From Hacked Victim to Cybersecurity Visionary: My Cybersecurity Transformation
Cybersecurity visionary

From Hacked Victim to Cybersecurity Visionary: My Cybersecurity Transformation

Introduction and Journey Overview

Imagine starting your journey in cybersecurity with no formal training, roadmap, or mentor. That’s how my story begins. Today, I lead one of the pioneering cybersecurity companies in Oman. This narrative aims to inspire young professionals and students in cybersecurity by sharing my unconventional path and providing a comprehensive cybersecurity roadmap. Unlike today’s structured learning environments, my journey felt like navigating an ocean without a compass, filled with unexpected challenges and triumphs.

The Early Years: Uncertain Beginnings and the Spark of Curiosity

After graduating, I confronted the challenging reality of being unable to secure a scholarship. Determined to enhance my knowledge and improve my prospects, I approached an institute with a straightforward request: to learn about computers. The institute provided basic computer courses, which I eagerly completed. This period was characterized by uncertainty and an intense desire to find my place.

Discovering Programming

Upon finishing the basic computer courses, I felt a spark of curiosity towards programming. The logical structure and potential of programming fascinated me. I started with QBasic, which offered basic functionalities like simple calculators. Despite its limitations, QBasic ignited my passion for programming. To expand my skills, I moved on to FoxPro, a language that opened the doors to database interactions and more complex applications.

Developing Technical Skills: From FoxPro to Advanced Programming

FoxPro was a significant leap from QBasic, allowing me to create practical applications. However, I soon felt the need for greater challenges. I set my sights on learning C, a language renowned for its difficulty. Although I initially struggled, my determination led me to C++, a high-level language that provided a clearer direction for my programming skills. This journey taught me resilience and the importance of pushing beyond my comfort zone.

Academic Pursuits and Realizations

Although rich in information technology, my academic career had little to do with cybersecurity. I earned a Computer & Information Systems diploma from Sultan Qaboos University in 2000, a bachelor’s degree in Internet Computing in 2004, and a master’s in E-commerce in 2005 from Griffith University, Australia. During my diploma studies, learning Visual Basic was a turning point. It enabled me to create executable files, igniting my excitement as I could finally build something tangible. Each degree contributed to my growing skill set, laying a strong foundation for my future endeavors.

Pivotal Moments: The Internet Era and Experiencing a Hack

The introduction of the internet in Oman around 1998 was a game-changer. Fascinated with IRC (Internet Relay Chat), I leveraged my programming knowledge to engage with this new digital frontier. One night, around 2 a.m. in 1998, my CD-ROM drive suddenly opened while chatting on IRC. This unexpected incident was frightening and intriguing. It began my deeper interest in cybersecurity, highlighting the vulnerabilities in the systems I used and the potential for malicious activities in the digital world.

The Turning Point: Experiencing a Hack

As I sat there in shock, watching my CD-ROM drive open and my text being deleted and replaced by someone else, I was terrified and fascinated. At first, I thought it might be some voodoo magic, but I soon realized I had been hacked. A friend had sent me an image with a fake extension, combining a JPEG and an EXE file. When I clicked on it, a Trojan horse named NetBus was executed, giving my friend control over my computer. This experience was a pivotal moment for me. I was determined to understand how it worked and perhaps retaliate. My friend explained that he used NetBus and encouraged me to explore it.

Exploring Cybersecurity: Experimenting and Innovating

Eager to learn and retaliate, I downloaded NetBus and tools like Back Orifice. However, my friend was too savvy and ahead of me to be tricked by these methods. Determined to succeed, I discovered another tool called Sub7, created by a developer called “Mobman.” Sub7 had advanced features that intrigued me even more. I reached out to Mobman, who kindly responded and offered invaluable advice: to truly excel, I needed to master programming at a deeper level. He recommended Delphi, a powerful language built on Pascal, which I had previously studied and excelled in at Sultan Qaboos University Diploma.

Developing My Own Trojan Horse

Inspired by Mobman’s guidance, I immersed myself daily in learning Delphi. Leveraging my strong foundation in Pascal, I developed my Trojan horse, E-Tornado. This tool allowed me to control other computers remotely, including my smart friend! The project consisted of three main components: a client in Visual Basic to connect to the server, a server in Delphi to listen for connections, and a notifier in Visual Basic to forward signals to online clients. It took me five years, but the result was one of my proudest achievements. A German company proudly adopted this tool, and it became a commercially successful and well-known product. For educational purposes, the source code for this project is available on my website, digi77.com.

Major Challenges and Growth: SSL Security and Server Management

Throughout my journey, I have encountered several significant challenges that have profoundly shaped my career. One of the major hurdles was my initiative to evaluate the SSL security of banks in Oman. This project aimed to serve the community by enhancing the security posture of financial institutions. The outcome was largely positive, as many banks appreciated the initiative and began competing to achieve higher SSL security standards. Periodically, I announced which bank ranked number one in terms of SSL strength, spurring healthy competition among them. However, one bank did not take this well and threatened legal action due to its poor SSL posture. Fortunately, I was able to explain that my efforts were for their benefit, and the situation did not escalate further.

Another significant challenge occurred when I lost a substantial amount of cryptocurrency due to a vulnerability in a well-known wallet. The bug transmitted user wallet passwords in plain text to Google, resulting in considerable financial loss. This incident was a harsh reminder of the high cost of security lapses and underscored the critical importance of thorough security evaluations.

Additionally, I discovered an issue with IP leakage on iOS systems, where the email client inadvertently exposed the sender’s private information. This discovery was met with resistance from Apple, illustrating the challenges of addressing security flaws in widely used systems. These experiences have taught me that the cost of achievement can be high, but with good intentions and perseverance, the effort is ultimately worthwhile.

Reflecting on these experiences, I realize that each challenge not only tested my technical skills but also reinforced the importance of resilience and ethical responsibility in cybersecurity. The journey, though arduous, has been immensely rewarding and has solidified my commitment to advancing security practices for the betterment of the community.

Exploring Web Development and Community Building

My journey didn’t stop there. As my interest in programming grew, I became intrigued by web development, particularly forums. To create forums, I needed to learn PHP, a popular scripting language for web development. I established my first Omani forum with PHP, OM77.net, in 2001. Remarkably, this forum is still active today, serving as a testament to the lasting impact of my early projects.

Transition to Server Management and Security

By this time, I was transitioning from a typical IT professional to someone who could code and develop executable files. My knowledge base expanded significantly when I realized the necessity of learning PHP and managing web hosting. I used shared hosting services initially but shared hosting became insufficient as the forum’s popularity soared. With over 100,000 members and over 3,000 concurrent users, the site became sluggish, necessitating a move to a dedicated server. Lacking knowledge in server management, I relied on third-party experts to handle the server, particularly since the forum required a Linux environment and I was unfamiliar with Linux at the time. However, this dependency proved problematic when the site was hacked and defaced, delivering a harsh lesson.

Embracing Defensive Security

This second major hacking incident—akin to Mike Tyson’s famous quote, “Everyone has a plan until they get punched in the face”—was a turning point. I realized that having offensive security skills wasn’t enough; I needed to master defensive security as well. Determined to manage my servers, I began learning Linux, focusing on server management and security. I delved into installing operating systems, working with cPanel, and securing Linux servers. This incident broadened my expertise from merely an IT professional and programmer to someone deeply knowledgeable in server management and cybersecurity. This expertise has been crucial in keeping the forum online and secure.

One of the other main reasons that encouraged me to learn to manage Linux servers and secure them by myself was the ticket response time. At that time, I couldn’t afford premium support, so I was paying for average support. Normally, they would take a day or two to reply and maybe a day or two to solve the problem, which would upset me because the site would be offline for four to five days. So, I decided to learn and master the task myself to cut down the duration of troubleshooting the server and avoid hackers or getting the website defaced again. Over time, I could master this, and it became a bread and butter for me.

During that time, I was in Australia on a scholarship for my bachelor’s degree, and the monthly student allowance wasn’t enough. So, I had to start an online business through eBay. I used to buy CDs from the bookshop in the city where I lived, Brisbane, specifically Logan. The CD games were cheap and expensive in some remote areas in Australia. So, I would buy them and then put them on eBay auctions, where people would bid and buy them.

Advanced Skill Acquisition: Phishing Attacks and Cybersecurity Tools

Despite my success, another cybersecurity challenge awaited me. I fell victim to a phishing attack, leading to the theft of my credit card information on eBay. This was a harsh reminder that mastering server-side security wasn’t enough; I also needed to secure my personal computer. This incident marked another pivotal point in my journey. I dedicated myself to learning how to protect my PC and master desktop security, including reverse engineering malware, to understand how attackers think.

Desktop Security Knowledge and Use of Virtual Machines

During my desktop security knowledge phase, I also learned to isolate my environment using virtual machines. I also learned to use VNC repeaters to overcome Network Address Translation (NAT) restrictions, which often block some ports. This period also taught me how to use port forwarding in Linux using various applications.

Automation and APIs

Apart from my manual coding skills, automation became a significant part of my journey. I learned how to automate tasks such as validating VPN nodes, backups from a dedicated Linux server to Amazon Cloud, and validating VNCs and proxies via PHP. I also learned how to use APIs with Vultr and DigitalOcean to automate the creation and monitoring of nodes.

Email Management and Marketing

I gained extensive experience handling massive amounts of emails and delivering marketing emails while avoiding spam filters. Additionally, I learned how to process email attachments automatically through Linux bash scripting, a skill that proved invaluable for managing and utilizing email data efficiently.

Continued Innovation and Recognition

Building on my newfound skills, I developed another program called Mail Robot, capable of automatically fetching and indexing millions of emails into a Microsoft Outlook database. Nokia Siemens adopted this project, marking another significant milestone. The source code for this project is also available on digi77.com.

Developing Linux Kodachi

In 2013, I experienced a bulb moment. By this stage, I had developed several tools, including StealthWalker and SSLEye, which received local awards. I decided to stop developing applications and instead develop my operating system. Thus, the idea of Linux Kodachi was born. This operating system is designed to be secure, featuring built-in encryption tools, Tor, VPN, DNS encryption, and a unique dashboard. Linux Kodachi has received numerous awards and recognition from many publishers. It has been named the best security and privacy operating system for five consecutive years by the Tech-radar magazine.

Exploring Cryptocurrency

In late 2015, when cryptocurrency experienced a significant spike in popularity, I shifted my focus from cybersecurity to cryptocurrency. I started learning about smart contracts and coding my mining software while maintaining my mini-mining farm at home. This was a fascinating journey for me. The inherent security of cryptocurrency, with its top-of-the-line encryption algorithms and immutable design, was a major driving factor for this shift. During this period, I combined my knowledge of Linux administration, server security, and cryptocurrency programming to create highly efficient cryptocurrency mining scripts for the mini farm.

After three years of intense focus on cryptocurrency, I decided to return to cybersecurity and continue developing Linux Kodachi. While my foray into cryptocurrency was successful, my passion for cybersecurity and innovation drew me back.

Deep Diving into Digital Forensics

During my career, one of the things that supported my knowledge, which I wouldn’t do again if times could go back, was deep diving into digital forensics. I took many courses in digital forensics, including computer forensics, mobile forensics, network forensics, and database forensics. This path also led me to learn reverse engineering and the evasion or bypassing of antiviruses and EDRs, which was exciting as I could defeat the techniques of corporate efforts individually. However, if I could return, I would choose a different path. Despite this, my journey into cybersecurity has been invaluable, from zero to becoming a leader today in the field. My path was challenging, and I encountered numerous road bumps, but I could proudly convert many of these challenges into well-recognized international achievements. It’s always easier to attack than defend; the attacker needs only one vulnerability to mess up your well-protected castle.

Establishing a Cybersecurity Business: Eagle Eye Digital Solutions

In 2008, after returning from Australia, I established my own company, Eagle Eye Digital Solutions, to provide cybersecurity software tools and services. This venture allowed me to offer practical solutions to real-world security challenges and further solidify my expertise in the field. Within a few years of launch, we successfully attracted a large global client base, including multiple Omani public and private sectors. Designed and developed cutting-edge security applications and network security measures to ensure optimal secure system operation, including Linux Kodachi (2013-present), StealthWalker, SSLEye Prism Protection, and E-Bouncer.

Notable Projects and Contributions

Throughout my journey, I have developed several noteworthy tools and applications:

  • MSN Tool (2008): An application designed to recover forgotten MSN passwords by attempting all possible passwords from a local database against an imported list of addresses.
  • FX-Storm (2006): A tool to automate various Forex (currency exchange) calculations such as Pivot, Camarilla, Fibonacci, charts, news, entry points, and exit points.
  • Auto-IP-Changer (2010): A tool for Windows servers with multiple IPs, allowing automatic changes at specified intervals.
  • Shy Girl v0.3 (2013): A script to automate information gathering from a given domain, useful for penetration testing tasks.
  • Stealth Walker: A software-based privacy tool that provides an encrypted VPN connection, securing all internet traffic and communications. It features AES-256 encryption and DNS protection and integrates multiple privacy tools for comprehensive security.
  • SSL Eye: A tool designed to detect SSL man-in-the-middle attacks by comparing SSL fingerprints across multiple nodes worldwide. It validates certificates, ensures secure key exchanges, and offers real-time alerts for suspicious activity.
  • Folder Monitoring Tool: Monitors specified files or folders for changes, providing instant notifications via sound and popup messages to alert users of any modifications.

Most of the source codes for these applications can be downloaded from digi77.com/source-codes. Also, I have written many technical blogs, which you are welcome to learn from at digi77.com/category/blog.

Professional Growth and Leadership Roles

In 2019, I took on the role of CTO at a Swiss company, where I further honed my expertise and contributed to innovative cybersecurity solutions. My journey continued as I joined the National Security Services Group (NSSG), initially as Chief Cyber security and R&D, then as Deputy Chief Executive Officer in September 2022, and currently serving as the Acting CEO.

From Technical to Managerial: A Shift in Focus

Now, as my role has widened in cybersecurity, I am more exposed to daily management responsibilities, dragging me away from the hardcore technical tasks I used to do, like programming. This shift made me pause the development of Linux Kodachi despite its popularity and the community’s frequent requests for updates. I cannot fulfill these requests now because I am increasingly involved in management.

To the youth, I offer this advice: during the early technical period of your career, when you have the opportunity to get your hands dirty with low-level technical work, make the most of it. One day, as you climb the ladder to management, you will not have the chance and time to work on such tasks and achieve such milestones. Today, I truly miss and wish I had the time to return to programming and coding. Yes, I am still in the field of cybersecurity, which I am passionate about, but it is not what drives me. What drives me the most is hardcore innovation. I always like to innovate and create things that add value to the community.

Leading Innovation at NSSG

While my shift to management has stopped me from personal innovation, the good news is that I still need to lead my team to innovate new solutions. If you google National Security Services Group today, you will see that NSSG has received many awards for innovation. In the four years I have been leading the company, NSSG has developed almost three cybersecurity solutions from scratch, two of which are pieces of art unique in the market. Some of these solutions are already on the market and being used by clients, while others will be launched soon after securing intellectual property rights.

Reflection and Future Endeavors

Each setback in my journey—whether being hacked, dealing with phishing attacks, or facing server management challenges—served as a learning experience and a catalyst for my growth. From developing remote control tools and email utilization software to creating a well-known forum and Linux Kodachi, I transformed each challenge into an achievement. These experiences have equipped me with a comprehensive understanding of offensive and defensive cybersecurity.

Although I’ve paused the development of Linux Kodachi to focus on my career, I plan to return to it. My journey highlights that the road to success is often bumpy, but perseverance and a willingness to learn from failures are key. Aspiring cybersecurity professionals have access to resources and structured learning paths that I need to gain today.

The Importance of Sharing Knowledge

As you can see from my blogs and the source codes I have shared publicly, I have one rule: the more you give to the community, the more you will get in return, and the more the information will stick in your memory. Throughout my career, I have always shared blogs and source codes, some containing over 60,000 lines of code. I share them for free so people can learn from my experiences and understand how I overcame challenges and achieved milestones. Sharing is key to success; it will always bring good returns.

The Cost of Achievement

All of these achievements come with a price. Having your name distinguished in any field or domain is not free. Knowing you will face months of sleepless nights, hard work, and relentless effort, it would be best to be determined, disciplined, and persistent. You will be exhausted to the point where everything around you tells you to quit. However, your inner belief in yourself and your goals towards reaching your destination will keep you moving forward. Everyone experiences setbacks and failures, but those who have remarkably distinguished themselves are the ones who have faced these setbacks, risen again, and become stronger than before.

AI and Its Role in Cybersecurity

AI enhances cybersecurity by acting as a powerful tool that improves efficiency and effectiveness without replacing jobs. It quickly analyzes vast data to identify threats humans might miss, highlighting high-priority issues and enabling proactive security measures. By integrating various security products into a unified platform, AI reduces complexity and improves overall security. Automating routine tasks lightens the operational burden on cybersecurity teams, bridges the talent gap, and simplifies tasks for less skilled personnel. Prioritizing privacy and ethics, AI uses specific datasets to ensure responsible data handling. Ultimately, the future of cybersecurity lies in the collaboration between human intelligence and AI, leading to a safer digital world.

A Roadmap for Aspiring Cybersecurity Professionals

All of the above was my personal cybersecurity experience. However, the following part will share knowledge to help the youth or people considering starting in cybersecurity. I will provide a full roadmap based on research and the knowledge shared with me by others. I hope this roadmap will make the journey much easier than mine.

Having someone to give you such a roadmap would shorten the time it takes to succeed. Always have passion, believe in yourself and your capabilities, and believe you can develop extraordinary things. Believe in your uniqueness and that you have a purpose. Everyone has a purpose in this world, and sometimes setbacks and challenges will accelerate your realization of that purpose.

Cybersecurity Roadmap: Building the Foundation

Module 1: Operating Systems Mastery

Windows:

  • Learn to install, configure, and administer Windows.
  • Focus on understanding the kernel, registry, authentication mechanisms, and security hardening practices using CIS benchmarks.
  • Familiarize yourself with the Windows command line and set up an Active Directory environment.

Linux:

  • Master Linux installation, configuration, and administration.
  • Learn about the Linux kernel, command-line utilities, and security practices.
  • Familiarize yourself with various Linux distributions, terminal commands, and text editors like Vim.

Module 2: Networking Fundamentals

Core Concepts:

  • Understand the OSI model, TCP/IP protocols, and common network services and ports. Networking knowledge is crucial for cybersecurity roles.

Practical Skills:

  • Use tools like Wireshark to analyze network traffic.
  • Learn about subnetting, routing, and firewall configuration.
  • Set up a home lab with virtual machines and network devices to practice these skills.

Module 3: Command-Line Proficiency and Scripting

Tools and Languages:

  • Become proficient with command-line interfaces, focusing on tools like Vim, Git, and essential scripting languages (PowerShell for Windows, Bash for Linux, and Python for both).
  • Learn how to set up GitHub repositories and basic scripting.

Module 4: Advanced Skills and Practical Experience

Penetration Testing and Methodologies:

  • Study the Penetration Testing Execution Standard (PTES), MITRE ATT&CK framework, and OWASP Top 10.
  • Understand the phases of a penetration test, from reconnaissance to reporting.
  • Expand your home lab to include complex environments like Active Directory, vulnerable web applications, and Docker containers. Platforms like Hack The Box and TryHackMe offer practical challenges.

Scripting and Automation:

  • Deepen your scripting skills with PowerShell, Bash, and Python.
  • Automate tasks and develop small tools to aid in penetration testing and other cybersecurity tasks.

Report Writing:

  • Analyze open-source penetration test reports to understand their structure.
  • Practice writing your own reports based on lab exercises and Capture the Flag (CTF) challenges.

Module 5: Continuous Learning and Community Engagement

Non-Technical Skills:

  • Develop non-technical skills like persistence, problem-solving, creative thinking, and maintaining balance and self-care.

Certifications and Courses:

  • Consider pursuing well-regarded certifications like OSCP, CEH, or CISSP. Entry-level certifications such as CompTIA Security+, eLearnSecurity Junior Penetration Tester (eJPT), and Blue Team Level 1 (BTL1) can open doors for aspiring professionals.

Community Involvement:

  • Engage with the cybersecurity community through conferences, forums, and local meetups. Share your knowledge through blogs, YouTube channels, or speaking engagements. Networking with industry professionals can provide guidance and open doors to new opportunities.

Module 6: Cybersecurity Career Paths and Roles

Penetration Testing Roles:

  • Network Penetration Tester: Focuses on network vulnerabilities.
  • Mobile Penetration Tester: Secures mobile applications.
  • Web Penetration Tester: Identifies and fixes vulnerabilities in web applications.
  • Application Penetration Tester: Assesses vulnerabilities in software applications.

Incident Response Roles:

  • Incident Responder: Provides immediate response to security incidents.
  • SOC Analyst: Monitors and defends against threats in real time.
  • Digital Forensic Analyst: Investigates digital evidence from breaches.

Security Leadership Roles:

  • Chief Information Security Officer (CISO): Leads information and data security initiatives.
  • Chief Security Officer (CSO): Manages overall security, including physical and personnel security.

Other Specialized Roles:

  • Bug Bounty Hunter: Finds and reports software vulnerabilities for rewards.
  • Red Team Member: Simulates sophisticated cyberattacks to test defenses.
  • Exploit Developer: Creates tools to exploit security vulnerabilities.
  • Blue Team Member: Defends information systems against cyber threats.

Key Certifications:

  • CEH, OSCP, CompTIA PenTest+, CISSP, GPEN, CMST, GWAPT, LPT, CWAT, CAST, GCIH, CISSP, GCFA, EnCE, CISA, GIAC certifications, CCISO, CPP

Skills and Tools:

  • Tools: Metasploit, Nmap, Wireshark, Burp Suite, OWASP ZAP, SQLmap, Drozer, Frida
  • Programming: Python, Bash, Java, HTML, CSS, JavaScript, PHP, C#
  • Environments: Linux, Windows, iOS, Android
  • Analysis: Log analysis, forensic investigation
  • Compliance: GDPR, HIPAA, PCI-DSS
  • Skills: Vulnerability Assessment, code analysis, reverse engineering, strategic planning, risk management

Conclusion

My journey from a novice with no guidance to becoming a leader in the cybersecurity field was marked by challenges, perseverance, and continuous learning. Each step, whether facing a hacking incident or diving deep into new technologies, was a crucial part of my growth. The experiences I shared highlight that success in cybersecurity is not just about technical skills but also about resilience, curiosity, and a willingness to embrace new challenges.

As you embark on your path in cybersecurity, remember that the road may be bumpy, but each setback is an opportunity to learn and grow. Leverage the resources available today, engage with the community, and never stop exploring new areas of knowledge. The cybersecurity landscape is vast and ever-evolving, offering immense opportunities for passionate and dedicated people.

Innovation and sharing knowledge have always been at the core of my journey. As you progress in your career, I encourage you to contribute to the community, share your insights, and help others navigate their paths. The more you give, the more you will receive in growth and understanding.

Ultimately, the path to success in cybersecurity is not just about reaching a destination but the journey itself. Embrace every challenge, learn from every experience, and stay committed to your passion. You can achieve your goals and significantly impact cybersecurity with determination and a strategic approach.

Remember, your journey is unique, and your contributions can pave the way for future generations. Stay inspired, stay curious, and continue to push the boundaries of what is possible in cybersecurity. Your efforts today will shape the secure digital world of tomorrow.

All of these achievements come with a price. Having your name distinguished in any field or domain is not free. It would be best to be determined and disciplined, knowing you will face months of sleepless nights, hard work, and relentless effort. You will be exhausted to the point where everything around you tells you to quit. However, your inner belief in yourself and your goals towards reaching your destination will keep you moving forward. Everyone experiences setbacks and failures, but those who have remarkably distinguished themselves are the ones who have faced these setbacks, risen again, and become stronger than before.

Index of Acronyms

Certifications

  • CIS: Center for Internet Security
  • CISSP: Certified Information Systems Security Professional
  • CCISO: Certified Chief Information Security Officer
  • CISA: Certified Information Systems Auditor
  • OSCE: Offensive Security Certified Expert
  • OSEE: Offensive Security Exploitation Expert
  • GSEC: GIAC Security Essentials

Technologies and Tools

  • JADX: Android Decompiler
  • Covenant: Command and Control Framework
  • Empire: Post-Exploitation Framework

Jaime Leverton

Account Manager at Bank of America

2 个月

I recommend professional expert Email: [email protected] for Recovery Funds/ Cryptocurrency/ Recovery of Stolen Bitcoin / Bitcoin Mining/ Increase of Credit score/ MOBILE SPY REMOTE CONTROL ACCESS AUTHORIZATION. Removing Bad Records from Both Public and Private database.

Amal Al Khaburi

Transformative Leadership| Audit| Risk| Fraud| Governance| Compliance| Data Privacy| ESG| AI| Cybersecurity| Regulatory| Board Member| Committee Member| Key Note Speaker| Senior Advisor|

4 个月

??????

Rashid Al-Fori

Senior Cyber Security Architect | Network Security | Network Architecture | MSc-IT | BEng in Computer Networking

5 个月

Inspiring

要查看或添加评论,请登录

社区洞察

其他会员也浏览了