SlideShare a Scribd company logo
Certificate of Continuing Education Completion
This certificate is awarded to
Rodrigo Carran Oliveira dos Santos
for successfully completing the 5 CEUS/CPES and 5 hours
training course provided by Cybrary in
Advanced Malware Analysis: Redux
Feb 6, 2021
Date of Completion
CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9
Certificate Number Ralph P. Sita, CEO
Official Cybrary Certificate - CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9

More Related Content

What's hot

ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
VICTOR MAESTRE RAMIREZ
 
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)
VICTOR MAESTRE RAMIREZ
 
Certified Administrative Professtional
Certified Administrative ProfesstionalCertified Administrative Professtional
Certified Administrative Professtional
chee wai wong
 
Developing Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary CertificationDeveloping Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary Certification
VICTOR MAESTRE RAMIREZ
 
COBIT
COBITCOBIT
Cybrary pmp
Cybrary pmpCybrary pmp
Business Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary CertificationBusiness Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary Certification
VICTOR MAESTRE RAMIREZ
 
Cybrary cisa
Cybrary cisaCybrary cisa
Cybrary hipaa
Cybrary hipaaCybrary hipaa
Cybrary social engineering and manipulation
Cybrary social engineering and manipulationCybrary social engineering and manipulation
Cybrary social engineering and manipulation
Lawrence H. (Larry) King
 
Cybrary malware analysis
Cybrary malware analysisCybrary malware analysis
Cybrary malware analysis
Lawrence H. (Larry) King
 
ITIL foundation cert
ITIL foundation certITIL foundation cert
ITIL foundation cert
Eric Eccher
 
Cybrary itil
Cybrary itilCybrary itil
Penetration testing and ethical hacking
Penetration testing and ethical hackingPenetration testing and ethical hacking
Penetration testing and ethical hacking
Leonard Dukaj
 
Get Certificate - Cybrary Cybrary
Get Certificate - Cybrary CybraryGet Certificate - Cybrary Cybrary
Get Certificate - Cybrary Cybrary
sadaf safi
 
Cybrary ethical hacking
Cybrary ethical hackingCybrary ethical hacking
Cybrary ethical hacking
Lawrence H. (Larry) King
 
Advanced Penetration Testing
Advanced Penetration TestingAdvanced Penetration Testing
Advanced Penetration Testing
VICTOR MAESTRE RAMIREZ
 
Incident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics CertificateIncident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics Certificate
VICTOR MAESTRE RAMIREZ
 

What's hot (18)

ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
ISC2 Certified Secure Software Life Cycle Professional (CCSLP)
 
Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)Certified Information Systems Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP)
 
Certified Administrative Professtional
Certified Administrative ProfesstionalCertified Administrative Professtional
Certified Administrative Professtional
 
Developing Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary CertificationDeveloping Ethical Hacking Tools with Python - Cybrary Certification
Developing Ethical Hacking Tools with Python - Cybrary Certification
 
COBIT
COBITCOBIT
COBIT
 
Cybrary pmp
Cybrary pmpCybrary pmp
Cybrary pmp
 
Business Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary CertificationBusiness Continuity & Disaster Recovery Planning - Cybrary Certification
Business Continuity & Disaster Recovery Planning - Cybrary Certification
 
Cybrary cisa
Cybrary cisaCybrary cisa
Cybrary cisa
 
Cybrary hipaa
Cybrary hipaaCybrary hipaa
Cybrary hipaa
 
Cybrary social engineering and manipulation
Cybrary social engineering and manipulationCybrary social engineering and manipulation
Cybrary social engineering and manipulation
 
Cybrary malware analysis
Cybrary malware analysisCybrary malware analysis
Cybrary malware analysis
 
ITIL foundation cert
ITIL foundation certITIL foundation cert
ITIL foundation cert
 
Cybrary itil
Cybrary itilCybrary itil
Cybrary itil
 
Penetration testing and ethical hacking
Penetration testing and ethical hackingPenetration testing and ethical hacking
Penetration testing and ethical hacking
 
Get Certificate - Cybrary Cybrary
Get Certificate - Cybrary CybraryGet Certificate - Cybrary Cybrary
Get Certificate - Cybrary Cybrary
 
Cybrary ethical hacking
Cybrary ethical hackingCybrary ethical hacking
Cybrary ethical hacking
 
Advanced Penetration Testing
Advanced Penetration TestingAdvanced Penetration Testing
Advanced Penetration Testing
 
Incident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics CertificateIncident Response and Advanced Forensics Certificate
Incident Response and Advanced Forensics Certificate
 

More from Rodrigo Carran

Exin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdfExin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdf
Rodrigo Carran
 
Exin Secure Cloud Services
Exin Secure Cloud ServicesExin Secure Cloud Services
Exin Secure Cloud Services
Rodrigo Carran
 
Exin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdfExin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdf
Rodrigo Carran
 
Exin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdfExin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdf
Rodrigo Carran
 
Exin CCFC.pdf
Exin CCFC.pdfExin CCFC.pdf
Exin CCFC.pdf
Rodrigo Carran
 
Exin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdfExin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdf
Rodrigo Carran
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rodrigo Carran
 
Cyberark level 1.pdf
Cyberark level 1.pdfCyberark level 1.pdf
Cyberark level 1.pdf
Rodrigo Carran
 
CPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdfCPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdf
Rodrigo Carran
 
CPE-InfoSecurity
CPE-InfoSecurityCPE-InfoSecurity
CPE-InfoSecurity
Rodrigo Carran
 
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
Rodrigo Carran
 
cpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdfcpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdf
Rodrigo Carran
 
CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016
Rodrigo Carran
 
CPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance PractitionerCPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance Practitioner
Rodrigo Carran
 
CPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & ExamCPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & Exam
Rodrigo Carran
 
CPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young ProfessionalsCPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young Professionals
Rodrigo Carran
 
CPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdfCPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdf
Rodrigo Carran
 
CISM Exam Passer .pdf
CISM Exam Passer .pdfCISM Exam Passer .pdf
CISM Exam Passer .pdf
Rodrigo Carran
 
CPD - Privacy & Data Protection GRPD.pdf
CPD - Privacy & Data Protection  GRPD.pdfCPD - Privacy & Data Protection  GRPD.pdf
CPD - Privacy & Data Protection GRPD.pdf
Rodrigo Carran
 
Check Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdfCheck Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdf
Rodrigo Carran
 

More from Rodrigo Carran (20)

Exin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdfExin ISO IEC 27002.pdf
Exin ISO IEC 27002.pdf
 
Exin Secure Cloud Services
Exin Secure Cloud ServicesExin Secure Cloud Services
Exin Secure Cloud Services
 
Exin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdfExin Certified Data Center Professional.pdf
Exin Certified Data Center Professional.pdf
 
Exin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdfExin Certified Data Centre Professional v15.pdf
Exin Certified Data Centre Professional v15.pdf
 
Exin CCFC.pdf
Exin CCFC.pdfExin CCFC.pdf
Exin CCFC.pdf
 
Exin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdfExin - VeriSM Foundation.pdf
Exin - VeriSM Foundation.pdf
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyberark level 1.pdf
Cyberark level 1.pdfCyberark level 1.pdf
Cyberark level 1.pdf
 
CPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdfCPE-State-of-the-Cloud-and-Threats-1.pdf
CPE-State-of-the-Cloud-and-Threats-1.pdf
 
CPE-InfoSecurity
CPE-InfoSecurityCPE-InfoSecurity
CPE-InfoSecurity
 
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
cpe-certificate-COVID-19-ISACA’s-CRISC-Certification-&-IT-Risk-Certificate-...
 
cpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdfcpe-certificate-CISA-Exam-Passer-1.pdf
cpe-certificate-CISA-Exam-Passer-1.pdf
 
CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016CPE- CISA Exam Passer2016
CPE- CISA Exam Passer2016
 
CPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance PractitionerCPE - IT Governance & Compliance Practitioner
CPE - IT Governance & Compliance Practitioner
 
CPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & ExamCPE - IT Governance & Compliance Basic Course & Exam
CPE - IT Governance & Compliance Basic Course & Exam
 
CPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young ProfessionalsCPE - Expert Group Meeting - Young Professionals
CPE - Expert Group Meeting - Young Professionals
 
CPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdfCPE - Expert Group Meeting - Cyber Security.pdf
CPE - Expert Group Meeting - Cyber Security.pdf
 
CISM Exam Passer .pdf
CISM Exam Passer .pdfCISM Exam Passer .pdf
CISM Exam Passer .pdf
 
CPD - Privacy & Data Protection GRPD.pdf
CPD - Privacy & Data Protection  GRPD.pdfCPD - Privacy & Data Protection  GRPD.pdf
CPD - Privacy & Data Protection GRPD.pdf
 
Check Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdfCheck Point Certified Security Expert.pdf
Check Point Certified Security Expert.pdf
 

Recently uploaded

PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 

Recently uploaded (20)

PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 

Cybrary cert-advanced-malware-analysis-redux

  • 1. Certificate of Continuing Education Completion This certificate is awarded to Rodrigo Carran Oliveira dos Santos for successfully completing the 5 CEUS/CPES and 5 hours training course provided by Cybrary in Advanced Malware Analysis: Redux Feb 6, 2021 Date of Completion CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9 Certificate Number Ralph P. Sita, CEO Official Cybrary Certificate - CC-4b61a2b3-afa8-4dc8-8a19-2bb07d9632a9