Computer security is an important topic in the world of computers. If you are good in enhancing computer security and related devices, you should use your skills to earn money by bidding on jobs posted on Freelancer.com.
Computer Security can also be called IT or Cyber security. It refers to information security applied to computers, related devices and networks. This is a wide field, covering all mechanisms and processes used in protecting computers and related devices from attacks and unauthorized accesses. Computer Security also protects computer data from loss due to unexpected circumstances or natural disasters.
There are many computer users in need of Computer Security solutions. All over the world, there is a great need for professionals in this sector. If you are an expert in matters involving computer security, then you should use your skills to increase your income. This will be easy when you are part of Freelancer.com, the leading freelance online site where many employers post jobs on a daily basis. You can start earning money today by simply creating an account on Freelancer.com and bidding on many computer security related jobs available on the site.Ansett Computer Security Consultants
We require additional resources in building out Google Slides for our Academic Academy. We will pay per hour. Requirements Include: -can write good English, does not need to use Google Translate -know how to format Google Slides by using our template, such as branding, fonts, pictures, bullet points, charts with good taste. We have a full template to use from -Grammar and sentence structuring must be excellent. -can look at labs and add notes to Google Slides -can do some research based on the topics -can take word transcripts and put them into already created google slides -many other small but long task to do -IT inclined, can speak the technical jargon, identifying gaps in the steps of labs. Capable of learning. -on time everyday m-f 9:00am-5:30cst. Overtime is permitted with higher pa...
Job Description: Key Responsibilities: • Performing risk assessment for business applications, business processes, and specific scenarios (when outsourcing is considered, for critical changes, prior to projects, and when considering a new product or technology) following our Information Security Risk Management Methodology. • Participate in Security Assessments/Compliance of infrastructure, systems and applications, changes and provide required advise from risk perspectives • Work on improvements for provided security services, including the continuous enhancement of existing risk practice and methodology material. • Work on measuring the effectiveness of Risk KPI/KRI and work to improve it on regular basis. Experience / Competency: • Prior experience in conduct...
Hello, We use trend micro cloud one work load security essentials in AWS Infrastructure which has only anti malware prevention with limited features. Currently we are planning to upgrade to an enterprise edition of TrendMicro Cloud Workload Security Enterprise xdr . Before upgrade we want to analyze other products available in market. Example we would like to compare crowd strike xdr Vs cloudstrike Vs sentinelone xdr other products and identify the one that suits our project We have an AWS infrastructure with 100+ servers on EC2 ,and cloud SAS applications used by 100+ customers that needs high security. I need a presentation, ppt with different product s,features,ProsCons,Price comparison chart ,,details analsys of the product along with business justification The person doing t...
Hello, we have an application that requires a third- party security assessment from a Google approved OAuth Verification Security Assessor. If you are not Google approved, please do not bid on this project. I will ask for proof that you are Google approved. It is a web application that uses multiple APIs. Among the APIs is Google's which will not approve it without this assessment. We will need to know the cost of your assessment along with the delivery time. Thank you.
Need a some with one with good network knowledge . i have a load balancer tp link ER 650 . i have 2 ISP's one is dynamic and the other is static. i was able to connect dynamic IP to load balancer and internet works ok but when it comes to static IP isp , it does not connect using load balancer but it works on wifi router.
1computer start on time 2computer shutdown on time all pc in network shutdown on time restart on time. 3and make groups some pc on and some pc should not 4where ram using more 5diagnois which application making pc slow 6why pc slow 7pc fast run tips 8pc keys for windows10
I need someone to learn a Cisco packet tracer subject: Basic Network Connectivity and Communications ExamExternal tool Ethernet Concepts ExamExternal tool Communicating Between Networks ExamExternal tool IP Addressing ExamExternal tool Network Application Communications ExamExternal tool Building and Securing a Small Network ExamExternal tool Tool: Cisco Packet tracer 12:00 PM Thursday, August 18, 2022 Greenwich Mean Time (GMT) in netacad website
I manage a company with several computers, I do this through remote access. Some of the machines on this network have a security program that kill a remote connection. Remembering that it is not an anti virus, it is a security program. I need a script or .exe that cleanly and simply kills this security service (it runs as a driver) in Windows and then reopens the remote access software.
I will need to set up an interview on Microsoft teams or a call. I have to record the interview for proof, only my teacher will see it. If you are still unsure about the recording part, I can censor or cut your face out. I only need to ask some questions about your job/knowledge of being a computer systems analyst. Best I can pay is ten usd. I'm still a freshman I don't have much money.
Hello I am looking to hire someone to recover a deleted facebook marketplace listing I responded to the listing on September 7th 2021 at 4:26 pm. I need a screenshot of the original listing It has been deleted by the original poster and I need to get a copy of it and the text that was written below it. If you can do the job type I am ready now
We need a freelancer that can handle any cloud data migration, automation of files backup on local servers, suggest any laptops, coordinate with vendors on supplying laptops to us, and do recurring maintenance of our laptops, anti virus, firewall, setting up user emails and accounts, manage domains etc. and any other IT initiatives.
I seek an experienced network engineer with teaching experience of CCNA and CCNP to teach a beginner . In essence I am looking for a talented network engineer who has the ability to teach CCNA and CCNP courses including the theory and practical labs . You must be a fluent English speaker with excellent communications. This training will have to be conducted on MS Teams or Skype evenings and weekends UK time. If you have the qualities I am looking for and can meet the challenge get in touch.
Letter to judge re my son Ssmmy. Fusgnosed at 16 with Scizophrenia. He also has SUD. Been to 28 mental hospitals in 6+ years. Now 22 yrs old. Adult/Child is his label "per se" Never got proper adequare care. Sent to same ole places over and over. Developed behavioural problem. Worse than he has ever been. Dummied up drugs. Patients Right, Human Rughts, Cuvil Rights violated. Never coupled eiyh me to tslk about childhood truama. Dad abanded him at 14 years old. No famiky support or early intervention. Conrvstorshipd thst went awry. Sent macimum security stste hospital and is not a criminal. Want him yo b conserved again. Hospital staff ignored and blstsntly dissed my PAD - Psychologicsl Advanced Directive - which is legally binding names me as his agent should h...
Hello, All, I am looking for SKYBOX (Security Product) demo lab copy to use in my home license, kindly suggest If you have one, I can buy from you , if you don't have then do not bid on project. More info about the product:
Hi, We're looking to implement password management solution (i.e. LastPass, Bitwarden, etc), I'm looking an expert for guidance in picking the right solution and implementation. ONLY APPLY IF YOU HAVE PRIOR EXPERIENCE IN PASSWORD MANAGERS.
its Cisco lab network (given in A1/A2) to meet with new security requirements and recent changes in network technology. According to the new security requirements, access to the lab network routers must be now managed through a centralised server located in the HQ. The access must also be allowed only from the management network.
We are looking for Cyber security Experts or Architect for Security implementation for an Entity . Person must have exp in more than 8 yrs , must be design and implemented end to end at least one entity or Data center. Good in documentation and design . Person as single consultant or more than one consultant or from any Company .
I want to protect one page from ddos attacks i' getting alot of ddos attacks i lose traffic revenue , the page i want to be protected with ngnix cloudflare anything that can be done to dont get ddos attacks , the page is for irc chat , the name of the aplication is qwebirc i'm using centos 7 example of the page i wanted to do I lost revenue money from ads because of this ddos attacks my google ranking is down from 500 people only 50 left i need to install qwebirc on one page but with ddos protection, cloudflare or anything that helps . I need only someone who knows about qwebirc , instalation and ddos protection with cloudflare . To specify installing Qwebirc with ssl and cloudflare
I am looking for someone who can fix the following vulnerabilities in a simple Document Management Software on Java based open source D Space Version 6.0 1. Stored XSS - Cross-site scripting (also known as XSS) is a web security vulnerability which occurs when a malicious script is injected directly into a vulnerable web application cause of input validation. 2. Reflected XSS -- Reflected XSS is one of the part of Cross-Site-Scripting attacks and termed as “Non-Persistence XSS” or “Type II”. 3 Rate Limiting- number of wrong login attempts to be limited to 3 & then 15 mins wait 4. CSRF- cross site request forgery- The most effective way to protect against CSRF vulnerabilities requests an additional token that is not transmitted in a cook in ...