Cisco asa 5505 stopping ddos attacks jobber

Filter

Mine tidligere søk
Filtrer etter:
Budsjett
til
til
til
Skriv
Ferdigheter
Språk
    Jobbstatus
    2,000 cisco asa 5505 stopping ddos attacks jobber funnet, priser i USD

    After nuberous hacker attacks on our joomla site we want to redesign the frontend website by someone that makes state of the art design, and know how to make it secure. The site is about 20 information pages, with a contact form/ uploader on each page, a contact page and we will want a solution to change information on each page from a admin. The project is in a HURRY and wish to use a coder that have time to focus on this project

    $1001 (Avg Bid)
    $1001 Snitt bud
    20 bud

    ...hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implementation of secure communication protocols, such as HTTPS, to protect sensitive data during transit. It also highlights the need for transaction validation and auditin...

    $351 (Avg Bid)
    $351 Snitt bud
    11 bud

    ...experience with Cisco Packet Tracer, specifically in implementing complex network security measures such as network routing, VLAN configuration, firewall setup, VPN, assigning IP addresses and implementing network-based firewalls. The ability to successfully ping is crucial. The right candidate must also be well versed in the Open Shortest Path First (OSPF) for routing protocols. Your role will involve: - Designing and implementing complex network models - Configuring OSPF as the routing protocol - Assigning IP addresses across all devices - Installing and setting up firewalls to protect the network - Configuring VLANs to segment network traffic - Ensuring successful ping across all devices - Setting up VPN for secure remote access Solid knowledge and experience with OSPF and...

    $47 (Avg Bid)
    $47 Snitt bud
    7 bud
    Design Cartoon Character 6 dager left
    VERIFISERT

    ...recycling company 'Matt-Less' and would like a male character creating as the 'face' of our brand. The idea in our head is along the lines of Peter Perfect from the Wacky Races cartoon series, a dapper, good looking, smooth 'hunk', attractive to girls, chivalrous, charming, witty, immaculately presented and successful. He is a winner, a racecar driver, Peter had a crush on Penelope Pitstop, often stopping to help her; Sometimes Peter Perfect demonstrated an unusual elasticity ability, although this seemed to be just a gag. Despite numerous mechanical mishaps and other incidents, Peter always keeps a cheerful demeanor and lives up to his image as the perfect gentleman. He's been shown as being unnaturally strong and is able to lift boulders ...

    $112 (Avg Bid)
    $112 Snitt bud
    168 bud

    ... or "impedance aggregometry" or "whole blood aggregometry" and a similar system on the market is the Multiplate analyzer. Other a bit less similar devices are the PFA-200 and the Verifynow system. Background: Blood platelets are tiny cell fragments, which contribute to the blood coagulation system. When there is a bleeding, blood platelets stick together and create a aggregate that helps stopping the bleeding. You can find information on blood platelets here: • You can find fimilar existing instruments below:

    $430 (Avg Bid)
    Garantert
    $430
    145 bidrag

    ...crucial project, we aim to significantly improve the cybersecurity of data stored on the Google Cloud Platform (GCP), using cutting-edge artificial intelligence methods. Our main goals are as follows: - Use Machine Learning and Deep Learning to detect and mitigate any potential cyber threats before they occur. - Utilize AI to predict and intercept Unauthorized Access, Data Breaches, and Malware Attacks, thereby bolstering our defense mechanisms. The ideal candidate will be proficient in AI, specifically Machine Learning and Deep Learning, and have extensive knowledge of cybersecurity on clouds. Experience with GCP would be a valuable advantage. It's essential for the chosen freelancer to be adept at translating complex AI algorithms into practical cybersecurity solutions. ...

    $1187 (Avg Bid)
    $1187 Snitt bud
    46 bud

    ...is used on a pump body. The size of the motor is about 15cm × 15cm, which can achieve levitation and rotation. . Smooth operation of the rotor is crucial. We plan to mount a turbine rotor on the motor rotor so that it can rotate and pump liquid, just like a pump. We plan to add multiple sensors to the rotor to detect its position and height. Also, we want to be able to control the starting and stopping of the motor via an external button. These are the goals of our project....

    $174 (Avg Bid)
    $174 Snitt bud
    12 bud
    Cisco Switches (VLAN Mgmt) 5 dager left
    VERIFISERT

    Check existing config. Create VLANs, IDs and name tag based on the existing design. Configure and test Device. Then move onto the next VLAN and so on. Both Console and Web interface available. Trunk Ports required for new APs. Switches will include Stackable Sg350x. I also have a number of HP Procurves but not to worry if these are not possible.

    $87 (Avg Bid)
    $87 Snitt bud
    17 bud

    I'm looking for an experienced Python developer with knowledge in SAN switch health checks to write a script for automating my Cisco switch health checkup. The script will need to automate several tasks including: - Gathering output of overall switch health - Checking the conditions of each hardware status - send an automatic email via outlook I would like to see applicants demonstrate their experience in writing similar scripts, and especially in performing SAN switch health checks. Your familiarity with Python scripting and Cisco products will be vital for this project. Your application should reflect your past experience in the area. I am eager to see your detailed project proposals to assist in making an informed decision. Is this a task you can confidently deliver...

    $13 (Avg Bid)
    $13 Snitt bud
    4 bud
    Cisco Switch Tasks 5 dager left
    VERIFISERT

    Cisco SG350x Health check. Pull out an audit. Currently unplugged. Needs approval before we put it back online. Copy same config as the others on the same VLANs are working.

    $126 (Avg Bid)
    $126 Snitt bud
    12 bud

    Hi there, I’m just looking for someone to assist with configuring Mac Address Bypass (MAB) on our existing Cisco ISE server and Cisco 9200 switch today. If you have any experience setting it up and have ideas on best practises, plesse reach out, thanks

    $25 / hr (Avg Bid)
    $25 / hr Snitt bud
    13 bud
    Long-term v2x Security Research 4 dager left
    VERIFISERT

    ...within the v2x technology landscape. This position is for a 3-year period and will focus on the following areas: - Threat Detection: The primary objective is to identify and analyze potential threats to v2x systems. Specifically, I am concerned about Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. The ideal candidate should have: - A strong background in v2x security research, with a focus on threat detection. - Extensive knowledge and experience in Sybil attacks, Eavesdropping attacks, and Man-in-the-middle attacks. - Experience presenting and publishing research at conferences like USENIX and NDSS. - The ability to produce high-quality research papers and practical solutions. - Affiliation with a research institute to e...

    $1224 (Avg Bid)
    $1224 Snitt bud
    8 bud

    I require a skilled expert to install and configure CloudFlare on my IPTV server, with a focus on enabling the DDOS Protection feature. Requirements: - Expertise with handling and setting up CloudFlare, particularly in DDOS Protection - Proficiency in working with standalone Linux servers - Should have prior experience with IPTV server setups The successful completion of this project involves: - Correct installation of CloudFlare on Linux IPTV server - Proper configuration of CloudFlare’s DDOS Protection feature Please ensure that your bid includes your understanding and approach towards achieving these goals. Thank you very much.

    $125 (Avg Bid)
    $125 Snitt bud
    10 bud

    I need a proficient Cisco Packet Tracer developer to take on a threefold task. This includes the configuration of a network, troubleshooting any connectivity issues, and developing comprehensive network simulations. An additional requirement is to create an AD-hoc network where nodes should have the ability to sense each other. There are no strict stipulations outlined for the communication of these nodes. The ideal freelancer for this project should be competent in Cisco Packet Tracer and have an in-depth understanding of Network Configuration, Network Simulation, and Troubleshooting. The main goal for this project is educational use, teaching our team better understand how to use Cisco Packet Tracer effectively. Your tasks will provide a practical education tool for...

    $114 (Avg Bid)
    $114 Snitt bud
    19 bud

    I'm seeking a knowledgeable network architect with proficiency in Cisco packet tracer to design a comprehensive network architecture for our global enterprise. This project consists of five distinct networks that should be expertly interconnected. Each Global Enterprises office will have its own Local Area Network (LAN) designed to provide network connectivity for all devices within that location. These LANs will be interconnected to form a Wide Area Network Key Features you will implement: - Firewall Configuration - VLAN Setup - VPN Configuration - Routing Protocol Configuration - DHCP Server Integration - Intrusion Detection and Prevention Systems (IDS/IPS) For monitoring and management purposes, it is crucial that a successful ping request can be made. Furthermore, ...

    $23 (Avg Bid)
    $23 Snitt bud
    3 bud

    Hi, My name is Junior, i manage a small hotel in London and have recently set up a new website with wix - I hope i can get some assistance, We are a hotel and we use wix for our homepage for our website. We us book now buttons on our site to redirect guest to our booking eng...i have no idea if it is tracking correct the data, i also set up google tag manager to get the third cookies from the booking engine, but again i don't think its set up correctly. I need help to make sure everything is set up correctly so i can see the full customer journey and also in google analytics help to find out the data i need once everything is set up. Additionally i heard google are stopping third party cookies so once this stops how would i go about tracking the process.

    $10 / hr (Avg Bid)
    $10 / hr Snitt bud
    25 bud

    ...intermediate level phishing environment. The purpose is for security training, so the focus is on creating realistic simulations of phishing attacks. Key Requirements: - Simulating Email, Spear, and Direct Phishing Attacks: I aim to cover a wide range of scenarios to better prepare my team for potential threats. - Intermediate Level Difficulty: The environment should challenge my team without being too overwhelming, ensuring effective learning outcomes. Skills and Experience: - Prior experience in setting up phishing environments; specifically, experience in creating intermediate level simulations would be a plus. - In-depth knowledge of different types of phishing attacks and their characteristics. - Understanding of cybersecurity best practices and knowledge of ...

    $63 (Avg Bid)
    $63 Snitt bud
    5 bud

    We have a server of rohan some one using packets or ddos to crash ure server

    $181 (Avg Bid)
    Viktig
    $181 Snitt bud
    26 bud

    I'm seeking an expert familiar with Cisco Packet Tracer to create a simulated home network. What will set you apart: - Proficiency in network simulation using Cisco Packet Tracer - Experience in designing home networks Your primary task will be: - Simulating a home network environment Please note that devices to be included in the network have not been specified. Your expertise in home network design will be crucial to provide a robust simulation.

    $60 (Avg Bid)
    $60 Snitt bud
    3 bud

    I am seeking a competent Cisco ISE and Aruba Wireless Engineer to establish a dynamic VLAN on an Aruba wireless network that's connected to more than 50 access points. The ideal candidate should have: - Proficiency in setting up and troubleshooting Aruba wireless networks. - Expertise in Cisco Identity Services Engine (ISE) configuration Main tasks will be: - Dynamic VLAN setup on Aruba wireless network linked to a Cisco ISE server using cert based authentication. -DVlan should work for all types of devices like Windows,MAC,Linux - Configuring specific features on Cisco ISE, specifically BYOD Services and Adaptive Network Control (ANC) Services. Your ability to work efficiently with large-scale wireless networks is crucial for the success of this projec...

    $514 (Avg Bid)
    $514 Snitt bud
    16 bud

    I'm in search of an expert in Cisco Viptela SDWAN. We have a network that includes over 50 sites, and we're currently utilizing Cisco Viptela SDWAN. I'm looking for someone to assist with the following: - Setup and Configuration of Viptela SDWAN - Ongoing Maintenance services - Troubleshooting when necessary Ideal candidates should have prior experience working with Cisco Viptela SDWAN, particularly in large-scale settings. Your ability to ensure optimal performance and rapidly address any issues that arise will be key to successfully completing this project. Please detail your relevant experience and skills in your bid.

    $59 / hr (Avg Bid)
    $59 / hr Snitt bud
    8 bud

    ...communication tools like email and messaging apps enhances communication among individuals in the workplace and beyond. 3. **Time Saving:** Technology allows tasks to be accomplished more quickly, saving valuable time that can be used for other activities. **Challenges:** 1. **Cybersecurity Threats:** With increased reliance on technology, individuals and organizations are exposed to risks of cyber-attacks and data breaches. 2. **Social Isolation:** Overreliance on technology can lead to social isolation and a loss of genuine personal interaction. 3. **Work-Life Balance:** Increased access to technology may make it challenging to set boundaries between work and personal life, negatively impacting the balance between them. **Additional Challenges and Benefits:** 4. **Change...

    $15 / hr (Avg Bid)
    $15 / hr Snitt bud
    32 bud
    Cisco Packet Tracer Laboratorio 2 dager left
    VERIFISERT

    Laboratorio sobre cisco packet tracer simular una topologia

    $27 (Avg Bid)
    $27 Snitt bud
    16 bud
    Implement SPF & DKIM for Gmail 1 dag left
    VERIFISERT

    I'm in need of a skilled professional who can help me set up SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for my Gmail account. Key Tasks: - Set up SPF: I need you to authenticate my emails using SPF to prevent spoofing and phishing attacks. - Configure DKIM: Implementing DKIM will ensure that my emails are not tampered with in transit and that my domain is not being abused by spammers. Requirements: - Proficient in email authentication protocols. - Experience with DNS settings and domain authentication. - Familiarity with Gmail's email authentication systems. - Ability to explain the process clearly and concisely. Please provide a brief overview of your relevant experience in the field.

    $114 (Avg Bid)
    $114 Snitt bud
    32 bud

    ...future protection, ensuring my website remains secure and protected from potential threats. Key requirements: - Immediate automatic removal of existing malware: I need the malware on my site to be removed straightaway to ensure my site is clean and safe for visitors. - Firewall protection: I am specifically looking to implement a strong firewall to prevent any future malware infiltrations or attacks on my WordPress site. It's important for me to find a freelancer who has a proven track record in dealing with malware removal on WordPress sites and can effectively set up and manage a reliable firewall system. Your expertise and experience in website security will be highly valued in this project. Please quote the reference "WPMalware" when applying for this projec...

    $40 (Avg Bid)
    $40 Snitt bud
    78 bud

    ...configuring a Cisco Meraki VMX (Medium) on AWS and deploying a Windows Server instance. The project includes configuring network parameters and migrating our Active Directory to the cloud. Project Objectives: Cisco Meraki VMX Setup: Deploy and configure a Cisco Meraki VMX (Medium) on AWS. Establish a Site-to-Site VPN to connect back to our main network. Configure the IP range for the network devices to be Windows Server Configuration: Setup one instance of Windows Server on AWS. Assist in the migration of our Active Directory from on-premises to this cloud-based Windows Server. Ensure the primary Active Directory (AD) is now hosted on the cloud while maintaining the on-premises AD servers online for contingency purposes. Deliverables: Fully configured and operat...

    $477 (Avg Bid)
    $477 Snitt bud
    21 bud

    We are an e-commerce company with a WooCommerce store. We are looking for an experienced freelancer with expertise in WooCommerce and internet security to analyze our store and protect it from attacks. **Liabilities:** - Analysis of current WooCommerce store security. - Proposals and implementation of improvements to increase security. - Installation and configuration of security plugins. - Provide training to staff for optimal use of security tools. **Requirements:** - Experience in the field of e-commerce and specifically WooCommerce. - Expertise in network and web security. - Ability to easily communicate with our staff and provide training and support. - Ability to provide evidence-based suggestions and solutions. If you believe you have the necessary experience and skills fo...

    $68 (Avg Bid)
    $68 Snitt bud
    67 bud

    Apps icon hide fetures need for all andriod version My apps third party apps and sms allow permission Need required for all andriod version my apps icon hide after close any devloper for andriod studio my apps icon hide fetures need Koi mere apps ko hide kr skta h sb andriod mobiles m apps install k baad used krne k b...permission Need required for all andriod version my apps icon hide after close any devloper for andriod studio my apps icon hide fetures need Koi mere apps ko hide kr skta h sb andriod mobiles m apps install k baad used krne k baad mera apps close kre tb apps ka icon hide ho jae mobile se ye fetures chaye muje mere apps m third party apps h usme ek permission lgi hui h sms allow ki only bs apko asa code lgna h usme apps ka icon hide ho jae close kre tb apps ko...

    $13 (Avg Bid)
    $13 Snitt bud
    4 bud
    NFC BRIDGE Avsluttet left

    necesito un puente entre lector y emulador, el lector debe ser apk para android y el emulador puede ser para windows aqui un ejemplo:

    $185 (Avg Bid)
    $185 Snitt bud
    10 bud

    WARNING: If you have low or no experience with OpenGL, DO NOT apply. If you have low or no experience with C++, DO NOT apply. What is the target platform for your game development project? Windows & Linux What t...esc again to hide mouse/menu. 7. Ability to shoot & show ammo ui to show how many bullets you have left. 8. Ability to reload (no animation, just lower the gun and then raise the gun after 2 seconds). 9. Bullet collisions when you shoot at a wall (just use a grey square for this). 10. Friction so that when the player releases a movement key, it will slowly grind to a halt instead of instantly stopping. Notes: 1. Clean code - messy/poorly organised code will be rejected. 2. Must use CMake. 3. Delivey method is github. 4. Must be able to build and run on windows....

    $191 (Avg Bid)
    $191 Snitt bud
    15 bud

    I'm seeking a Cisco developer who can assist me in configuring my existing network, specifically focusing on my routers and switches. Key Requirements: - Proficient in configuring Cisco routers and switches - Experience with network troubleshooting and optimization - Ability to comprehend existing network setup and make targeted improvements - Familiarity with best practices for network security and performance Please note that I am not looking to purchase new devices. The job primarily involves enhancing the functionality and security of my current setup. Ideal candidates would have certifications like CCNA, CCNP, or equivalent experience that demonstrates their expertise in Cisco network configuration. In your bid, please include specific examples of simila...

    $42 (Avg Bid)
    $42 Snitt bud
    2 bud

    I'm seeking a professional PHP developer to create a custom CMS that not o...allow clients to customize meta tags, including title tags, meta descriptions, and keywords for each page. - XML Sitemap Generation: The CMS should automatically generate and update an XML sitemap, making it easier for search engines to crawl and index the site. Security Features: - Vulnerability Protection: Ensure the CMS is robust against common web vulnerabilities like SQL injection and XSS attacks. Skills and Experience: - Strong PHP and CMS development background. - Proficiency in implementing SEO best practices. - Experience in web security and vulnerability protection. - Excellent communication skills and ability to understand and incorporate client requirements effectively. Budget is not mo...

    $530 (Avg Bid)
    $530 Snitt bud
    60 bud

    ...common hacker tactics, with a touch of humor showcasing the attacker's frustration. Target Audience: The book is aimed at Cybersecurity & IT professionals, business leaders, and students studying in technical & business fields]. The cover should appeal to this audience without overly childish visuals. Concept: Frustrated Hacker vs. Robust Security I will provide the image/s to be used. Foiled Attacks: Depict common threats being repelled: A phishing email bouncing off a shield marked "MFA" A malicious bug labeled "Malware" squashed by a "Software Update" patch Other clever visualizations of vulnerabilities failing to be exploited... Background: Simple, perhaps a subtle tech-inspired pattern to avoid distraction Title/Tagline: Space ...

    $28 (Avg Bid)
    $28 Snitt bud
    80 bud

    ...and trends. Key Skills and Experience: - Proficient in PHP/SQL: You should have proven experience in PHP and SQL to create a robust, secure and user-friendly script. - Review System Development: A good understanding of how review capturing and redirection works will be crucial. - Web Security: An understanding of web security practices as the script will need to be robust against potential attacks....

    $110 (Avg Bid)
    $110 Snitt bud
    41 bud

    Cyber warfare allows a state to conduct foreign policy in a more ethical way than traditional war.

    $54 (Avg Bid)
    $54 Snitt bud
    20 bud

    ...infrastructures. Expertise in network protocols and technologies, including TCP/IP, VLANs, OSPF, BGP, MPLS, VPNs, and DNS. Hands-on experience with network hardware from leading vendors such as Cisco, Juniper, Palo Alto Networks, and Arista. Strong understanding of network security principles, including access control, encryption, authentication, and security policies. Certifications such as Cisco Certified Internetwork Expert (CCIE), CompTIA Network+, or Certified Information Systems Security Professional (CISSP) are preferred. Proficiency in network monitoring and management tools, such as SolarWinds, Nagios, or Cisco Prime. Excellent analytical, problem-solving, and decision-making skills with a proactive approach to identifying and resolving technical challenges...

    $668 (Avg Bid)
    $668 Snitt bud
    11 bud

    ...comprehensive documentation of Veeam configurations, procedures, and best practices. Share knowledge with team members through training sessions, technical presentations, and knowledge base articles to foster skill development and operational excellence. Security and Compliance: Implement security best practices to safeguard backup data against unauthorized access, data breaches, and ransomware attacks. Ensure compliance with relevant regulatory requirements and industry standards. Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent work experience). Extensive experience (X years) working with Veeam Backup and Replication solutions in enterprise environments. Proficiency in designing, implementing, and managing V...

    $299 (Avg Bid)
    $299 Snitt bud
    4 bud

    ...interest in "Side channel" detection. Skills and Experience: - Solid Python programming ability -Familiarity with collecting micro architectural traces - Familiarity with cybersecurity concepts - Experience in creating machine learning algorithms for detecting malware - Comprehensive knowledge in dealing with Side Channel attacks. Ideal candidates must have: - Proven experience in Python programming - Prior work in malware detection, particularly Side Channel attacks - A solid understanding of the different types of malware - The ability to work efficiently and deliver results in a timely manner. The goal is to create an efficient model that can detect various types of malware, with a particular interest in Side channel detection. The ideal candidate shoul...

    $1031 (Avg Bid)
    $1031 Snitt bud
    24 bud
    Game Concept Art Avsluttet left

    Is a sunny day, on a plateau, in the clouds a burning plane crashes and goes beyond the screen, the shot drops in altitude and stops on the...and behind them we glimpse some civilians running away. We continue and arrive at the edge of the dam, we jump down and land in a stream with water at mid-waist that runs through a dark forest. This time the main character has to continue towards the right, for the first few seconds he is slowed down by the water but shortly after he comes out of it, we meet some wild boars and a bear who attacks us while the wild boars run away... after a short while the forest ends, we find ourselves at the open to the sun in the middle of the fields, we don't even have time to get used to it before after a few moments of being outdoors and con...

    $32 (Avg Bid)
    $32 Snitt bud
    1 bud

    I need a skilled Cisco developer to assist in updating IP addresses within a pkt file for a network. Key Requirements: - Update IP addresses: The main task involves updating the IP addresses in the network topology. - Documentation: A detailed step-by-step report of the changes made is needed. Additional Information: - The changes should be documented in a clear and concise manner, with easy-to-follow instructions. - Future IP address updates should be included in the documentation, but only for basic changes. Ideal Skills and Experience: - Previous experience in working with Cisco packet tracer files is a must. - Strong understanding of network configurations. - Ability to create clear and detailed technical reports. - Familiarity with Cisco devices and systems.

    $19 (Avg Bid)
    $19 Snitt bud
    4 bud

    It's unfortunate we've...malware attack on our WordPress website. We believe it's due to code injections, though we can't rule out other possibilities. As a result, we're looking to onboard a professional with relevant experience in swiftly identifying and effectively resolving such issues. Skills & Experience: - Proven experience in dealing with WordPress malware attacks - Proficient in identifying and resolving code injections - Strong security strategy for preventing future attacks Your application should demonstrate your previous experience in handling similar situations. Evidence of your ability to work quickly and effectively is crucial to this emergency! Let's secure our website and prevent this from happening again. Your expertise...

    $419 (Avg Bid)
    $419 Snitt bud
    153 bud

    I'm looking for an ethical hacker to test and secure my web application, focusing on specific vulnerabilities and conduct a thorough background verification. - Web Application Security: - Focus on existing vulnerabilities - Emphasis on Injection attacks, XSS, and other potential weaknesses - Particularly interested in vulnerabilities related to social media integrations - Background Verification: - Criminal records checks - Education and credential verification - Character check Ideal Skills: - Proficient in ethical hacking - Strong experience in web application security - Knowledge of common web vulnerabilities - Competency in conducting background checks - Attention to detail and thoroughness in their work. Please bid if you have the necessary skills and exper...

    $103 (Avg Bid)
    $103 Snitt bud
    8 bud

    ...against future incidents(will release milestone after 10 days), and I won't buy sitelock or sucuri these kind of service, but I will like long term serivce. Key tasks include: - Identify and remove malware: Addressing the specific malware identified - Website restoration: Ensuring the site is fully functional post-malware removal - Warranty: Offer a guarantee/warranty against further malware attacks Ideal freelancers should have: - Proven experience in WordPress website security and malware removal - Experience in working with E-commerce websites - Ability to provide a warranty for future protection - Strong communication skills, as I prefer instant messaging for updates and progress tracking. Overall, I am looking for a reliable and efficient developer who can ensure th...

    $26 (Avg Bid)
    $26 Snitt bud
    74 bud

    I need an expert to integrate CISCO Unified Communications Manager with Bitrix24 through APIs. The aim is to allow seamless call logging, mapping each logged call with its duration and timestamp in Bitrix24. Key tasks include: - Developing a secure link between CISCO Unified Communications Manager and Bitrix24. - Enabling the automatic logging of calls from CISCO to Bitrix24. - Attaching duration and timestamp for each logged call. - Testing and troubleshoot the system to ensure a seamless operation. Ideal freelancer should have: - Proven experience in API integrations. - Deep understanding of CISCO Unified Communications Manager and Bitrix24 platforms. - Good troubleshooting skills. Your role will not just involve execution, I'd also need your inputs ...

    $399 (Avg Bid)
    $399 Snitt bud
    3 bud

    I'm seeking an experienced Cisco GNS3 trainer, fluent in Arabic, for remote instruction. Generous knowledge in the following areas is a must: - Network fundamentals - Routing and switching - Security and firewalls - Wifi and VOIP When applying, please detail your direct experience with these topics and any successful training sessions that you've undertaken in the past. Proficiency in other languages is welcome but not a necessity. The training will be conducted remotely, so reliable internet and suitable hardware is a must. I look forward to working with you.

    $10 / hr (Avg Bid)
    $10 / hr Snitt bud
    7 bud

    I'm looking for a skilled and experienced Cisco Packet Networking Professional to help me with a network design of a topology using Cisco Packet Tracer. Key Responsibilities: - Network Design and Implementation: You will be responsible for designing and implementing a network topology using Cisco Packet Tracer. The topology should not be too complex but should align with my requirements. Ideal Skills and Experience: - Proven experience in network design - Expertise in using Cisco Packet Tracer - Good understanding of network troubleshooting Your goal will be to release a network topology that is not that complicated but meets my requirements. using OSPF

    $24 (Avg Bid)
    $24 Snitt bud
    9 bud

    My joomla website is stopping working, i think is only config file but cannot find the way to let it work.

    $29 (Avg Bid)
    $29 Snitt bud
    39 bud

    ...Provide first level contact and problem resolution for customer issues. · Work with Third Party Vendors to remediate complex AV issues as needed. · Provide timely communication on issue status and resolution. · Maintain ticket updates for all reported incidents. · Install, upgrade, support and troubleshoot Windows 11, Windows 10 and Microsoft Office 2019, 2021 and 365, Cisco Jabber, another authorized desktop application. · Should have basic knowledge of Mac operating system, to support Apple pc users. · Install, upgrade, support and troubleshoot for printers, computer hardware. · Performs general preventative maintenance tasks on computers, laptops, printers. · Perform...

    $14 / hr (Avg Bid)
    $14 / hr Snitt bud
    11 bud

    Seeking a Cisco Packet Tracer professional with comprehensive skills in network design, configuration setup, and troubleshooting. Key Responsibilities: - Create a network design in Cisco Packet Tracer that incorporates more than 20 devices. - This should be based on the star topology. - Proper configuration setup should be ensured for each device involved. - Identify and fix potential network issues that may arise. Ideal Skills Set: - Proficient in network design - Advanced knowledge in configuration setup - Exceptional troubleshooting abilities - Well versed with different network topologies, specifically star topology. This job requires an experienced professional who has adept knowledge in Cisco Packet Tracer and can deliver effective solutions for a complex sy...

    $26 (Avg Bid)
    $26 Snitt bud
    12 bud