SlideShare a Scribd company logo
1 of 1
Download to read offline
EC-Council
This is to acknowledge that
Certification Number
has successfully completed all requirements and criteria for
certification through examination administered by EC-Council
Issue Date: :
Expiry Date
ICS/SCADA Cyber Security
Sanjay Bavisi, President
ECC1860749325
Giacomo Cocozziello
ICS/SCADA Cybersecurity
25 January, 2024 24 January, 2027

More Related Content

More from GiacomoCocozziello

CyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdfCyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdfGiacomoCocozziello
 
eLearning Junior Penetration Testing
eLearning Junior Penetration TestingeLearning Junior Penetration Testing
eLearning Junior Penetration TestingGiacomoCocozziello
 
Nozomi Networks Certified Engineer
Nozomi Networks Certified EngineerNozomi Networks Certified Engineer
Nozomi Networks Certified EngineerGiacomoCocozziello
 
Mitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligenceMitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligenceGiacomoCocozziello
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationGiacomoCocozziello
 
NSE 2 Network Security Associate
NSE 2 Network Security Associate NSE 2 Network Security Associate
NSE 2 Network Security Associate GiacomoCocozziello
 
NSE 1 Network Security Associate
NSE 1 Network Security Associate NSE 1 Network Security Associate
NSE 1 Network Security Associate GiacomoCocozziello
 
Introduction to Cybersecurity Tools and Cyber Attacks
Introduction to Cybersecurity Tools and Cyber AttacksIntroduction to Cybersecurity Tools and Cyber Attacks
Introduction to Cybersecurity Tools and Cyber AttacksGiacomoCocozziello
 
Vulnerability Management Detection & Response
Vulnerability Management Detection & ResponseVulnerability Management Detection & Response
Vulnerability Management Detection & ResponseGiacomoCocozziello
 
Global IT Asset Inventory and Management
Global IT Asset Inventory and Management Global IT Asset Inventory and Management
Global IT Asset Inventory and Management GiacomoCocozziello
 

More from GiacomoCocozziello (17)

CyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdfCyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdf
 
Certificate FortiDeceptor.pdf
Certificate FortiDeceptor.pdfCertificate FortiDeceptor.pdf
Certificate FortiDeceptor.pdf
 
Qualys API
Qualys APIQualys API
Qualys API
 
Qualys Patch Management
Qualys Patch ManagementQualys Patch Management
Qualys Patch Management
 
eLearning Junior Penetration Testing
eLearning Junior Penetration TestingeLearning Junior Penetration Testing
eLearning Junior Penetration Testing
 
Cyber Threat Hunting Level 1
Cyber Threat Hunting Level 1Cyber Threat Hunting Level 1
Cyber Threat Hunting Level 1
 
Nozomi Networks Certified Engineer
Nozomi Networks Certified EngineerNozomi Networks Certified Engineer
Nozomi Networks Certified Engineer
 
Mitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligenceMitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligence
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical Certification
 
NSE 2 Network Security Associate
NSE 2 Network Security Associate NSE 2 Network Security Associate
NSE 2 Network Security Associate
 
NSE 1 Network Security Associate
NSE 1 Network Security Associate NSE 1 Network Security Associate
NSE 1 Network Security Associate
 
Introduction to Cybersecurity Tools and Cyber Attacks
Introduction to Cybersecurity Tools and Cyber AttacksIntroduction to Cybersecurity Tools and Cyber Attacks
Introduction to Cybersecurity Tools and Cyber Attacks
 
Policy Compliance
Policy Compliance Policy Compliance
Policy Compliance
 
Web Application Scanning
Web Application Scanning Web Application Scanning
Web Application Scanning
 
Vulnerability Management Detection & Response
Vulnerability Management Detection & ResponseVulnerability Management Detection & Response
Vulnerability Management Detection & Response
 
Global IT Asset Inventory and Management
Global IT Asset Inventory and Management Global IT Asset Inventory and Management
Global IT Asset Inventory and Management
 
PCI Compliance
PCI Compliance PCI Compliance
PCI Compliance
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

ICS/SCADA Cyber Security Certificate.pdf

  • 1. EC-Council This is to acknowledge that Certification Number has successfully completed all requirements and criteria for certification through examination administered by EC-Council Issue Date: : Expiry Date ICS/SCADA Cyber Security Sanjay Bavisi, President ECC1860749325 Giacomo Cocozziello ICS/SCADA Cybersecurity 25 January, 2024 24 January, 2027