mar 2022 | Issued Mar 2022 | ||
Vulnerability Management Detection and Response - Qualys | |||
'''Vulnerability Management Detection and Response''' - Qualys | |||
Issued Mar 2022 | Issued Mar 2022 | ||
[https://www.coursera.org/account/accomplishments/verify/D23MJAPSC9EF AI & Law] - Lund University | |||
'''[https://www.coursera.org/account/accomplishments/verify/D23MJAPSC9EF AI & Law] -''' Lund University | |||
Issued Feb 2022 | Issued Feb 2022 | ||
[https://www.udemy.com/certificate/UC-e46ec0d1-14bf-4bba-b048-745e44ebde1a/ English for IT Professionals] - Udemy | [https://www.udemy.com/certificate/UC-e46ec0d1-14bf-4bba-b048-745e44ebde1a/ '''English for IT Professionals'''] - Udemy | ||
Issued Feb 2022 | Issued Feb 2022 | ||
Vulnerability Management - Qualys | |||
'''Vulnerability Management''' - Qualys | |||
Issued Feb 2022 | Issued Feb 2022 | ||
[https://www.credly.com/badges/d0e8bf79-65a2-45ba-a6c8-299482283065 IBM Growth Behaviors] - IBM | [https://www.credly.com/badges/d0e8bf79-65a2-45ba-a6c8-299482283065 '''IBM Growth Behaviors'''] - IBM | ||
Issued Jan 2022 | Issued Jan 2022 | ||
[https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed IBM Guardium Foundations Intermediate] - IBM | [https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed '''IBM Guardium Foundations Intermediate'''] - IBM | ||
Issued Nov 2021 | Issued Nov 2021 | ||
[https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 Cybersecurity Threat Intelligence - Intermediate] - IBM | [https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 '''Cybersecurity Threat Intelligence - Intermediate'''] - IBM | ||
Issued Sep 2021 | Issued Sep 2021 | ||
[https://www.linkedin.com/posts/bardoczi_activity-7098180475327803392-d9hR?utm_source=share&utm_medium=member_desktop&lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D Web Application Scanning] - Qualys | [https://www.linkedin.com/posts/bardoczi_activity-7098180475327803392-d9hR?utm_source=share&utm_medium=member_desktop&lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_certifications_details%3B9qYoxpJGR7OuN61SWnGkZA%3D%3D '''Web Application Scanning'''] - Qualys | ||
Issued Aug 2021 | Issued Aug 2021 | ||
'''<br /> | |||
[https://www.credly.com/badges/d6c62a22-4776-4d41-9454-e239f2b9a79b?source=linked_in_profile Big Data Foundations - Level 2] - IBM | [https://www.credly.com/badges/d6c62a22-4776-4d41-9454-e239f2b9a79b?source=linked_in_profile Big Data Foundations - Level 2]''' - IBM | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.coursera.org/verify/JU6KR6EPHYVN Challenging Forensic Science: How Science Should Speak to Court] - University of Lausanne - UNIL | [https://www.coursera.org/verify/JU6KR6EPHYVN '''Challenging Forensic Science: How Science Should Speak to Court'''] - University of Lausanne - UNIL | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.coursera.org/verify/8XK7SXGH87TP Cybersecurity Compliance Framework & System Administration (IBM)] - Coursera Course Certificates | [https://www.coursera.org/verify/8XK7SXGH87TP '''Cybersecurity Compliance Framework & System Administration (IBM)'''] - Coursera Course Certificates | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de Cybersecurity IT Fundamentals Specialization] - IBM | [https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de '''Cybersecurity IT Fundamentals Specialization'''] - IBM | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.credly.com/badges/e43f9b5c-bd2a-45f8-ba20-622ef14bab2c?source=linked_in_profile Data Science Foundations - Level 2 (V2)] - IBM | [https://www.credly.com/badges/e43f9b5c-bd2a-45f8-ba20-622ef14bab2c?source=linked_in_profile '''Data Science Foundations - Level 2 (V2)'''] - IBM | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.credly.com/badges/eb32a094-706d-45cf-9fd0-d77d6ca95f34/public_url Data Science Tools] - IBM | [https://www.credly.com/badges/eb32a094-706d-45cf-9fd0-d77d6ca95f34/public_url '''Data Science Tools'''] - IBM | ||
Issued May 2021 | Issued May 2021 | ||
[https://courses.cognitiveclass.ai/certificates/9c0f7240647044ae9363ba9bfb343b36 IBM Cloud Essentials - V3 -] IBM | [https://courses.cognitiveclass.ai/certificates/9c0f7240647044ae9363ba9bfb343b36 '''IBM Cloud Essentials - V3 -'''] IBM | ||
Issued May 2021 | Issued May 2021 | ||
'''<br /> | |||
[https://www.coursera.org/verify/4ANACY56R7UH IBM Cybersecurity Analyst Assessment] - Coursera Course Certificates | [https://www.coursera.org/verify/4ANACY56R7UH IBM Cybersecurity Analyst Assessment]''' - Coursera Course Certificates | ||
Issued May 2021 | Issued May 2021 | ||
'''<br /> | |||
[https://coursera.org/verify/T8C7RFKTFUC8 International Cyber Conflicts] - The State University of New York | [https://coursera.org/verify/T8C7RFKTFUC8 International Cyber Conflicts]''' - The State University of New York | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.coursera.org/verify/RPBRE5CZW5FT Introduction to Cybersecurity Tools & Cyber Attacks (IBM)] - Coursera Course Certificates | [https://www.coursera.org/verify/RPBRE5CZW5FT '''Introduction to Cybersecurity Tools & Cyber Attacks (IBM)'''] - Coursera Course Certificates | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.credly.com/badges/238184f2-52fd-416c-8c64-f1b16ea3d201 Introduction to Enterprise Resiliency] - IBM | [https://www.credly.com/badges/238184f2-52fd-416c-8c64-f1b16ea3d201 '''Introduction to Enterprise Resiliency'''] - IBM | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.coursera.org/verify/MFJGGKLKLF6Z Understanding Financial Markets] - University of Geneva | [https://www.coursera.org/verify/MFJGGKLKLF6Z '''Understanding Financial Markets'''] - University of Geneva | ||
Issued May 2021 | Issued May 2021 | ||
[https://www.coursera.org/verify/K6WKEDQPYD4E Effective Problem-Solving and Decision-Making] - UC Irvine | [https://www.coursera.org/verify/K6WKEDQPYD4E '''Effective Problem-Solving and Decision-Making'''] - UC Irvine | ||
Issued Apr 2021 | Issued Apr 2021 | ||
[https://www.coursera.org/verify/X7CG3NJQWF6Y Managing Project Risks and Changes] - UC Irvine | [https://www.coursera.org/verify/X7CG3NJQWF6Y '''Managing Project Risks and Changes'''] - UC Irvine | ||
Issued Apr 2021 | Issued Apr 2021 | ||
[https://www.coursera.org/verify/EW3FJT92T76B Genomics for Law] - University of Illinois at Urbana-Champaign - Coursera | [https://www.coursera.org/verify/EW3FJT92T76B '''Genomics for Law'''] - University of Illinois at Urbana-Champaign - Coursera | ||
Issued Mar 2021 | Issued Mar 2021 | ||
Line 548: | Line 571: | ||
* '''<big>[https://t.me/bardoczi Telegram] (preferred)</big>''' | * '''<big>[https://t.me/bardoczi Telegram] (preferred)</big>''' | ||
* '''<big> | * '''<big>[https://signal.me/bardoczi.11 Signal]</big>''' | ||
* '''<big>[https://account.wire.com/user-profile/?id=73eca856-a35b-43f5-9013-97ab629bd534 WIRE] @bardoczi</big>''' | * '''<big>[https://account.wire.com/user-profile/?id=73eca856-a35b-43f5-9013-97ab629bd534 WIRE] @bardoczi</big>''' | ||
* [https://meet313.webex.com/meet/pr27424904214 '''Webex Meet'''] | * [https://meet313.webex.com/meet/pr27424904214 '''Webex Meet'''] |
Latest revision as of 20:58, 23 December 2024
Ákos Bardóczi detailed resumé
How can I download the concise CV in PDF format?
My recommendation: click HERE to download the recent, digitally signed, timestamped version.
Public and notable professional experience
- 2021 May – 2022 Apr (full-time) – IBM DSS (Hungary) – Cyber Threat Defense Analyst – I worked as a SOC analyst , , and after working hours, I frequently used the most valuable elearning materials to learn more about IBM and non-IBM security fundamentals and solutions and how possible to link these with each other. 2022. May – I continued learning, deep dived into Cyber Threat Intelligence and Threat Hunting from the most valuable sources, online and print.
- 2018 May – 2019 Jan (contactor) – NetAcademia LLC (Hungary) – content creator, professional writer (Netacademia Elemzés) , senior lecturer (opensource intelligence, advanced search techniques, email services maintaining, IT security hardening fundamentals)
- 2016 May - 2018 Apr (contractor) – ISACA Budapest Chapter – professional writer (especially enterprise level IT governance practices), writing articles and summaries to Information Systems Audit and Control Association, these topics needed a deep understanding of privacy and cybersecurity standards, such as ISO27K, etc.
- 2008 Sep – 2013 May (part-time) University of Debrecen – Intranet and CMS developer (LAMP). Complete refactoring of the Department of Human Genetics intranet and site, migration from a former system without data loss. TYPO3 CMS hardening. (Debian, Apache, MySQL, PHP)
- 2010 Sep – 2011 Sep (two European financial institutions, remote) - CMS and solution integrator. My primary role was to connect/integrate the TYPO3 to legacy systems and administrative sub-projects.
Educational background
- 2005-(2010) – University of Debrecen, Faculty of Science and Technology, molecular biologist, summa sine diploma.
- 2021 - Eötvös Loránd University, Faculty of Law, Juris Doctor - I've customized learning schedule!
Passed exams, qualification, and certifications - at least intermediate/advanced/expert level
Listed by degree earned
210W-06 ICS Cybersecurity Threats - U.S. Department of Homeland Security
Issued Dec 2024
OPSWAT Comprehensive OSINT Expert - OPSWAT Academy
Issued Dec 2024 - Expires Nov 2025
Visualise Cases and Flows of Money - Basel Institute on Governance
Issued Dec 2024
Advanced Anti-Corruption - Prevention of Corruption - United Nations Office on Drugs and Crime
Issued Aug 2024
Epidemic Intelligence systems with a particular focus on event-based surveillance for pandemic preparedness - World Health Organization
Issued Aug 2024
Ethics and Governance of Artificial Intelligence for Health - World Health Organization
Issued Aug 2024
Forensic Accounting and Fraud Examination - West Virginia University
Issued Aug 2024
Managing Security in Google Cloud - Google
Issued Aug 2024
Unted Nations Office on Drugs and Crime - Cybercrime (Advanced) - United Nations Office on Drugs and Crime
Issued Aug 2024
Advanced OT Cyber Security (ICS-DCS-SCADA) - EC-Council
Issued Jul 2024
Countering the Financing of Terrorism and Proliferation of Weapons of Mass Destruction (WMDs) by non-State Actors - United Nations Office on Drugs and Crime
Issued Jul 2024
Lifecycle, principles and good-practices on national cybersecurity strategy development and implementation (2024) - International Telecommunication UnionInternational Telecommunication Union
Issued Jul 2024
Source and Application of Funds Analysis - Basel Institute on Governance
Issued Jun 2024
Advanced Persistent Threat Course - EC-Council Learning
Issued May 2024
Build Your Generative AI Productivity Skills with Microsoft and LinkedIn - Microsoft
Issued Apr 2024
How to Support Colleagues from Underrepresented Groups - Project Management Institute
Issued Apr 2024
Mastering Mobile Hacking LP - EC-Council Learning
Issued Feb 2024
Practical Artificial Intelligence for Professionals - Advanced LP - EC-Council
Issued Jan 2024
Applied Threat Hunting - EC-Council
Issued Dec 2023
Fundamentals of Encryption & Quantum-Safe Techniques - IBM
Issued Dec 2023
Hands-on Network Security - EC-Council
Issued Dec 2023
Implementing and Administering Cisco Solutions: CCNA 200-301 - EC-Council
Issued Dec 2023
Planning and Implementing a Security Incident Response - EC-Council
Issued Dec 2023
Practical Industrial Control System Penetration Testing - EC-Council Learning
Issued Dec 2023
Securing Endpoints with Microsoft Defender - EC-Council
Issued Dec 2023
Transforming Business Decisions with Data Analytics - Advanced - EC-Council Learning
Issued Dec 2023
Transforming Business Decisions with Data Analytics - Advanced - EC-Council Learning
Issued Dec 2023
Oracle Cloud Infrastructure Architect Professional [Coursera] - Oracle
Issued Nov 2023
Infrastructure and Application Modernization with Google Cloud - Google Career Certificates
Issued Oct 2023
Pentesting Agent - Advanced - EC-Council Learning
Issued Oct 2023
Protecting Data in Microsoft Azure - EC-Council Learning
Issued Oct 2023
Cybersecurity for FinTech - EC-Council Learning
Issued Aug 2023
Data Mining for Fraud Detection - EC-Council Learning
Issued Aug 2023
Malware Analysis Fundamentals - EC-Council Learning
Issued Aug 2023
Mastering Digital Forensics - LP - EC-Council Learning
Issued Aug 2023
Responsible AI: Applying AI Principles with Google Cloud - Google
Issued Aug 2023
Build Security Incident Response for GDPR Data Protection - EC-Council Learning
Issued Jul 2023
Conducting Reconnaissance for Cybersecurity - EC-Council Learning
Issued Jul 2023
Cyber Deception Demystified - EC-Council Learning
Issued Jul 2023
Information Systems Auditing, Controls and Assurance - Coursera
Issued Jul 2023
Mastering Database Reconnaissance and Exploitation - EC-Council Learning
Issued Jul 2023
Mastering Web and Infrastructure Reconnaissance - EC-Council Learning
Issued Jul 2023
Google Cybersecurity Professional - Google
Issued Jun 2023
Operational Analysis of Suspicious Transaction Reports - Basel Institute on Governance
Issued Jun 2023
Terrorist Financing - Basel Institute on Governance
Issued Jun 2023
Master Open Source Intelligence (Advanced, renewed) - EC-Council
Issued Mar 2023
Mastering Threat Intelligence - EC-Council
Issued Mar 2023
Microsoft Cybersecurity Pro Track: Threat Detection - EC-Council
Issued Dec 2022
CaseFile (Maltego), CyberInst.- Infosec
Issued Nov 2022
Certified in Cybersecurity - ISC2
Issued Nov 2022
Open-source Intelligence - Basel Institute on Governance
Issued Oct 2022
Python for Cybersecurity Specialization - Infosec
Issued Oct 2022
Introduction to Python for Cybersecurity - Infosec
Issued Sep 2022
Network Automation with Python - Intermediate - EC-Council Learning
Issued Sep 2022
Advanced Open Source Intelligence and Privacy - EC-Council
Issued Aug 2022
Black Hat Python: Python For Pentesters - EC-Council
Issued Aug 2022
Blue Team Boot Camp: Defending Against Hackers - EC-Council Learning
Issued Aug 2022
Computer Forensics Best Practices - Intermediate - EC-Council
Issued Aug 2022
IT Security with Red Hat Made Easy - EC-Council Learning
Issued Aug 2022
Power of Next Generation Firewalls - Advanced - EC-Council Learning
Issued Aug 2022
Practical Cyber Threat Intelligence Advanced - EC-Council
Issued Aug 2022
Real-time Threat Detection with Elastic Stack - EC-Council
Issued Aug 2022
Reverse Engineering & Malware Analysis - Intermediate Level - Udemy
Issued Aug 2022
OSINT for Hackers and Penetration Testers - EC-Council
Issued Jul 2022
Palo Alto Networks Security Operations Fundamentals - Palo Alto Networks Cybersecurity Academy
Issued Jul 2022
IBM Agile Explorer - IBM
Issued Mar 2022
IBM Machine Learning Specialist - Associate - IBM
Issued Mar 2022
IBM Resilient SOAR - IBM
Issued Mar 2022
PCI Compliance - Qualys
Issued Mar 2022
Splunk Search Expert Specialization - Splunk
Issued Mar 2022
Vulnerability Management Detection and Response - Qualys
Issued Mar 2022
AI & Law - Lund University
Issued Feb 2022
English for IT Professionals - Udemy
Issued Feb 2022
Vulnerability Management - Qualys
Issued Feb 2022
IBM Growth Behaviors - IBM
Issued Jan 2022
IBM Guardium Foundations Intermediate - IBM
Issued Nov 2021
Cybersecurity Threat Intelligence - Intermediate - IBM
Issued Sep 2021
Web Application Scanning - Qualys
Issued Aug 2021
Big Data Foundations - Level 2 - IBM
Issued May 2021
Challenging Forensic Science: How Science Should Speak to Court - University of Lausanne - UNIL
Issued May 2021
Cybersecurity Compliance Framework & System Administration (IBM) - Coursera Course Certificates
Issued May 2021
Cybersecurity IT Fundamentals Specialization - IBM
Issued May 2021
Data Science Foundations - Level 2 (V2) - IBM
Issued May 2021
Data Science Tools - IBM
Issued May 2021
IBM Cloud Essentials - V3 - IBM
Issued May 2021
IBM Cybersecurity Analyst Assessment - Coursera Course Certificates
Issued May 2021
International Cyber Conflicts - The State University of New York
Issued May 2021
Introduction to Cybersecurity Tools & Cyber Attacks (IBM) - Coursera Course Certificates
Issued May 2021
Introduction to Enterprise Resiliency - IBM
Issued May 2021
Understanding Financial Markets - University of Geneva
Issued May 2021
Effective Problem-Solving and Decision-Making - UC Irvine
Issued Apr 2021
Managing Project Risks and Changes - UC Irvine
Issued Apr 2021
Genomics for Law - University of Illinois at Urbana-Champaign - Coursera
Issued Mar 2021
Python, bash shell programming, Word, PowerPoint, Access, Excel, Wordpress CMS, linux (in the top 5% based on LinkedIN skill assessments)
Credly profile here, Coursera profile here, notable exam certs. credentials with verifications links
Recommendations
- "Working with Ákos is one of the most enlightening and eye opening experience I have ever had. His broad spectrum of knowledge and work ethics is unique. I would recommend him as a colleague or a contractor to anyone working in IT Sec any day." (DevOps professional)
- "Ákos worked with my team as an external advisor for about a month and helped us to develop custom techniques suitable for our special needs. He is a highly skilled professional and a great advisor too who has a deep, practical knowledge in various fields of IT security and cybersecurity thanks to his enthusiasm for learning new things day-by-day. His approach to different kinds of problems is often unique compared to others so he can be a valuable member of any business community. He also has the ability to give down to earth advices while his ideas are still fit to the wider theoretical / conceptual framework of the project. I would definitely recommend him. " (PhD candidate)
- “As a new member of our security team YOU play an important role in the team’s life, you show dedication, growth, progress. Thank you for your efforts and excellent mentality in these fields. With you on board the Budapest Security Delivery Center are stronger and more successful.” (former IBM manager)
- "Bevallom, első körben nem könnyű felvenni Ákos gondolatmenetének ritmusát. A-ról beszél, de közben már D-n agyal, időbe telik, mire számomra is kikristályosodnak az ötletei, akkor viszont hatalmasat ütnek. Olyan aspektusokból képes vizsgálni sokszor triviálisnak tűnő dolgokat, melyre kevesen gondolnánk, ezáltal mindig tud valami újat, formabontót javasolni. Szívesen dolgoztam és fogok is vele dolgozni a jövőben, ha az OSINT nagymesterét keresed, ne habozz, ő a te embered!" (online marketing expert)
- "Gratula: a cikket value proposition szempontból egyedülállónak tartom a magyar piacon: egyrészt szépen kidolgozott alkotás, másrészt merész szakmaisággal támasztja alá a kijelentéseit. Ez multi környezetnen nem szokás, csak a frázisok mennek manapság. Jó volt végigolvasni. Ritkán olvasni ilyen érdekes és tartalmas szakmai írást magyarul. Gratula érte"" (reader, Business Developement Manager)
- "Ex rendőrként (10+ év nyomozói tapasztalattal) adnék dupla likeot erre" (reader, Six Sigma)
Language proficiency
- native Hungarian
- English (C1)
Concise publication list of references, citations
- Old Methods in The Cyberspace? (CYBER-HUMINT, OSINT, SOCMINT, Social Engineering), Dobák Imre, Tóth Tamás, University of Public Service, Department of Civil National Security, 2019, Belügyi Szemle, 2021/2. DOI: 10.38146/BSZ.2021.2.2
- Most cited publications in Hungarian
- minor citations - Mennyi? 62 ezer. Mi 62 ezer? (Bitport, 2016.04.06.); Egy gigantikus adatszivárgás tanulságai (Bitport, 2016.05.30.) [15]
- 2017 - Rediscover hidden facebook semantic search engine, reimagine open-source intelligence - (lightning talk @ Hacktivity 2017) Github: http://bit.ly/facebook_graph_search
- 2014 – univ. course „Internet, társadalom, digitális kultúra” (University of Debrecen)
- 2013 - Hacktivity 2013 - Data mining in the age of social web
- 2012 - Guberálnak [interview in Hungarian, HVG, 2012. September, (http://bit.ly/bardoczi_hvg) you can find the grabbed version here (http://bit.ly/bardoczi_hvg_interju) ]
- 2006 - Kavicsok [„Bolyai-books”], co-author, Gének, bitek, közgondolkodás [p. 157-190] (http://bit.ly/bolyai_tanulmanykotet )
Memberships, volunteering
- 2010 – ResearchGate Computer Security and IT Forensics workgroup, founder
- 2014 - IEEE (Institute of Electrical and Electronics Engineers) - associate member
- 2015 - ACM (Association for Computing Machinery) - professional member
- 2016 - IEEE Young Professionals - member
- 2017 - IEEE Consultants Network - member
- 2019 - PMI (Project Management Institute), PMI Hungarian Chapter
- 2019 - PMI (Project Management Institute), PMI Switzerland Chapter
Public educational and research activity (this section is under construction)
- OSINT training space for my trainees: http://osint.atlassian.net/
- ResearchGate - https://www.researchgate.net/profile/Bardoczi-Akos/research
- Harvard Dataverse - https://dataverse.harvard.edu/dataverse/bardoczi
- ResearcherID/ORCID: https://orcid.org/0000-0003-4239-2308
- Google Scholar - https://scholar.google.nl/citations?hl=en&pli=1&user=VMA6YtUAAAAJ
Remarks
During my university years and later I gained a higher level of knowledge and experience in the IT, CS, economic sciences, especially management. I would also like to mentor
newcomers and graduates from economics or IT fields. I can help experienced professionals as well in many cases.
§ All clients, contractors and companies must have integrity and follow the standard ethical rules. I take it very seriously!
Public contact details
- +36 70 505 5200 (HU) / +36 1 999 0444 (HU)
- +1 202 470-0790 (US)
- +41 76 701 5200 (CH)
- +49 151 6466 4588 (DE)
- +39 366 311-1200 (IT)
- +32 497 25-75-65 (BE)
- Fax: +36 1 9997-993
Note: I should previously save your ID to my contacts, some services may filter the messages from senders who have never contacted before, recommended to ping me before. You can send your name/nick and ID anytime with whis link.
- Telegram (preferred)
- Signal
- WIRE @bardoczi
- Webex Meet
- Element ID: @bardoczi:matrix.org
- Threema ID: WKNXT53F
- Email: akos@cerp.ch, akos.bardoczi.ch@ieee.org
- In addition - IM to Facebook page
Top 30 most cited Hungarian publications
- Uncovering bare metal servers hidden location behind the cloud? (2022. 09. 13)
- A zöldebb programozási nyelv (2022.08.29)
- Az OSINT, virtualizáció és a nálunk idővel okosabb helymeghatározás (2022. 08. 10)
- Tudásmenedzsment szoftveres támogatása 1x1 (2021. 03. 09)
- Mennyi idő megy kárba egy PhD elkészítésekor? (2020. 11. 28)
- A net szívcsakrája – a DNS (2018. 04. 30)
- Szemléletmódváltás vagy halál? (2018. 04. 30)
- A webfejlesztés művészete – egyedi vagy CMS? (2018. 05. 02)
- A Facebook alaposan atomizálta a társadalmat, mi jön most? (2018. 04. 30)
- Home office – elmélet, gyakorlat, másképp (2018. 05. 05)
- Nyílt-forrású információszerzés – kémek, kurvák, gengszterek, OSINT (2018. 05. 07)
- Így könnyítheti meg a támadó dolgát a többlépcsős hitelesítés (2017. 11. 02)
- Kimaxolt self-branding - minden idők legnagyobb álhekkere (2018. 03. 12)
- Magatartástudomány, social engineering és a HUMINT (2018. 04. 30)
- Mikor válik a kultúra részévé az online tanulás? (2018. 05. 13)
- Miért kerül nagyon sokba a világnak az olcsó router? (2018. 05. 24)
- Te is lehetsz igazságügyi informatikus? (2018. 05. 30)
- Android vagy Apple? Zsebekben és nagyvállalati környezetben, hitkérdéseket félretéve (2018. 06. 12)
- GDPR az információszabadság ellen: hogyan könnyíti a bűnözők dolgát és nehezíti a nyomozókét és kutatókét? (2018. 06. 12)
- Dizájnelem, amit a keresők is szeretni fognak: az email cím (2018. 07. 01)
- Céges bölcsészmérnökök a döntéselőkészítésben (2018. 07. 02)
- Nyelvek, keresők, mesterséges intelligencia vs egy-egy keresőkifejezés értékének mérése (2018. 07. 02)
- Kétlépcsős hitelesítés céges környezetben: elmélet és gyakorlat (2018. 07. 11)
- Buborékeffektus: hogyan írjuk és olvassuk a webet? És hogyan kellene? (2018. 08 23)
- Nyelv, mesterséges intelligencia, na meg felsőtest strandszezon utánra (2018. 09. 18)
- Bezár a Google Plus – miután alaposan lecsapolták (2018.10. 09)
- Mesterséges intelligenciáról – komolyan I. (2018. 10. 19)
- Üzenetküldők, amik felfedik az új mobilszámod (is) egy creepy fícsörön keresztül (2018. 10. 30)
- Az AI-ról, komolyan II: a lexikális tudás felértékelődése a jövő döntéseiben (2018. 11. 08)
- A DMARC, mint a hamisított levelek mérésének lehetséges eszköze (2018.11.18)
- AI: rosszul elsülő tudománykommunikáció, mint lehetséges globális fenyegetés (2018. 11. 19)
- Az adatszivárgások anatómiája (2019. 01. 20)
- Bűvös userID, ami a fél életed megmutatja bárkinek több szolgáltatásban (2019. 04. 08)