SlideShare a Scribd company logo
1 of 1
QUALYSCERTIFIED
SPECIALIST
Has successfully completed the following course and passed the certification exam.
Qualys, Inc. 1600 Bridge Parkway, Redwood City, CA 94065 www.qualys.com
Course:
Date Completed:
Course Hours:
Qualys certified specialists can deploy, operate and monitor the
Qualys Security and Compliance Suite to implement, manage and
protect their IT systems and web applications.
Giacomo Cocozziello
NSR datasecurity
Qualys Vulnerability Management
Detection & Response - QSC 2020
11/23/2020
4.25

More Related Content

What's hot

What's hot (12)

Policy compliance
Policy compliancePolicy compliance
Policy compliance
 
File integrity monitoring
File integrity monitoringFile integrity monitoring
File integrity monitoring
 
Api Fundamentals
Api FundamentalsApi Fundamentals
Api Fundamentals
 
Qualys Certificate Vulnerability Management
Qualys Certificate Vulnerability Management Qualys Certificate Vulnerability Management
Qualys Certificate Vulnerability Management
 
Qualys web-app-scanning Certificate
Qualys web-app-scanning CertificateQualys web-app-scanning Certificate
Qualys web-app-scanning Certificate
 
Qualys Certification
Qualys Certification Qualys Certification
Qualys Certification
 
Coursecompletion (1)
Coursecompletion (1)Coursecompletion (1)
Coursecompletion (1)
 
Coursecompletion
CoursecompletionCoursecompletion
Coursecompletion
 
VCA_CLOUD
VCA_CLOUDVCA_CLOUD
VCA_CLOUD
 
VCA-DCV_eCertificate
VCA-DCV_eCertificateVCA-DCV_eCertificate
VCA-DCV_eCertificate
 
MTA Cert
MTA CertMTA Cert
MTA Cert
 
Jaco Aucamp Certified Usability Analyst
Jaco Aucamp Certified Usability AnalystJaco Aucamp Certified Usability Analyst
Jaco Aucamp Certified Usability Analyst
 

More from GiacomoCocozziello

Certificate CRTE (certified Red Team Expert).pdf
Certificate CRTE (certified Red Team Expert).pdfCertificate CRTE (certified Red Team Expert).pdf
Certificate CRTE (certified Red Team Expert).pdfGiacomoCocozziello
 
Effective classification of android malware families through dynamic features...
Effective classification of android malware families through dynamic features...Effective classification of android malware families through dynamic features...
Effective classification of android malware families through dynamic features...GiacomoCocozziello
 
ICS/SCADA Cyber Security Certificate.pdf
ICS/SCADA Cyber Security Certificate.pdfICS/SCADA Cyber Security Certificate.pdf
ICS/SCADA Cyber Security Certificate.pdfGiacomoCocozziello
 
Web Application Penetration Tester Extreme
Web Application Penetration Tester ExtremeWeb Application Penetration Tester Extreme
Web Application Penetration Tester ExtremeGiacomoCocozziello
 
Purple Teaming Fundamentals Cocozziello Giacomo.pdf
Purple Teaming Fundamentals Cocozziello Giacomo.pdfPurple Teaming Fundamentals Cocozziello Giacomo.pdf
Purple Teaming Fundamentals Cocozziello Giacomo.pdfGiacomoCocozziello
 
Practical Industrial Control System Penetration Testing
Practical Industrial Control System Penetration TestingPractical Industrial Control System Penetration Testing
Practical Industrial Control System Penetration TestingGiacomoCocozziello
 
CyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdfCyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdfGiacomoCocozziello
 
eLearning Junior Penetration Testing
eLearning Junior Penetration TestingeLearning Junior Penetration Testing
eLearning Junior Penetration TestingGiacomoCocozziello
 
Nozomi Networks Certified Engineer
Nozomi Networks Certified EngineerNozomi Networks Certified Engineer
Nozomi Networks Certified EngineerGiacomoCocozziello
 
Mitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligenceMitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligenceGiacomoCocozziello
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationGiacomoCocozziello
 
NSE 2 Network Security Associate
NSE 2 Network Security Associate NSE 2 Network Security Associate
NSE 2 Network Security Associate GiacomoCocozziello
 
NSE 1 Network Security Associate
NSE 1 Network Security Associate NSE 1 Network Security Associate
NSE 1 Network Security Associate GiacomoCocozziello
 

More from GiacomoCocozziello (20)

Certificate CRTE (certified Red Team Expert).pdf
Certificate CRTE (certified Red Team Expert).pdfCertificate CRTE (certified Red Team Expert).pdf
Certificate CRTE (certified Red Team Expert).pdf
 
Effective classification of android malware families through dynamic features...
Effective classification of android malware families through dynamic features...Effective classification of android malware families through dynamic features...
Effective classification of android malware families through dynamic features...
 
ICS/SCADA Cyber Security Certificate.pdf
ICS/SCADA Cyber Security Certificate.pdfICS/SCADA Cyber Security Certificate.pdf
ICS/SCADA Cyber Security Certificate.pdf
 
Web Application Penetration Tester Extreme
Web Application Penetration Tester ExtremeWeb Application Penetration Tester Extreme
Web Application Penetration Tester Extreme
 
Purple Teaming Fundamentals Cocozziello Giacomo.pdf
Purple Teaming Fundamentals Cocozziello Giacomo.pdfPurple Teaming Fundamentals Cocozziello Giacomo.pdf
Purple Teaming Fundamentals Cocozziello Giacomo.pdf
 
Secure_Wireless_LAN
Secure_Wireless_LANSecure_Wireless_LAN
Secure_Wireless_LAN
 
OWASP API SECURITY TOP 10.pdf
OWASP API SECURITY TOP 10.pdfOWASP API SECURITY TOP 10.pdf
OWASP API SECURITY TOP 10.pdf
 
Practical Industrial Control System Penetration Testing
Practical Industrial Control System Penetration TestingPractical Industrial Control System Penetration Testing
Practical Industrial Control System Penetration Testing
 
Network Simulation
Network SimulationNetwork Simulation
Network Simulation
 
CyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdfCyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdf
 
Certificate FortiDeceptor.pdf
Certificate FortiDeceptor.pdfCertificate FortiDeceptor.pdf
Certificate FortiDeceptor.pdf
 
Qualys API
Qualys APIQualys API
Qualys API
 
Qualys Patch Management
Qualys Patch ManagementQualys Patch Management
Qualys Patch Management
 
eLearning Junior Penetration Testing
eLearning Junior Penetration TestingeLearning Junior Penetration Testing
eLearning Junior Penetration Testing
 
Cyber Threat Hunting Level 1
Cyber Threat Hunting Level 1Cyber Threat Hunting Level 1
Cyber Threat Hunting Level 1
 
Nozomi Networks Certified Engineer
Nozomi Networks Certified EngineerNozomi Networks Certified Engineer
Nozomi Networks Certified Engineer
 
Mitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligenceMitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligence
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical Certification
 
NSE 2 Network Security Associate
NSE 2 Network Security Associate NSE 2 Network Security Associate
NSE 2 Network Security Associate
 
NSE 1 Network Security Associate
NSE 1 Network Security Associate NSE 1 Network Security Associate
NSE 1 Network Security Associate
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Vulnerability Management Detection & Response

  • 1. QUALYSCERTIFIED SPECIALIST Has successfully completed the following course and passed the certification exam. Qualys, Inc. 1600 Bridge Parkway, Redwood City, CA 94065 www.qualys.com Course: Date Completed: Course Hours: Qualys certified specialists can deploy, operate and monitor the Qualys Security and Compliance Suite to implement, manage and protect their IT systems and web applications. Giacomo Cocozziello NSR datasecurity Qualys Vulnerability Management Detection & Response - QSC 2020 11/23/2020 4.25