SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Sylvain Martinez

Sylvain Martinez

15 Followers
28 SlideShares 0 Clipboards 15 Followers 0 Followings
  • Unblock User Block User
28 SlideShares 0 Clipboards 15 Followers 0 Followings

Personal Information
Contact Details
Tags
cyber security security gdpr framework incident handling hacking penetration testing red team cyber ids incident response cyber incident vulnerability assessment information security training risks best practises free suricata snort security onion selks python programming algorithms cryptography nist implementation data loss prevention dlp summary overview reports trends phishing career jobs virtua vciso ciso response impact iot examples use cases technics strategy application mobile ctf admin microsoft best practices 365 office bitcoin cryptocurrency forensics debate data protestion white hat ethical twitter linkedin facebook social media howto standards regulations dpa ffiec is 27002 iso 27001 demo wep wpa3 wpa2 wpa wifi mauritius open club defense offensive open source
See more
Presentations (28)
See all
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
5 years ago • 470 Views
Talk1 muscl club_v1_2
4 years ago • 140 Views
Talk2 esc2 muscl-wifi_v1_2b
4 years ago • 281 Views
Talk1 esc3 muscl-standards and regulation_v1_1
4 years ago • 194 Views
Talk2 esc4 muscl-ids_v1_2
4 years ago • 762 Views
SOCIAL MEDIA AS A CYBER WEAPON
4 years ago • 275 Views
INCIDENT HANDLING IN ORGANISATIONS
4 years ago • 149 Views
Ethical Hacking
4 years ago • 246 Views
Talk1 esc7 muscl-dataprotection_v1_2
4 years ago • 179 Views
Talk1 esc7 muscl-gdpr_debate_v1_2
4 years ago • 194 Views
INTRODUCTION TO CYBER FORENSICS
4 years ago • 1020 Views
Risk on Crypto Currencies
4 years ago • 470 Views
OFFICE 365 SECURITY
4 years ago • 449 Views
The Art of CTF
4 years ago • 215 Views
Mobile Security Assessment
4 years ago • 204 Views
GDPR SECURITY ISSUES
4 years ago • 177 Views
ARE YOU RED TEAM READY?
4 years ago • 253 Views
IOT Security
4 years ago • 695 Views
OFFENSIVE IDS
3 years ago • 281 Views
INCIDENT RESPONSE OVERVIEW
3 years ago • 520 Views
VIRTUAL CISO AND OTHER KEY CYBER ROLES
3 years ago • 360 Views
PHISHING PROTECTION
3 years ago • 2259 Views
INCIDENT RESPONSE CONCEPTS
3 years ago • 1184 Views
2019 CYBER SECURITY TRENDS REPORT REVIEW
3 years ago • 1820 Views
DATA LOSS PREVENTION OVERVIEW
3 years ago • 523 Views
INCIDENT RESPONSE NIST IMPLEMENTATION
3 years ago • 4994 Views
INTRODUCTION TO CRYPTOGRAPHY
3 years ago • 1186 Views
PROGRAMMING AND CYBER SECURITY
1 year ago • 208 Views
  • Activity
  • About

Presentations (28)
See all
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
5 years ago • 470 Views
Talk1 muscl club_v1_2
4 years ago • 140 Views
Talk2 esc2 muscl-wifi_v1_2b
4 years ago • 281 Views
Talk1 esc3 muscl-standards and regulation_v1_1
4 years ago • 194 Views
Talk2 esc4 muscl-ids_v1_2
4 years ago • 762 Views
SOCIAL MEDIA AS A CYBER WEAPON
4 years ago • 275 Views
INCIDENT HANDLING IN ORGANISATIONS
4 years ago • 149 Views
Ethical Hacking
4 years ago • 246 Views
Talk1 esc7 muscl-dataprotection_v1_2
4 years ago • 179 Views
Talk1 esc7 muscl-gdpr_debate_v1_2
4 years ago • 194 Views
INTRODUCTION TO CYBER FORENSICS
4 years ago • 1020 Views
Risk on Crypto Currencies
4 years ago • 470 Views
OFFICE 365 SECURITY
4 years ago • 449 Views
The Art of CTF
4 years ago • 215 Views
Mobile Security Assessment
4 years ago • 204 Views
GDPR SECURITY ISSUES
4 years ago • 177 Views
ARE YOU RED TEAM READY?
4 years ago • 253 Views
IOT Security
4 years ago • 695 Views
OFFENSIVE IDS
3 years ago • 281 Views
INCIDENT RESPONSE OVERVIEW
3 years ago • 520 Views
VIRTUAL CISO AND OTHER KEY CYBER ROLES
3 years ago • 360 Views
PHISHING PROTECTION
3 years ago • 2259 Views
INCIDENT RESPONSE CONCEPTS
3 years ago • 1184 Views
2019 CYBER SECURITY TRENDS REPORT REVIEW
3 years ago • 1820 Views
DATA LOSS PREVENTION OVERVIEW
3 years ago • 523 Views
INCIDENT RESPONSE NIST IMPLEMENTATION
3 years ago • 4994 Views
INTRODUCTION TO CRYPTOGRAPHY
3 years ago • 1186 Views
PROGRAMMING AND CYBER SECURITY
1 year ago • 208 Views
Personal Information
Contact Details
Tags
cyber security security gdpr framework incident handling hacking penetration testing red team cyber ids incident response cyber incident vulnerability assessment information security training risks best practises free suricata snort security onion selks python programming algorithms cryptography nist implementation data loss prevention dlp summary overview reports trends phishing career jobs virtua vciso ciso response impact iot examples use cases technics strategy application mobile ctf admin microsoft best practices 365 office bitcoin cryptocurrency forensics debate data protestion white hat ethical twitter linkedin facebook social media howto standards regulations dpa ffiec is 27002 iso 27001 demo wep wpa3 wpa2 wpa wifi mauritius open club defense offensive open source
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.