SlideShare a Scribd company logo
1 of 1
Download to read offline
Certificate of Continuing Education Completion
This certificate is awarded to
Rodrigo Carran Oliveira dos Santos
for successfully completing the 5 CEUS/CPES and 5 hours
training course provided by Cybrary in
Advanced Malware Analysis: Redux
Feb 6, 2021
Date of Completion
CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9
Certificate Number Ralph P. Sita, CEO
Official Cybrary Certificate - CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9

More Related Content

What's hot

ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)VICTOR MAESTRE RAMIREZ
 
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)VICTOR MAESTRE RAMIREZ
 
Certified Administrative Professtional
Certified Administrative ProfesstionalCertified Administrative Professtional
Certified Administrative Professtionalchee wai wong
 
Developing Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary CertificationDeveloping Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary CertificationVICTOR MAESTRE RAMIREZ
 
Business Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary CertificationBusiness Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary CertificationVICTOR MAESTRE RAMIREZ
 
Cybrary social engineering and manipulation
Cybrary social engineering and manipulationCybrary social engineering and manipulation
Cybrary social engineering and manipulationLawrence H. (Larry) King
 
ITIL foundation cert
ITIL foundation certITIL foundation cert
ITIL foundation certEric Eccher
 
Penetration testing and ethical hacking
Penetration testing and ethical hackingPenetration testing and ethical hacking
Penetration testing and ethical hackingLeonard Dukaj
 
Get Certificate - Cybrary Cybrary
Get Certificate - Cybrary CybraryGet Certificate - Cybrary Cybrary
Get Certificate - Cybrary Cybrarysadaf safi
 
Incident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics CertificateIncident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics CertificateVICTOR MAESTRE RAMIREZ
 

What's hot (18)

ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
 
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)
 
Certified Administrative Professtional
Certified Administrative ProfesstionalCertified Administrative Professtional
Certified Administrative Professtional
 
Developing Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary CertificationDeveloping Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary Certification
 
COBIT
COBITCOBIT
COBIT
 
Cybrary pmp
Cybrary pmpCybrary pmp
Cybrary pmp
 
Business Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary CertificationBusiness Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary Certification
 
Cybrary cisa
Cybrary cisaCybrary cisa
Cybrary cisa
 
Cybrary hipaa
Cybrary hipaaCybrary hipaa
Cybrary hipaa
 
Cybrary social engineering and manipulation
Cybrary social engineering and manipulationCybrary social engineering and manipulation
Cybrary social engineering and manipulation
 
Cybrary malware analysis
Cybrary malware analysisCybrary malware analysis
Cybrary malware analysis
 
ITIL foundation cert
ITIL foundation certITIL foundation cert
ITIL foundation cert
 
Cybrary itil
Cybrary itilCybrary itil
Cybrary itil
 
Penetration testing and ethical hacking
Penetration testing and ethical hackingPenetration testing and ethical hacking
Penetration testing and ethical hacking
 
Get Certificate - Cybrary Cybrary
Get Certificate - Cybrary CybraryGet Certificate - Cybrary Cybrary
Get Certificate - Cybrary Cybrary
 
Cybrary ethical hacking
Cybrary ethical hackingCybrary ethical hacking
Cybrary ethical hacking
 
Advanced Penetration Testing
Advanced Penetration TestingAdvanced Penetration Testing
Advanced Penetration Testing
 
Incident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics CertificateIncident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics Certificate
 

More from Rodrigo Carran

Exin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdfExin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdfRodrigo Carran
 
Exin Secure Cloud Services
Exin Secure Cloud ServicesExin Secure Cloud Services
Exin Secure Cloud ServicesRodrigo Carran
 
Exin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdfExin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdfRodrigo Carran
 
Exin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdfExin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdfRodrigo Carran
 
Exin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdfExin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdfRodrigo Carran
 
CPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdfCPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdfRodrigo Carran
 
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...Rodrigo Carran
 
cpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdfcpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdfRodrigo Carran
 
CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016Rodrigo Carran
 
CPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance PractitionerCPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance PractitionerRodrigo Carran
 
CPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & ExamCPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & ExamRodrigo Carran
 
CPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young ProfessionalsCPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young ProfessionalsRodrigo Carran
 
CPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdfCPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdfRodrigo Carran
 
CPD - Privacy & Data Protection GRPD.pdf
CPD - Privacy & Data Protection  GRPD.pdfCPD - Privacy & Data Protection  GRPD.pdf
CPD - Privacy & Data Protection GRPD.pdfRodrigo Carran
 
Check Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdfCheck Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdfRodrigo Carran
 

More from Rodrigo Carran (20)

Exin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdfExin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdf
 
Exin Secure Cloud Services
Exin Secure Cloud ServicesExin Secure Cloud Services
Exin Secure Cloud Services
 
Exin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdfExin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdf
 
Exin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdfExin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdf
 
Exin CCFC.pdf
Exin CCFC.pdfExin CCFC.pdf
Exin CCFC.pdf
 
Exin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdfExin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyberark level 1.pdf
Cyberark level 1.pdfCyberark level 1.pdf
Cyberark level 1.pdf
 
CPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdfCPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdf
 
CPE-InfoSecurity
CPE-InfoSecurityCPE-InfoSecurity
CPE-InfoSecurity
 
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
 
cpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdfcpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdf
 
CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016
 
CPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance PractitionerCPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance Practitioner
 
CPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & ExamCPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & Exam
 
CPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young ProfessionalsCPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young Professionals
 
CPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdfCPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdf
 
CISM Exam Passer .pdf
CISM Exam Passer .pdfCISM Exam Passer .pdf
CISM Exam Passer .pdf
 
CPD - Privacy & Data Protection GRPD.pdf
CPD - Privacy & Data Protection  GRPD.pdfCPD - Privacy & Data Protection  GRPD.pdf
CPD - Privacy & Data Protection GRPD.pdf
 
Check Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdfCheck Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdf
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Cybrary cert-advanced-malware-analysis-redux

  • 1. Certificate of Continuing Education Completion This certificate is awarded to Rodrigo Carran Oliveira dos Santos for successfully completing the 5 CEUS/CPES and 5 hours training course provided by Cybrary in Advanced Malware Analysis: Redux Feb 6, 2021 Date of Completion CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9 Certificate Number Ralph P. Sita, CEO Official Cybrary Certificate - CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9