RAHMİ YILDIZ
13
Followers
Personal Information
Unternehmen/Arbeitsplatz
Ankara, Turkey Turkey
Beruf
Security Engineer at Sağlık Bakanlığı-Turkish Ministry of Health
Branche
Legal
Webseite
http://rahmiy.blogspot.com.tr
Info
Linux-Debian and Redhat based distributions System Administration
Network-Cisco and Huawei router/switch configuration
LDAP,LDAP Administration
Scripting-PythonşBash,Sed and Awk
Postgresql
Virtualization - VMware,Xen,KVM and OpenVZ
Web Server-Apache,Nginx
Squid,Pfsense
IPS/IDS-Configuration of ELK with Snort,Suricata
Monitoring-Nagios,Cacti,Haproxy
Pentest-Metasploit,Nessus,Nmap
- Präsentationen
- Dokumente
- Infografiken
Power System Analysis!
PRABHAHARAN429
•
Vor 9 Jahren
Solutions control system sengineering by normannice 6ed 130502172814-phpapp02
Khalil Abu Haltam
•
Vor 10 Jahren
Control system(smarajit ghosh) By sol
Selomon birhane
•
Vor 9 Jahren
Chapter 8 Root Locus Techniques
guesta0c38c3
•
Vor 14 Jahren
Security Operation Center - Design & Build
Sameer Paradia
•
Vor 9 Jahren
Proje yönetimi notları
Aytekin Özel
•
Vor 10 Jahren
Attack monitoring using ElasticSearch Logstash and Kibana
Prajal Kulkarni
•
Vor 9 Jahren
555 Timer IC
Soumil Heble
•
Vor 11 Jahren
SOC presentation- Building a Security Operations Center
Michael Nickle
•
Vor 12 Jahren
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
BGA Cyber Security
•
Vor 7 Jahren
8178001772 control
MaRwa Hamed
•
Vor 10 Jahren
Big Data Visualization
Raffael Marty
•
Vor 9 Jahren
Abusing Microsoft Kerberos - Sorry you guys don't get it
Benjamin Delpy
•
Vor 9 Jahren
Lecture 12 ME 176 6 Steady State Error
Leonides De Ocampo
•
Vor 14 Jahren
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder
•
Vor 5 Jahren
PowerShell for Penetration Testers
Nikhil Mittal
•
Vor 11 Jahren
Building Security Operation Center
S.E. CTS CERT-GOV-MD
•
Vor 10 Jahren
Beyaz Şapkalı Hacker (CEH) Lab Kitabı
BGA Cyber Security
•
Vor 7 Jahren
pfSense Firewall ve Router Eğitimi
BGA Cyber Security
•
Vor 10 Jahren
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploitation
Benjamin Delpy
•
Vor 9 Jahren