Certifications

Within the mobile environment there are a lot of different technologies and techniques used. It is important to keep up with all the changes and new developments by attending workshops, trainings, webinars, conferences, and hands-on. Because of this, I am continuously learning and expanding my own knowledge.

GIAC

The past years I have attended several SANS courses and, after passing the exam, earned the corresponding GIAC Information Security certifications. In general these certifications have to be renewed every 4 years. The current status of my GIAC certifications (GPEN, GMOB, GASF, GREM) can be viewed at the GIAC Certified Professionals Directory website. Below is an overview and summary of my GIAC certifications.

Penetration Tester

GPEN holders have demonstrated their ability to execute penetration-testing methodologies and properly conduct a penetration test, as well as best practice technical and non-technical techniques specific to conduct a penetration test. Professionals holding the GPEN are qualified for job duties involving assessing target networks and systems to find security vulnerabilities. Read more…

Mobile Device Security Analyst

GMOB holders have demonstrated the ability to protect systems and networks and to properly secure the mobile devices accessing vital information. Professionals holding the GMOB have an up-to-date technical knowledge and thorough understanding of mobile device penetration testing and the ability to perform a basic security analysis of mobile applications. Read more…

Advanced Smartphone Forensics

GASF certificated professionals have demonstrated that they are qualified to perform forensic examinations on devices such as mobile phones and tablets. Candidates are required to demonstrate an understanding of the fundamentals of mobile forensics, device file system analysis, mobile application behavior, event artifact analysis and the identification and analysis of mobile device malware. Read more…

Reverse Engineering Malware

GREM holders have demonstrated the knowledge and skills to reverse-engineer malicious software (malware) that targets common platforms, such as Microsoft Windows and web browsers. Professionals holding the GREM know how to examine inner-workings of malware in the context of forensic investigations, incident response, and Windows system administration. Read more…

Assessing and Auditing Wireless Networks (in progress)


EC-Counsil

I have only attended one course of the EC-Counsil: Certified Ethical Hacker v10. After passing the exam I earned the CEH certification, which is shown below.

Certified Ethical Hacker

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. Read more…


(ISC)²

This year I will start with getting my CISSP certification. The first step in this process is becoming a (ISC)² Associate by passing the CISSP exam.

(ISC)² Associate (in progress)


Trainings

I have attended several different trainings and workshops in relation to mobile security. These trainings/workshops are often focused on specific subjects or tools. Below is an overview of the most recent/relevant trainings and workshops.

M6-149 Mobile Applications

By having completed this course the graduates are prepared to develop an understanding of fundamentals and concepts associated with mobile applications and to examine mobile applications from both the perspective of the mobile device and the mobile network. Read more…

TCP/IP Analysis and Troubleshooting with Wireshark

Effective Network analysis and Optimization encompasses the skills of not only capturing data, but also the ability to discern the key patterns hidden within the flood of network traffic. This course will provide the student with a set of investigate and analysis techniques focusing on the use of vendor-neutral, Open-Source Tools. Read more…

Next Generation Protocols and Advanced Network Analysis Using Wireshark

Network and Forensics Analysis encompasses the skills of not only capturing data, but also the ability to discern unusual patterns hidden within seemingly normal network traffic. This course will provide the student with a set of investigate and analysis techniques focusing on the use of vendor-neutral,
Open-Source Tools. Read more…

Python Programming Basics

The basic course Python programming gives you a comprehensive overview of the basic concepts and functions in Python. Read more…

Python Programming Advanced

In the Python programming course you’ll get started with the more advanced features within Python and learn to use the extensive Python library. Read more…

EXIN

Business Information Management 

EXIN Business Information Management with reference to BiSL focuses on information management within the context of the organization. Professionals are taught to look at the requirements and demands on IT service departments and how the department itself supports users.. Read more…

Information Security Foundation based on ISO/IEC 27001

EXIN Information Security Foundation is a relevant certification for all professionals who work with confidential information. It explains the concept, value, and importance of information security as well as the threats and risks. Read more…

Application Management

EXIN Application Management Foundation with reference to ASL is the key to application administration and management. This certification proves a candidate’s knowledge of the ASL-framework, concepts, processes and activities of application management. Read more…

ITIL Service Management 

ITIL Foundation is designed for IT professionals and employees who wish to know more about the key concepts of IT Service Management.