Main Page: Difference between revisions

From Ákos Bardóczi
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
 
(6 intermediate revisions by the same user not shown)
Line 19: Line 19:
== Passed exams, qualification, and certifications - at least intermediate/advanced/expert level ==
== Passed exams, qualification, and certifications - at least intermediate/advanced/expert level ==


===== Partially categorized by skills, and knowledge areas, mostly by chronological order  =====
===== Partially categorized by skills, and knowledge areas =====


===== ''#Python programming'' =====
===== ''#Python programming'' ''#Management, and #Economics'' ''#Audit'' ''#Law'' =====


===== ''#Management, and #Economics'' =====
[https://codered.eccouncil.org/certificate/f1c74da8-c8f1-40e8-90e8-37ada700617d '''Mastering Digital Forensics (LPATH)''']  - [https://codered.eccouncil.org/ EC-Council CODERED]


===== ''#Audit'' =====
[https://codered.eccouncil.org/certificate/ec19430d-6246-4191-beae-1a96268a0e70 '''Conducting Reconnaissance for Cybersecurity (LPATH)'''] - [https://codered.eccouncil.org/ EC-Council CODERED]


===== ''#Law'' =====
'''[https://codered.eccouncil.org/certificate/70e55e8d-b903-4a6f-8fb7-abdeae8c0dd6 Dark Web Cyber Deception Demystified]''' - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/84080adc-afbb-4782-968c-4d4ef83ff325 '''Mastering Database Reconnaissance and Exploitation'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/bd3adc8e-9d02-43a4-a272-e097142f86aa '''Master Open Source Intelligence (LPATH)'''] (l () -[https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/0ae1c00d-8393-41ca-90ac-4035f1bb4436 '''Mastering Threat Intelligence (LPATH)'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/d5b5b741-f33f-4f76-80dc-9ca45164036e '''Microsoft Cybersecurity Pro Track: Threat Detection'''] - [https://codered.eccouncil.org/ EC-Council CODERED] 


[https://www.linkedin.com/posts/bardoczi_basel-institute-of-governance-open-source-activity-6985739847789359104-8UmS?utm_source=share&utm_medium=member_desktop '''Open-source Intelligence (forensic approach)'''] - [https://baselgovernance.org/ Basel Institute on Governance]


[https://codered.eccouncil.org/certificate/14ca480b-5c2a-4811-91c9-41c884b1df3d '''Cybersecurity for FinTech'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 '''OSINT for Hackers and Penetration Testers'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/94051de2-4741-41c9-a274-a1f1f01f8bee '''Data Mining for Fraud Detection'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://courses.thecyberinst.org/certificates/s9jfnzm7ul '''Maltego CaseFile in Action''']  - [https://courses.thecyberinst.org/ CyberInst.]
 
[https://codered.eccouncil.org/certificate/5cac0b85-c5d8-4b31-87a4-20f32480d427 '''Computer Forensics Best Practices'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d '''Real-time Threat Detection with Elastic Stack'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://www.credly.com/badges/9387a93d-59ca-4087-a7c9-1871a084520c '''IBM Agile Explorer'''] - [https://yourlearning.ibm.com/activity/PLAN-77FDEB8BD679 IBM Internal]  


[https://codered.eccouncil.org/certificate/94051de2-4741-41c9-a274-a1f1f01f8bee '''Data Mining for Fraud Detection'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.credly.com/badges/6ace6a84-dabb-4a5b-9890-419b8f12e5f5 '''IBM Machine Learning Specialist - Associate'''] - [https://learn.ibm.com/ IBM Learn]


[https://codered.eccouncil.org/certificate/f1c74da8-c8f1-40e8-90e8-37ada700617d '''Mastering Digital Forensics''']  - [https://codered.eccouncil.org/ EC-Council CODERED]
[https://www.linkedin.com/posts/bardoczi_basel-institute-on-governance-terrorist-financing-activity-7079466892813287424-3YfF?utm_source=share&utm_medium=member_desktop '''Terrorist Financing (counter terrorism)''']   - [https://baselgovernance.org/ Basel Institute on Governance] ([https://baselgovernance.org/asset-recovery ICAR])


[https://codered.eccouncil.org/certificate/6b2601c2-ec1a-454b-b46e-b2513691aada '''Build Security Incident Response for GDPR Data Protection'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.linkedin.com/posts/bardoczi_operational-analysis-of-suspicious-transaction-activity-7079401484542484480-_GhP?utm_source=share&utm_medium=member_desktop '''Operational Analysis of Suspicious Transaction Reports (anti-fraud in financial institutions)'''] - [https://baselgovernance.org/ Basel Institute on Governance] (ICAR)


[https://codered.eccouncil.org/certificate/ec19430d-6246-4191-beae-1a96268a0e70 '''Conducting Reconnaissance for Cybersecurity'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.udemy.com/course/pci-payment-card-standards-for-corporate-professionals/ '''PCI (Payment Card) Standards for Corporate Professionals'''] - [https://www.udemy.com/user/illumeo/ Illumeo Learning]  


'''[https://codered.eccouncil.org/certificate/70e55e8d-b903-4a6f-8fb7-abdeae8c0dd6 Dark Web Cyber Deception Demystified]''' - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://codered.eccouncil.org/certificate/14ca480b-5c2a-4811-91c9-41c884b1df3d '''Cybersecurity for FinTech'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  


[https://www.coursera.org/account/accomplishments/verify/REUZ5WFNWLNQ '''Information Systems Auditing, Controls and Assurance'''] - [https://www.coursera.org/hkust The Hong Kong University of Science and Technology]
[https://codered.eccouncil.org/certificate/6b2601c2-ec1a-454b-b46e-b2513691aada '''Build Security Incident Response for GDPR Data Protection'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  


[https://codered.eccouncil.org/certificate/84080adc-afbb-4782-968c-4d4ef83ff325 '''Mastering Database Reconnaissance and Exploitation'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
[https://codered.eccouncil.org/certificate/e8e78853-b070-41a8-9b62-c574aa3ad650 '''Advanced Open Source Intelligence and Privacy'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  


'''Mastering Web and Infrastructure Reconnaissanc'''e - [https://codered.eccouncil.org/ EC-Council CODERED]
[https://www.coursera.org/account/accomplishments/verify/REUZ5WFNWLNQ '''Information Systems Auditing, Controls and Assurance (ISACA based material, Grade Achieved: 92.50%)'''] - [https://www.coursera.org/hkust The Hong Kong University of Science and Technology]


[https://www.credly.com/earner/earned/badge/51a9f351-86c5-44ad-aa09-18788d6717cc '''Google Cybersecurity Certificate'''] - [https://www.coursera.org/instructor/google-career-certificates Google Carreer Certificates]


[https://www.linkedin.com/posts/bardoczi_operational-analysis-of-suspicious-transaction-activity-7079401484542484480-_GhP?utm_source=share&utm_medium=member_desktop '''Operational Analysis of Suspicious Transaction Reports'''] - [https://baselgovernance.org/ Basel Institute on Governance] (ICAR)
[https://www.coursera.org/account/accomplishments/verify/JU6KR6EPHYVN '''Challenging Forensic Science: How Science Should Speak to Court'''] - [https://www.coursera.org/unil University of Lausanne] -


[https://www.linkedin.com/posts/bardoczi_basel-institute-on-governance-terrorist-financing-activity-7079466892813287424-3YfF?utm_source=share&utm_medium=member_desktop '''Terrorist Financing''']   - [https://baselgovernance.org/ Basel Institute on Governance] ([https://baselgovernance.org/asset-recovery ICAR])
[https://www.coursera.org/account/accomplishments/verify/T8C7RFKTFUC8 '''International Cyber Conflicts'''] - [https://www.coursera.org/suny The State University of New York]


[https://codered.eccouncil.org/certificate/bd3adc8e-9d02-43a4-a272-e097142f86aa '''Master Open Source Intelligence'''] -[https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.coursera.org/account/accomplishments/verify/RPBRE5CZW5FT '''Introduction to Cybersecurity Tools & Cyber Attacks'''] - [https://www.coursera.org/ibm-skills-network IBM]


[https://codered.eccouncil.org/certificate/0ae1c00d-8393-41ca-90ac-4035f1bb4436 '''Mastering Threat Intelligence'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.credly.com/badges/238184f2-52fd-416c-8c64-f1b16ea3d201 '''IBM Enterprise Resiliency'''] - [https://learn.ibm.com/ IBM Learn]


[https://codered.eccouncil.org/certificate/d5b5b741-f33f-4f76-80dc-9ca45164036e '''Microsoft Cybersecurity Pro Track: Threat Detection'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
'''[https://www.coursera.org/account/accomplishments/verify/MFJGGKLKLF6Z Understanding Financial Markets]''' - [https://www.coursera.org/unige University of Geneva]  


[https://www.credly.com/badges/8af51a25-7f8f-4f6c-829d-65296bf0bd45/ '''Certified Cybersecurity Candidate'''] - [https://www.isc2.org/ (ISC)2]  
[https://www.coursera.org/account/accomplishments/verify/X7CG3NJQWF6Y '''Managing Project Risks and Changes'''] - [https://www.coursera.org/uci University of California, Irvine]


[https://courses.thecyberinst.org/certificates/s9jfnzm7ul '''Maltego CaseFile in Action''']  - [https://courses.thecyberinst.org/ CyberInst.]  
[https://www.coursera.org/account/accomplishments/verify/EW3FJT92T76B '''Genomics for Law'''] - [https://www.coursera.org/illinois University of Illinois at Urbana-Champaign]


[https://www.linkedin.com/posts/bardoczi_basel-institute-of-governance-open-source-activity-6985739847789359104-8UmS?utm_source=share&utm_medium=member_desktop '''Open-source Intelligence'''] - [https://baselgovernance.org/ Basel Institute on Governance]
[https://www.coursera.org/account/accomplishments/verify/D23MJAPSC9EF '''AI & Law''']- [https://www.coursera.org/lunduniversity Lund University]  


[https://www.coursera.org/account/accomplishments/specialization/YMZJ8HYJYVW8 '''Python for Cybersecurity Speciazation'''] - [https://www.coursera.org/infosecinstitute Infosec Institute]  
[https://codered.eccouncil.org/certificate/8ddf310e-e60b-4681-90f7-29a5ae560435 '''Black Hat Python: Python For Pentesters'''] - [https://codered.eccouncil.org/ EC-Council CODERED]


[https://codered.eccouncil.org/certificate/49c5a00a-bedf-41bb-95ab-5338dd3a859a '''Network Automation with Python'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://codered.eccouncil.org/certificate/49c5a00a-bedf-41bb-95ab-5338dd3a859a '''Network Automation with Python'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  


[https://codered.eccouncil.org/certificate/e8e78853-b070-41a8-9b62-c574aa3ad650 '''Advanced Open Source Intelligence and Privacy'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.credly.com/badges/e43f9b5c-bd2a-45f8-ba20-622ef14bab2c '''IBM Data Science Foundations - Level 2 (V2)'''] - [https://cognitiveclass.ai/ CognitiveClass.AI]


[https://codered.eccouncil.org/certificate/8ddf310e-e60b-4681-90f7-29a5ae560435 '''Black Hat Python: Python For Pentesters'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.credly.com/badges/eb32a094-706d-45cf-9fd0-d77d6ca95f34 '''IBM Data Science Tools'''] - [https://cognitiveclass.ai/ CognitiveClass.AI]


[https://codered.eccouncil.org/certificate/8000a0ce-6c7b-466d-b5de-6cec854afcbc '''Blue Team Boot Camp: Defending Against Hackers'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.coursera.org/account/accomplishments/specialization/YMZJ8HYJYVW8 '''Python for Cybersecurity Speciazation'''] - [https://www.coursera.org/infosecinstitute Infosec Institute]


[https://codered.eccouncil.org/certificate/5cac0b85-c5d8-4b31-87a4-20f32480d427 '''Computer Forensics Best Practices'''] - [https://codered.eccouncil.org/ EC-Council CODERED]


[https://www.udemy.com/course/pci-payment-card-standards-for-corporate-professionals/ '''PCI (Payment Card) Standards for Corporate Professionals'''] - [https://www.udemy.com/user/illumeo/ Illumeo Learning]


[https://codered.eccouncil.org/certificate/1f867daa-23ef-4af6-b4d3-a59bae7e2816 '''Power of Next Generation Firewalls'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
'''Mastering Web and Infrastructure Reconnaissanc'''e - [https://codered.eccouncil.org/ EC-Council CODERED]


[https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d '''Real-time Threat Detection with Elastic Stack'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
[https://www.credly.com/earner/earned/badge/51a9f351-86c5-44ad-aa09-18788d6717cc '''Google Cybersecurity Certificate'''] - [https://www.coursera.org/instructor/google-career-certificates Google Carreer Certificates]  


[https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ '''Reverse Engineering & Malware Analysis - Intermediate'''] - Udemy
[https://www.credly.com/badges/8af51a25-7f8f-4f6c-829d-65296bf0bd45/ '''Certified Cybersecurity Candidate'''] - [https://www.isc2.org/ (ISC)2]


[https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 '''OSINT for Hackers and Penetration Testers'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
[https://codered.eccouncil.org/certificate/8000a0ce-6c7b-466d-b5de-6cec854afcbc '''Blue Team Boot Camp: Defending Against Hackers'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  


[https://www.coursera.org/account/accomplishments/verify/X4K3UYW5655K '''Palo Alto Networks Security Operations Fundamentals'''] - [https://www.coursera.org/palo-alto-networks Palo Alto Netorks]
[https://codered.eccouncil.org/certificate/1f867daa-23ef-4af6-b4d3-a59bae7e2816 '''Power of Next Generation Firewalls'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  


[https://www.credly.com/badges/9387a93d-59ca-4087-a7c9-1871a084520c '''IBM Agile Explorer'''] - [https://yourlearning.ibm.com/activity/PLAN-77FDEB8BD679 IBM Internal]
[https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ '''Reverse Engineering & Malware Analysis - Intermediate'''] - Udemy


[https://www.credly.com/badges/6ace6a84-dabb-4a5b-9890-419b8f12e5f5 '''IBM Machine Learning Specialist - Associate'''] - [https://learn.ibm.com/ IBM Learn]
[https://www.coursera.org/account/accomplishments/verify/X4K3UYW5655K '''Palo Alto Networks Security Operations Fundamentals'''] - [https://www.coursera.org/palo-alto-networks Palo Alto Netorks]


[https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 '''IBM Resilient SOAR Foundations'''] - [https://www.securitylearningacademy.com/ IBM Security Learning Academy]
[https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 '''IBM Resilient SOAR Foundations'''] - [https://www.securitylearningacademy.com/ IBM Security Learning Academy]


[https://www.coursera.org/account/accomplishments/specialization/WZ72VP46UN8X '''Splunk Search Expert Specialization'''] - [https://www.coursera.org/splunk Splunk]
[https://www.coursera.org/account/accomplishments/specialization/WZ72VP46UN8X '''Splunk Search Expert Specialization'''] - [https://www.coursera.org/splunk Splunk]
[https://www.coursera.org/account/accomplishments/verify/D23MJAPSC9EF '''AI & Law''']- [https://www.coursera.org/lunduniversity Lund University] -


[https://www.udemy.com/certificate/UC-e46ec0d1-14bf-4bba-b048-745e44ebde1a/ '''English for IT Professionals'''] - Udemy  
[https://www.udemy.com/certificate/UC-e46ec0d1-14bf-4bba-b048-745e44ebde1a/ '''English for IT Professionals'''] - Udemy  
Line 109: Line 123:


[https://www.credly.com/badges/d6c62a22-4776-4d41-9454-e239f2b9a79b '''Big Data Foundations - Level 2'''] - [https://cognitiveclass.ai/ CognitiveClass.AI]
[https://www.credly.com/badges/d6c62a22-4776-4d41-9454-e239f2b9a79b '''Big Data Foundations - Level 2'''] - [https://cognitiveclass.ai/ CognitiveClass.AI]
[https://www.coursera.org/account/accomplishments/verify/JU6KR6EPHYVN '''Challenging Forensic Science: How Science Should Speak to Court'''] - [https://www.coursera.org/unil University of Lausanne] -


[https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de '''IBM Cybersecurity IT Fundamentals Specialization'''] - [https://www.coursera.org/instructor/skillsnetwork Skills Network (IBM)]  
[https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de '''IBM Cybersecurity IT Fundamentals Specialization'''] - [https://www.coursera.org/instructor/skillsnetwork Skills Network (IBM)]  


[https://www.credly.com/badges/e43f9b5c-bd2a-45f8-ba20-622ef14bab2c '''IBM Data Science Foundations - Level 2 (V2)'''] - [https://cognitiveclass.ai/ CognitiveClass.AI]
[https://www.coursera.org/account/accomplishments/verify/K89LM5SK95AV '''Google Workspace Security'''] - [https://www.coursera.org/googlecloud Google Cloud Training]
 
[https://www.credly.com/badges/eb32a094-706d-45cf-9fd0-d77d6ca95f34 '''IBM Data Science Tools'''] -  [https://cognitiveclass.ai/ CognitiveClass.AI]


[https://www.coursera.org/account/accomplishments/verify/K89LM5SK95AV '''Google Workspace Security'''] - [https://www.coursera.org/googlecloud Google Cloud Training]


[https://www.coursera.org/account/accomplishments/verify/4ANACY56R7UH '''IBM Cybersecurity Analyst Assessment'''] -  [https://www.coursera.org/ibm-skills-network IBM]
[https://www.coursera.org/account/accomplishments/verify/4ANACY56R7UH '''IBM Cybersecurity Analyst Assessment'''] -  [https://www.coursera.org/ibm-skills-network IBM]
[https://www.coursera.org/account/accomplishments/verify/T8C7RFKTFUC8 '''International Cyber Conflicts'''] - [https://www.coursera.org/suny The State University of New York] 
[https://www.coursera.org/account/accomplishments/verify/RPBRE5CZW5FT '''Introduction to Cybersecurity Tools & Cyber Attacks'''] - [https://www.coursera.org/ibm-skills-network IBM] 
[https://www.credly.com/badges/238184f2-52fd-416c-8c64-f1b16ea3d201 '''IBM Enterprise Resiliency'''] - [https://learn.ibm.com/ IBM Learn]
'''[https://www.coursera.org/account/accomplishments/verify/MFJGGKLKLF6Z Understanding Financial Markets]''' - [https://www.coursera.org/unige University of Geneva]
[https://www.coursera.org/account/accomplishments/verify/X7CG3NJQWF6Y '''Managing Project Risks and Changes'''] - [https://www.coursera.org/uci University of California, Irvine] - 
[https://www.coursera.org/account/accomplishments/verify/EW3FJT92T76B '''Genomics for Law'''] - [https://www.coursera.org/illinois University of Illinois at Urbana-Champaign] - 




Line 157: Line 154:


== Concise publication list of references, citations ==
== Concise publication list of references, citations ==
*[http://real.mtak.hu/121325/1/Dobak-TothBelugyiSzemle2021.evi2.szam195-212.pdf Old Methods in The Cyberspace? (CYBER-HUMINT, OSINT, SOCMINT, Social Engineering)], Dobák Imre, Tóth Tamás, '''University of Public Service, Department of Civil National Security''', 2019, Belügyi Szemle, 2021/2. DOI: [https://10.0.149.2/BSZ.2021.2.2 10.38146/BSZ.2021.2.2]
*[http://real.mtak.hu/121325/1/Dobak-TothBelugyiSzemle2021.evi2.szam195-212.pdf Old Methods in The Cyberspace? (CYBER-HUMINT, OSINT, SOCMINT, Social Engineering)], Dobák Imre, Tóth Tamás, '''University of Public Service, Department of Civil National Security''', 2019, Belügyi Szemle, 2021/2. DOI: [https://doi.org/10.38146/BSZ.2021.2.2 10.38146/BSZ.2021.2.2]
*Most cited publications in Hungarian  
*Most cited publications in Hungarian  
*minor citations - [https://bitport.hu/mennyi-62-ezer-mi-62-ezer Mennyi? 62 ezer. Mi 62 ezer?] (Bitport, 2016.04.06.);  [https://bitport.hu/trendek/egy-gigantikus-adatszivargas-tanulsagai-google-apps-drive-slack Egy gigantikus adatszivárgás tanulságai] (Bitport, 2016.05.30.) [15]
*minor citations - [https://bitport.hu/mennyi-62-ezer-mi-62-ezer Mennyi? 62 ezer. Mi 62 ezer?] (Bitport, 2016.04.06.);  [https://bitport.hu/trendek/egy-gigantikus-adatszivargas-tanulsagai-google-apps-drive-slack Egy gigantikus adatszivárgás tanulságai] (Bitport, 2016.05.30.) [15]
Line 176: Line 173:
==Public educational and research activity (this section is under construction)==
==Public educational and research activity (this section is under construction)==
*OSINT training space for my trainees: http://osint.atlassian.net/
*OSINT training space for my trainees: http://osint.atlassian.net/
*ResearchGate - https://www.researchgate.net/profile/Bardoczi-Akos/research
*Harvard Dataverse - https://dataverse.harvard.edu/dataverse/bardoczi
*Harvard Dataverse - https://dataverse.harvard.edu/dataverse/bardoczi
*ResearcherID/ORCID: https://orcid.org/0000-0003-4239-2308
*ResearcherID/ORCID: https://orcid.org/0000-0003-4239-2308
Line 209: Line 207:
== Top 30 most cited Hungarian publications ==
== Top 30 most cited Hungarian publications ==


* [https://www.linkedin.com/pulse/uncovering-bare-metal-servers-hidden-location-behind-cloud-bardoczi Uncovering bare metal servers hidden location behind the cloud?] (2022. 09. 13)  
* [http://dx.doi.org/10.13140/RG.2.2.35629.26085 Uncovering bare metal servers hidden location behind the cloud?] (2022. 09. 13)  
* [https://www.linkedin.com/pulse/z%C3%B6ldebb-programoz%C3%A1si-nyelv-akos-bardoczi A zöldebb programozási nyelv] (2022.08.29)  
* [http://dx.doi.org/10.13140/RG.2.2.24724.07046 A zöldebb programozási nyelv] (2022.08.29)  
* [https://www.linkedin.com/pulse/az-osint-virtualiz%C3%A1ci%C3%B3-%C3%A9s-n%C3%A1lunk-id%C5%91vel-okosabb-akos-bardoczi Az OSINT, virtualizáció és a nálunk idővel okosabb helymeghatározás] (2022. 08. 10)  
* [http://dx.doi.org/110.13140/RG.2.2.31434.95683 Az OSINT, virtualizáció és a nálunk idővel okosabb helymeghatározás] (2022. 08. 10)  
* [https://www.linkedin.com/pulse/tud%C3%A1smenedzsment-szoftveres-t%C3%A1mogat%C3%A1sa-1x1-akos-bardoczi Tudásmenedzsment szoftveres támogatása 1x1] (2021. 03. 09)  
* [http://dx.doi.org/10.13140/RG.2.2.14657.74084 Tudásmenedzsment szoftveres támogatása 1x1] (2021. 03. 09)  
* [https://www.linkedin.com/pulse/mennyi-id%C5%91-megy-k%C3%A1rba-egy-phd-elk%C3%A9sz%C3%ADt%C3%A9sekor-akos-bardoczi Mennyi idő megy kárba egy PhD elkészítésekor?] (2020. 11. 28)  
* [http://dx.doi.org/10.13140/RG.2.2.15496.60168 Mennyi idő megy kárba egy PhD elkészítésekor?] (2020. 11. 28)  
* [https://web.archive.org/web/20181020162456/https://elemzes.netacademia.hu/2018/04/30/edns-cdn-terheleselosztas/ A net szívcsakrája – a DNS] (2018. 04. 30)
* [http://dx.doi.org/10.13140/RG.2.2.10188.18568 A net szívcsakrája – a DNS] (2018. 04. 30)
* [https://web.archive.org/web/20181026111546/https://elemzes.netacademia.hu/2018/04/30/szemleletmodvaltas-vagy-halal/ Szemléletmódváltás vagy halál?] (2018. 04. 30)  
* [http://dx.doi.org/10.13140/RG.2.2.30006.27206 Szemléletmódváltás vagy halál?] (2018. 04. 30)  
* [https://web.archive.org/web/20181026111459/https://elemzes.netacademia.hu/2018/05/02/webfejlesztes-webhoszting-cms/ A webfejlesztés művészete – egyedi vagy CMS?] (2018. 05. 02)
* [http://dx.doi.org/10.13140/RG.2.2.28328.55049 A webfejlesztés művészete – egyedi vagy CMS?] (2018. 05. 02)
* [https://web.archive.org/web/20181026111606/https://elemzes.netacademia.hu/2018/04/30/social-engineering-pszichogiaja/ A Facebook alaposan atomizálta a társadalmat, mi jön most?] (2018. 04. 30)
* [http://dx.doi.org/10.13140/RG.2.2.13229.05608 A Facebook alaposan atomizálta a társadalmat, mi jön most?] (2018. 04. 30)
* [https://web.archive.org/web/20181026111447/https://elemzes.netacademia.hu/2018/05/05/home-office/ Home office – elmélet, gyakorlat, másképp] (2018. 05. 05)
* [http://dx.doi.org/10.13140/RG.2.2.23819.67361 Home office – elmélet, gyakorlat, másképp] (2018. 05. 05)
* [https://web.archive.org/web/20181026111431/https://elemzes.netacademia.hu/2018/05/07/nyilt-forrasu-informacioszerzes/ Nyílt-forrású információszerzés – kémek, kurvák, gengszterek, OSINT] (2018. 05. 07)
* [http://dx.doi.org/10.13140/RG.2.2.12704.76801 Nyílt-forrású információszerzés – kémek, kurvák, gengszterek, OSINT] (2018. 05. 07)
* [https://web.archive.org/web/20190131010832/https://www.isaca.hu/index.php/hirek/magyarorszagi-hirek/item/435-igy-konnyitheti-meg-a-tamado-dolgat-a-tobblepcsos-hitelesites Így könnyítheti meg a támadó dolgát a többlépcsős hitelesítés] (2017. 11. 02)  
* [http://dx.doi.org/10.13140/RG.2.2.35878.29761 Így könnyítheti meg a támadó dolgát a többlépcsős hitelesítés] (2017. 11. 02)  
* [https://web.archive.org/web/20190131010854/https://www.isaca.hu/index.php/hirek/isaca-budapest-chapter/item/479-kimaxolt-self-branding-minden-idok-legnagyobb-alhekkere Kimaxolt self-branding - minden idők legnagyobb álhekkere] (2018. 03. 12)  
* [https://web.archive.org/web/20190131010854/https://www.isaca.hu/index.php/hirek/isaca-budapest-chapter/item/479-kimaxolt-self-branding-minden-idok-legnagyobb-alhekkere Kimaxolt self-branding - minden idők legnagyobb álhekkere] (2018. 03. 12)  
* [https://web.archive.org/web/20181026111606/https://elemzes.netacademia.hu/2018/04/30/social-engineering-pszichogiaja/ Magatartástudomány, social engineering és a HUMINT] (2018. 04. 30)  
* [http://dx.doi.org/10.13140/RG.2.2.16584.49928 Magatartástudomány, social engineering és a HUMINT] (2018. 04. 30)  
* [https://web.archive.org/web/20181026111421/https://elemzes.netacademia.hu/2018/05/23/online-tanfolyam/ Mikor válik a kultúra részévé az online tanulás?] (2018. 05. 13)  
* [http://dx.doi.org/10.13140/RG.2.2.31159.70569 Mikor válik a kultúra részévé az online tanulás?] (2018. 05. 13)  
* [https://web.archive.org/web/20181026111404/https://elemzes.netacademia.hu/2018/05/24/router-hackeles/ Miért kerül nagyon sokba a világnak az olcsó router?] (2018. 05. 24)
* [http://dx.doi.org/10.13140/RG.2.2.30143.20643/1 Miért kerül nagyon sokba a világnak az olcsó router?] (2018. 05. 24)
* [https://web.archive.org/web/20181026111352/https://elemzes.netacademia.hu/2018/05/30/igazsagugyi-informatika-etikus-hekkeles/ Te is lehetsz igazságügyi informatikus?] (2018. 05. 30)  
* [http://dx.doi.org/10.13140/RG.2.2.29481.98401 Te is lehetsz igazságügyi informatikus?] (2018. 05. 30)  
* [https://web.archive.org/web/20181026111326/https://elemzes.netacademia.hu/2018/06/12/android-apple-gazdasagtana/ Android vagy Apple? Zsebekben és nagyvállalati környezetben, hitkérdéseket félretéve] (2018. 06. 12)  
* [http://dx.doi.org/10.13140/RG.2.2.36192.87046 Android vagy Apple? Zsebekben és nagyvállalati környezetben, hitkérdéseket félretéve] (2018. 06. 12)  
* [https://web.archive.org/web/20181026111235/https://elemzes.netacademia.hu/2018/06/12/gdpr-az-informacioszabadsag-ellen/ GDPR az információszabadság ellen: hogyan könnyíti a bűnözők dolgát és nehezíti a nyomozókét és kutatókét?] (2018. 06. 12)  
* [http://dx.doi.org/10.13140/RG.2.2.26965.40167 GDPR az információszabadság ellen: hogyan könnyíti a bűnözők dolgát és nehezíti a nyomozókét és kutatókét?] (2018. 06. 12)  
* [https://web.archive.org/web/20181026111223/https://elemzes.netacademia.hu/2018/07/01/google-apps-g-suite/ Dizájnelem, amit a keresők is szeretni fognak: az email cím] (2018. 07. 01)
* [http://dx.doi.org/10.13140/RG.2.2.25287.68008 Dizájnelem, amit a keresők is szeretni fognak: az email cím] (2018. 07. 01)
* [https://web.archive.org/web/20181026111208/https://elemzes.netacademia.hu/2018/07/02/hatekony-ceges-kommunikacio/ Céges bölcsészmérnökök a döntéselőkészítésben] (2018. 07. 02)  
* [http://dx.doi.org/10.13140/RG.2.2.31998.56645 Céges bölcsészmérnökök a döntéselőkészítésben] (2018. 07. 02)  
* [https://web.archive.org/web/20181026111152/https://elemzes.netacademia.hu/2018/07/02/nyelvtudomany-mesterseges-intelligencia-es-seo/ Nyelvek, keresők, mesterséges intelligencia vs egy-egy keresőkifejezés értékének mérése] (2018. 07. 02)  
* [http://dx.doi.org/10.13140/RG.2.2.28643.12325 Nyelvek, keresők, mesterséges intelligencia vs egy-egy keresőkifejezés értékének mérése] (2018. 07. 02)  
* [https://web.archive.org/web/20181026111120/https://elemzes.netacademia.hu/2018/07/11/ketlepcsos-hitelesites-algoritmusok/ Kétlépcsős hitelesítés céges környezetben: elmélet és gyakorlat] (2018. 07. 11)  
* [http://dx.doi.org/10.13140/RG.2.2.17318.50245 Kétlépcsős hitelesítés céges környezetben: elmélet és gyakorlat] (2018. 07. 11)  
* [https://web.archive.org/web/20181026111102/https://elemzes.netacademia.hu/2018/08/23/netacademia-a-web-jovoje-megint/ Buborékeffektus: hogyan írjuk és olvassuk a webet? És hogyan kellene?] (2018. 08 23)
* [http://dx.doi.org/10.13140/RG.2.2.12285.33769 Buborékeffektus: hogyan írjuk és olvassuk a webet? És hogyan kellene?] (2018. 08 23)
* [https://web.archive.org/web/20181026111045/https://elemzes.netacademia.hu/2018/09/18/insta-ai-felsotest/ Nyelv, mesterséges intelligencia, na meg felsőtest strandszezon utánra] (2018. 09. 18)  
* [https://web.archive.org/web/20181026111045/https://elemzes.netacademia.hu/2018/09/18/insta-ai-felsotest/ Nyelv, mesterséges intelligencia, na meg felsőtest strandszezon utánra] (2018. 09. 18)  
* [https://web.archive.org/web/20181026111033/https://elemzes.netacademia.hu/2018/10/09/google-plus-adatszivargas/ Bezár a Google Plus – miután alaposan lecsapolták] (2018.10. 09)  
* [http://dx.doi.org/10.13140/RG.2.2.18996.22405 Bezár a Google Plus – miután alaposan lecsapolták] (2018.10. 09)  
* [https://web.archive.org/web/20181105110958/https://elemzes.netacademia.hu/2018/10/19/mesterseges-intelligencia-etika/ Mesterséges intelligenciáról – komolyan I.] (2018. 10. 19)
* [http://dx.doi.org/10.13140/RG.2.2.15640.78087 Mesterséges intelligenciáról – komolyan I.] (2018. 10. 19)
* [https://web.archive.org/web/20181030110139/https://elemzes.netacademia.hu/2018/10/30/viber-felfedi-az-uj-mobilszamod/ Üzenetküldők, amik felfedik az új mobilszámod (is) egy creepy fícsörön keresztül] (2018. 10. 30)  
* [http://dx.doi.org/10.13140/RG.2.2.23190.52806 Üzenetküldők, amik felfedik az új mobilszámod (is) egy creepy fícsörön keresztül] (2018. 10. 30)  
* [https://web.archive.org/web/20190617170434/https://netacademiaelemzesarchive.molbiol.org/2018/11/08/microsoft-power-bi-mesterseges-intelligencia/ Az AI-ról, komolyan II: a lexikális tudás felértékelődése a jövő döntéseiben] (2018. 11. 08)  
* [http://dx.doi.org/10.13140/RG.2.2.14801.92001 Az AI-ról, komolyan II: a lexikális tudás felértékelődése a jövő döntéseiben] (2018. 11. 08)  
* [https://web.archive.org/web/20181121103811/https://elemzes.netacademia.hu/2018/11/19/dmarc-dkim-spf-email-hitelesites/ A DMARC, mint a hamisított levelek mérésének lehetséges eszköze] (2018.11.18)  
* [http://dx.doi.org/10.13140/RG.2.2.26545.97125 A DMARC, mint a hamisított levelek mérésének lehetséges eszköze] (2018.11.18)  
* [https://web.archive.org/web/20181121103829/https://elemzes.netacademia.hu/2018/11/19/tudomanykommunikacio-mint-lehetseges-globalis-fenyegetes/ AI: rosszul elsülő tudománykommunikáció, mint lehetséges globális fenyegetés] (2018. 11. 19)  
* [http://dx.doi.org/10.13140/RG.2.2.14801.92001 AI: rosszul elsülő tudománykommunikáció, mint lehetséges globális fenyegetés] (2018. 11. 19)  
* [https://web.archive.org/web/20190617165847/https://netacademiaelemzesarchive.molbiol.org/2019/01/20/adatszivargasok-anatomiaja/ Az adatszivárgások anatómiája] (2019. 01. 20)  
* [http://dx.doi.org/10.13140/RG.2.2.31579.13601 Az adatszivárgások anatómiája] (2019. 01. 20)  
* [https://web.archive.org/web/20190612112814/https://netacademiaelemzesarchive.molbiol.org/2019/04/08/google-userid-osint/ Bűvös userID, ami a fél életed megmutatja bárkinek több szolgáltatásban] (2019. 04. 08)
* [http://dx.doi.org/10.13140/RG.2.2.22351.66722 Bűvös userID, ami a fél életed megmutatja bárkinek több szolgáltatásban] (2019. 04. 08)


== Check this site byby technical view! ==
== Check this site by technical view! ==
[[File:Cisco-talos-intelligence.png|left|thumb|[https://www.talosintelligence.com/reputation_center/lookup?search=bardoczi.net]]]
[[File:Cisco-talos-intelligence.png|left|thumb|[https://www.talosintelligence.com/reputation_center/lookup?search=bardoczi.net]]]
[[File:Domaintools.png|left|thumb|[https://whois.domaintools.com/bardoczi.net]]]
[[File:Domaintools.png|left|thumb|[https://whois.domaintools.com/bardoczi.net]]]

Latest revision as of 03:23, 26 September 2023


Ákos Bardóczi detailed resumé

Hacktivity, Security Theater, Oct 2013
Hacktivity, Security Theater, Oct 2013.

How can I download the concise CV in PDF format?

My recommendation: click HERE to download the recent, digitally signed, timestamped version.

Public and notable professional experience

  • 2021 May – 2022 Apr (full-time) – IBM DSS (Hungary) – Cyber Threat Defense Analyst – I worked as a SOC analyst , , and after working hours, I frequently used the most valuable elearning materials to learn more about IBM and non-IBM security fundamentals and solutions and how possible to link these with each other. 2022. May – I continued learning, deep dived into Cyber Threat Intelligence and Threat Hunting from the most valuable sources, online and print.
  • 2018 May – 2019 Jan (contactor) – NetAcademia LLC (Hungary) – content creator, professional writer (Netacademia Elemzés) , senior lecturer (opensource intelligence, advanced search techniques, email services maintaining, IT security hardening fundamentals)
  • 2016 May - 2018 Apr (contractor) – ISACA Budapest Chapter – professional writer (especially enterprise level IT governance practices), writing articles and summaries to Information Systems Audit and Control Association, these topics needed a deep understanding of privacy and cybersecurity standards, such as ISO27K, etc.
  • 2008 Sep – 2013 May (part-time) University of DebrecenIntranet and CMS developer (LAMP). Complete refactoring of the Department of Human Genetics intranet and site, migration from a former system without data loss. TYPO3 CMS hardening. (Debian, Apache, MySQL, PHP)
  • 2010 Sep – 2011 Sep (two European financial institutions, remote) - CMS and solution integrator. My primary role was to connect/integrate the TYPO3 to legacy systems and administrative sub-projects.

Educational background

  • 2005-(2010) – University of Debrecen, Faculty of Science and Technology, molecular biologist, summa sine diploma.
  • 2021 - Eötvös Loránd University, Faculty of Law, Juris Doctor - I've customized learning schedule!

Passed exams, qualification, and certifications - at least intermediate/advanced/expert level

Partially categorized by skills, and knowledge areas
#Python programming #Management, and #Economics #Audit #Law

Mastering Digital Forensics (LPATH)  - EC-Council CODERED

Conducting Reconnaissance for Cybersecurity (LPATH) - EC-Council CODERED

Dark Web Cyber Deception Demystified - EC-Council CODERED

Mastering Database Reconnaissance and Exploitation - EC-Council CODERED

Master Open Source Intelligence (LPATH) (l () -EC-Council CODERED

Mastering Threat Intelligence (LPATH) - EC-Council CODERED

Microsoft Cybersecurity Pro Track: Threat Detection - EC-Council CODERED

Open-source Intelligence (forensic approach) - Basel Institute on Governance

OSINT for Hackers and Penetration Testers - EC-Council CODERED

Data Mining for Fraud Detection - EC-Council CODERED

Maltego CaseFile in Action  - CyberInst.

Computer Forensics Best Practices - EC-Council CODERED

Real-time Threat Detection with Elastic Stack - EC-Council CODERED

IBM Agile Explorer - IBM Internal

IBM Machine Learning Specialist - Associate - IBM Learn

Terrorist Financing (counter terrorism) - Basel Institute on Governance (ICAR)

Operational Analysis of Suspicious Transaction Reports (anti-fraud in financial institutions) - Basel Institute on Governance (ICAR)

PCI (Payment Card) Standards for Corporate Professionals - Illumeo Learning

Cybersecurity for FinTech - EC-Council CODERED

Build Security Incident Response for GDPR Data Protection - EC-Council CODERED

Advanced Open Source Intelligence and Privacy - EC-Council CODERED

Information Systems Auditing, Controls and Assurance (ISACA based material, Grade Achieved: 92.50%) - The Hong Kong University of Science and Technology


Challenging Forensic Science: How Science Should Speak to Court - University of Lausanne -

International Cyber Conflicts - The State University of New York

Introduction to Cybersecurity Tools & Cyber Attacks - IBM

IBM Enterprise Resiliency - IBM Learn

Understanding Financial Markets - University of Geneva

Managing Project Risks and Changes - University of California, Irvine -

Genomics for Law - University of Illinois at Urbana-Champaign -

AI & Law- Lund University

Black Hat Python: Python For Pentesters - EC-Council CODERED

Network Automation with Python - EC-Council CODERED

IBM Data Science Foundations - Level 2 (V2) - CognitiveClass.AI

IBM Data Science Tools - CognitiveClass.AI

Python for Cybersecurity Speciazation - Infosec Institute


Mastering Web and Infrastructure Reconnaissance - EC-Council CODERED

Google Cybersecurity Certificate - Google Carreer Certificates

Certified Cybersecurity Candidate - (ISC)2

Blue Team Boot Camp: Defending Against Hackers - EC-Council CODERED

Power of Next Generation Firewalls - EC-Council CODERED

Reverse Engineering & Malware Analysis - Intermediate - Udemy

Palo Alto Networks Security Operations Fundamentals - Palo Alto Netorks

IBM Resilient SOAR Foundations - IBM Security Learning Academy

Splunk Search Expert Specialization - Splunk

English for IT Professionals - Udemy

IBM Growth Behaviors - IBM Internal

IBM Guardium Foundations - IBM Training

IBM Cybersecurity Threat Intelligence - IBM Internal

Big Data Foundations - Level 2 - CognitiveClass.AI

IBM Cybersecurity IT Fundamentals Specialization - Skills Network (IBM)

Google Workspace Security - Google Cloud Training


IBM Cybersecurity Analyst Assessment - IBM


Python, bash shell programming, Word, PowerPoint, Access, Excel, Wordpress CMS, linux (in the top 5% based on LinkedIN skill assessments)

Credly profile here, Coursera profile here, notable exam certs. credentials with verifications links

Recommendations

Bardóczi Ákos, Budapest, Sept 2021
  • "Working with Ákos is one of the most enlightening and eye opening experience I have ever had. His broad spectrum of knowledge and work ethics is unique. I would recommend him as a colleague or a contractor to anyone working in IT Sec any day." (DevOps professional)
  • "Ákos worked with my team as an external advisor for about a month and helped us to develop custom techniques suitable for our special needs. He is a highly skilled professional and a great advisor too who has a deep, practical knowledge in various fields of IT security and cybersecurity thanks to his enthusiasm for learning new things day-by-day. His approach to different kinds of problems is often unique compared to others so he can be a valuable member of any business community. He also has the ability to give down to earth advices while his ideas are still fit to the wider theoretical / conceptual framework of the project. I would definitely recommend him. " (PhD candidate)
  • As a new member of our security team YOU play an important role in the team’s life, you show dedication, growth, progress. Thank you for your efforts and excellent mentality in these fields. With you on board the Budapest Security Delivery Center are stronger and more successful.(former IBM manager)
  • "Bevallom, első körben nem könnyű felvenni Ákos gondolatmenetének ritmusát. A-ról beszél, de közben már D-n agyal, időbe telik, mire számomra is kikristályosodnak az ötletei, akkor viszont hatalmasat ütnek. Olyan aspektusokból képes vizsgálni sokszor triviálisnak tűnő dolgokat, melyre kevesen gondolnánk, ezáltal mindig tud valami újat, formabontót javasolni. Szívesen dolgoztam és fogok is vele dolgozni a jövőben, ha az OSINT nagymesterét keresed, ne habozz, ő a te embered!" (online marketing expert)
  • "Gratula: a cikket value proposition szempontból egyedülállónak tartom a magyar piacon: egyrészt szépen kidolgozott alkotás, másrészt merész szakmaisággal támasztja alá a kijelentéseit. Ez multi környezetnen nem szokás, csak a frázisok mennek manapság. Jó volt végigolvasni. Ritkán olvasni ilyen érdekes és tartalmas szakmai írást magyarul. Gratula érte"" (reader, Business Developement Manager)
  • "Ex rendőrként (10+ év nyomozói tapasztalattal) adnék dupla likeot erre" (reader, Six Sigma)

Language proficiency

  • native Hungarian
  • English (C1)

Concise publication list of references, citations

Memberships, volunteering

  • 2010 – ResearchGate Computer Security and IT Forensics workgroup, founder
  • 2014 - IEEE (Institute of Electrical and Electronics Engineers) - associate member
  • 2015 - ACM (Association for Computing Machinery) - professional member
  • 2016 - IEEE Young Professionals - member
  • 2017 - IEEE Consultants Network - member
  • 2019 - PMI (Project Management Institute), PMI Hungarian Chapter
  • 2019 - PMI (Project Management Institute), PMI Switzerland Chapter

Public educational and research activity (this section is under construction)

Remarks

During my university years and later I gained a higher level of knowledge and experience in the IT, CS, economic sciences, especially management. I would also like to mentor

newcomers and graduates from economics or IT fields. I can help experienced professionals as well in many cases.

§ All clients, contractors and companies must have integrity and follow the standard ethical rules. I take it very seriously!

Public contact details

  • +36 70 505 5200 (HU) / +36 1 999 0444 (HU)
  • +1 202 470-0790 (US)
  • +41 76 701 5200 (CH)
  • +49 151 6466 4588 (DE)
  • +39 366 311-1200 (IT)
  • +32 497 25-75-65 (BE)
  • Fax: +36 1 9997-993

Note: I should previously save your ID to my contacts, some services may filter the messages from senders who have never contacted before, recommended to ping me before. You can send your name/nick and ID anytime with whis link.

Top 30 most cited Hungarian publications

Check this site by technical view!