Image de profil de wiseadmin
@wiseadmin
Membre depuis le 29 janvier 2006
1 Recommendations

wiseadmin

En ligne Hors ligne
- Advanced knowledge of the TCP/IP protocol stack - Advanced knowledge of the Linux Operating System (RHEL in Enterprise Environments) - Linux Kernel Tuning - Server installations in Enterprise Environments based on the Linux OS: LAMP (Linux + Apache + MySql + Php/Perl/Python), DNS/BIND, DHCP, Sendmail + SASL + SMTP AUTH + MILTERs, POP3, IMAP, WebMail, FTP, Antivirus and AntiSpam ( ClamAV, SpamAssassin ), Proxy and Cache Server (Squid), CIFS / Samba, CVS, VPNs, SSH - QoS and Traffic Shaping using Linux (qdisc, tc, tcng, CBQ, HTB) - Tape backup system using AMANDA - Configuration and maintaining - Design, planning, implementation, operation and troubleshooting of LAN (Ethernet) and WAN Solutions, VLANs and Trunking Protocols, Routing Protocols (RIP, EIGRP, OSPF), Administration of CISCO Routers, Switches, Access Points and Wireless Bridges (Cisco CCNA and Cisco WLANFE Certified) - Design, planning, implementation, operation and troubleshooting of Wireless LAN Networks (IEEE 802.11 a/b/g) – (Cisco WLANFE Certified) - MS Windows network environment - Techniques used to secure/ harden a Linux Server’s operating system and applications running on the server, Mandatory Access Control (SELinux, LIDS, grsecurity) - Firewall configuration and audit (IPTABLES) - Configuration, maintaining and tuning of Intrusion Detection Systems (network and host based) - SNORT + BASE - Penetration Testing and auditing - Nessus - Filesystem Integrity Tools - Tripwire, AIDE - Fundamentals of cryptography and encryption algorithms (private and public key algorithms, hash algorithms, SSL/TLS, PKI), X.509 digital certificates standard, VPN Technologies, SSH, Tunnelling - Disk and FileSystem Encryption (dm-crypt + luks, loop-aes) - Techniques used to secure/ harden a Linux Server’s operating system and applications running on the server, Mandatory Access Control (SELinux, LIDS, grsecurity) - Firewall configuration and audit (IPTABLES) - Configuration, maintaining and tuning of Intrusion Detection Systems (network and host based) - SNORT + BASE - Penetration Testing and auditing - Nessus - Filesystem Integrity Tools - Tripwire, AIDE - Fundamentals of cryptography and encryption algorithms (private and public key algorithms, hash algorithms, SSL/TLS, PKI), X.509 digital certificates standard, VPN Technologies, SSH, Tunnelling - Disk and FileSystem Encryption (dm-crypt + luks, loop-aes) - SSL VPN configuration and audit - OpenVPN - Fundamentals of Forensic Techniques (TSK, TCT) - Wireless Security (802.11i, PEAP, WPA, TKIP) - Database Security - C/C++, Java, Bash Scripting, PHP, SQL, HTML
$20 $ US / h
12 commentaires
3.7
  • 100%Travaux complétés
  • 100%Selon le budget
  • 100%Dans les temps
  • 33%Taux de Réembauche

Portfolio

Avis récents

Vérifications

  • Connecté à Facebook
  • Freelance Préféré
  • Paiement vérifié
  • Téléphone Vérifié
  • Identité Vérifiée
  • E-mail vérifié

Mes meilleures compétences

Voir des freelances similaires