Location: Budapest, Hungary
Member since: April 2012
Axa Insurance Company
As a security consultant I was responsible for implementing and managing the information security system of AXA. I have interviewed various heads of departments to determine the company's specific needs. I was also responsible for implementation and maintenance. Periodic server maintenance and research on increasing data security was also part of the my daily job.
Eötvös Loránd Tudományegyetem
Certified Information Systems Auditors (CISAs) are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.
Licensed Ethical Hacker
KRT Academy offers an accredited, 2-term ethical hacker course. As part of this course, students learn from first-hand sources, starting with the basics, the latest hacker technologies and the vulnerabilities threatening IT systems, and become adept at the skills needed for the practical application of this knowledge. With the know-how and approach they have acquired, the IT, security, and operational experts will be able:<br /><br />- to assess the security risks that threaten the company and the company's IT system;<br />- to develop, with knowledge of the vulnerabilities that have been identified, solution packages and measures through which the threats to the enterprise management system can be effectively mitigated.<br />- Participants on the course will acquire substantial theoretical knowledge and practical skills in the following areas:<br /><br />- Black, Grey and White Box hacking<br />- Internet, WAN, LAN, WIFI, GPRS network attacks<br />- Legal parameters of hacker projects<br />- Customer care and project management in sensitive security situations<br />- Social engineering
The Chief Information Security Officer Certification (CISO) program is the first of its kind that recognizes an individual's accumulated skills in developing and executing an information security management strategy in alignment with organizational goals.<br /><br />CISO equips information security leaders with tools to protect against security breaches by actively improving the current information technology security solutions, enforcing regulatory requirements and aligning IS with the strategic needs and goals of their business. This skill set enables the CISO to be the best guardian of their organization's digital assets.
Certified Secure Software Lifecycle Professional<br />CSSLP is the only certification in the industry designed to validate an individual's competency in incorporating security into each phase of the software lifecycle - that will help mitigate these threats.
CISSP is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. The vast breadth of knowledge and the experience it takes to pass the exam is what sets the CISSP apart. The credential demonstrates a globally recognized standard of competence provided by the (ISC) CBK which covers critical topics in security today, including cloud computing, mobile security, application development security, risk management and more.