Personal Information
Unternehmen/Arbeitsplatz
Kuwait Kuwait
Beruf
Security Engineer, Hacker, Consultant, Red Teamer
Info
Security Engineer specializing in Software Engineering, Security Engineering, Penetration Testing, Authentication, PKI, Cryptography, Red Teaming and Incident Response.
Mohammed Aldoub worked on various projects in Government , and in local IT Security companies, including Penetration Testing, Brain Computer Interfaces, Authentication Gateways, Smart cards, Cryptography, PKI and other security projects.
Mohammed's specialty is computer security, web application security and hacking, system penetration testing, secure code reviews and all sorts of cyber security subjects.
His authentication projects include designing secure systems such as national-scale authentication systems, and ...
Tags
penetration testing
exploitation
sql injection
big data
elk
privacy
الخصوصية
الاختراق
أمن المعلومات
محمد الدوب
information security
hacking
linux hacking pentest privesc shell ssh العرب
owasp kuwait security hardening cyber security sum
django security python hacking voulnet kuwait pene
Mehr anzeigen
Präsentationen
(3)Gefällt mir
(2)AWS Security and SecOps
Shiva Narayanaswamy
•
Vor 8 Jahren
Abusing Interrupts for Reliable Windows Kernel Exploitation (en)
inaz2
•
Vor 8 Jahren
Personal Information
Unternehmen/Arbeitsplatz
Kuwait Kuwait
Beruf
Security Engineer, Hacker, Consultant, Red Teamer
Info
Security Engineer specializing in Software Engineering, Security Engineering, Penetration Testing, Authentication, PKI, Cryptography, Red Teaming and Incident Response.
Mohammed Aldoub worked on various projects in Government , and in local IT Security companies, including Penetration Testing, Brain Computer Interfaces, Authentication Gateways, Smart cards, Cryptography, PKI and other security projects.
Mohammed's specialty is computer security, web application security and hacking, system penetration testing, secure code reviews and all sorts of cyber security subjects.
His authentication projects include designing secure systems such as national-scale authentication systems, and ...
Tags
penetration testing
exploitation
sql injection
big data
elk
privacy
الخصوصية
الاختراق
أمن المعلومات
محمد الدوب
information security
hacking
linux hacking pentest privesc shell ssh العرب
owasp kuwait security hardening cyber security sum
django security python hacking voulnet kuwait pene
Mehr anzeigen