خريج هندسة اتصالات وإلكترونيات منظم وذو دافع ذاتي ولدي خبرة مهنية وتدريب داخلي لمدة عامين أو أكثر. اجيد اللغة الإنجليزية. لدي معرفة عملية لمدة عامين في دعم تكنولوجيا المعلومات وأمن الشبكات بالإضافة إلى تكوين نظام IP PBX مع 4 سنوات من الخبرة في إدخال البيانات وتحليلها. اعمل باستمرار على تحديث المهارات الفنية الشخصية والمهنية من خلال الدورات الجامعية التكميلية والمعسكرات التدريبية عبر الإنترنت.اجيد العمل ضمن فريق موثوق ومسؤول.
Data entry
data organization
data analytics
IT Support
Maintenance of hardware and software
Besides maintaining printers and connecting them to the network
Programming IP Telephone and IP PBX System
Excel
Word
PowerPoint
Google Sheets
English translation
Arabic translation
Content writer
Online research
Communication and electronics engineering
Diploma in English
Advanced English as second language
ISDL
International Computer Driving license
Ethical Hacking
Network Analysis
and Vulnerability Scanning
Mobile Software Maintenance
Building a Leadership Personality
Strategic analysis and planning
Al-Amal Association
Certificate for Volunteerism Youth Development
Al-Qurra club of Lahj Certificate forparticipation of Heritage and nations Festival
One month and half training
shumul bank
1) Course in system security
2) A course in hardware and software maintenance
3) A course in the banking system
4) Course in customer service
5) Course in accounting
A one-month training for the National
Cement Company / Lahj
1) Check all users services and Monitoring
2) Increase or decrease user authority in the firewall
3)Updating software operation and installation of drivers
One-month training for a
government communications
company / Aden
1) Identify telecommunications network servers
2) Examine Data center
Cisco Data_Analytics_Essentials
1) Explain how the data analytics process creates value from data.
2) Explain the characteristics of data, including formats, availability and methods to acquire. Transform data using
analytics tools.
3) Analyze data using basic statistical and data preparation techniques.
4) Complete hands-on lab using Excel, SQL, Tableau and other tools.
5)
Cisco Ethical_Hacker
1)Explain the importance of methodological ethical hacking and penetration testing
2) Explain how to exploit application-based vulnerabilities.
3) Create penetration testing preliminary documents. vulnerabilities.
4) Perform information gathering and vulnerability scanning.
5) Explain how social engineering attacks succeed.
6) Explain how to perform post-exploitation activities. activities.
7) Create a penetration testing report.
8) Explain how to exploit wired and wireless network vulnerabilities.
9) Classify pentesting tools by use case.
10) Explain how to exploit cloud, mobile, and loT security.