SlideShare a Scribd company logo
QUALYSCERTIFIED
SPECIALIST
Has successfully completed the following course and passed the certification exam.
Qualys, Inc. 1600 Bridge Parkway, Redwood City, CA 94065 www.qualys.com
Course:
Date Completed:
Course Hours:
Qualys certified specialists can deploy, operate and monitor the
Qualys Security and Compliance Suite to implement, manage and
protect their IT systems and web applications.
Giacomo Cocozziello
NSR datasecurity
PCI Compliance
11/20/2020
4

More Related Content

What's hot (12)

PCI Compliance
PCI CompliancePCI Compliance
PCI Compliance
 
Policy compliance
Policy compliancePolicy compliance
Policy compliance
 
File integrity monitoring
File integrity monitoringFile integrity monitoring
File integrity monitoring
 
Api Fundamentals
Api FundamentalsApi Fundamentals
Api Fundamentals
 
Qualys web-app-scanning Certificate
Qualys web-app-scanning CertificateQualys web-app-scanning Certificate
Qualys web-app-scanning Certificate
 
Qualys Certificate Vulnerability Management
Qualys Certificate Vulnerability Management Qualys Certificate Vulnerability Management
Qualys Certificate Vulnerability Management
 
Qualys Certification
Qualys Certification Qualys Certification
Qualys Certification
 
Coursecompletion (1)
Coursecompletion (1)Coursecompletion (1)
Coursecompletion (1)
 
Coursecompletion
CoursecompletionCoursecompletion
Coursecompletion
 
CSWS
CSWSCSWS
CSWS
 
MTA Cert
MTA CertMTA Cert
MTA Cert
 
VCA_CLOUD
VCA_CLOUDVCA_CLOUD
VCA_CLOUD
 

More from GiacomoCocozziello

More from GiacomoCocozziello (20)

Certificate CRTE (certified Red Team Expert).pdf
Certificate CRTE (certified Red Team Expert).pdfCertificate CRTE (certified Red Team Expert).pdf
Certificate CRTE (certified Red Team Expert).pdf
 
Effective classification of android malware families through dynamic features...
Effective classification of android malware families through dynamic features...Effective classification of android malware families through dynamic features...
Effective classification of android malware families through dynamic features...
 
ICS/SCADA Cyber Security Certificate.pdf
ICS/SCADA Cyber Security Certificate.pdfICS/SCADA Cyber Security Certificate.pdf
ICS/SCADA Cyber Security Certificate.pdf
 
Web Application Penetration Tester Extreme
Web Application Penetration Tester ExtremeWeb Application Penetration Tester Extreme
Web Application Penetration Tester Extreme
 
Purple Teaming Fundamentals Cocozziello Giacomo.pdf
Purple Teaming Fundamentals Cocozziello Giacomo.pdfPurple Teaming Fundamentals Cocozziello Giacomo.pdf
Purple Teaming Fundamentals Cocozziello Giacomo.pdf
 
Secure_Wireless_LAN
Secure_Wireless_LANSecure_Wireless_LAN
Secure_Wireless_LAN
 
OWASP API SECURITY TOP 10.pdf
OWASP API SECURITY TOP 10.pdfOWASP API SECURITY TOP 10.pdf
OWASP API SECURITY TOP 10.pdf
 
Practical Industrial Control System Penetration Testing
Practical Industrial Control System Penetration TestingPractical Industrial Control System Penetration Testing
Practical Industrial Control System Penetration Testing
 
Network Simulation
Network SimulationNetwork Simulation
Network Simulation
 
CyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdfCyberSecurity Asset Management (CSAM).pdf
CyberSecurity Asset Management (CSAM).pdf
 
Certificate FortiDeceptor.pdf
Certificate FortiDeceptor.pdfCertificate FortiDeceptor.pdf
Certificate FortiDeceptor.pdf
 
Qualys API
Qualys APIQualys API
Qualys API
 
Qualys Patch Management
Qualys Patch ManagementQualys Patch Management
Qualys Patch Management
 
eLearning Junior Penetration Testing
eLearning Junior Penetration TestingeLearning Junior Penetration Testing
eLearning Junior Penetration Testing
 
Cyber Threat Hunting Level 1
Cyber Threat Hunting Level 1Cyber Threat Hunting Level 1
Cyber Threat Hunting Level 1
 
Nozomi Networks Certified Engineer
Nozomi Networks Certified EngineerNozomi Networks Certified Engineer
Nozomi Networks Certified Engineer
 
Mitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligenceMitre attack defender mad attack for cyber threat intelligence
Mitre attack defender mad attack for cyber threat intelligence
 
Nozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical CertificationNozomi Networks Level 1 Technical Certification
Nozomi Networks Level 1 Technical Certification
 
NSE 2 Network Security Associate
NSE 2 Network Security Associate NSE 2 Network Security Associate
NSE 2 Network Security Associate
 
NSE 1 Network Security Associate
NSE 1 Network Security Associate NSE 1 Network Security Associate
NSE 1 Network Security Associate
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

PCI Compliance

  • 1. QUALYSCERTIFIED SPECIALIST Has successfully completed the following course and passed the certification exam. Qualys, Inc. 1600 Bridge Parkway, Redwood City, CA 94065 www.qualys.com Course: Date Completed: Course Hours: Qualys certified specialists can deploy, operate and monitor the Qualys Security and Compliance Suite to implement, manage and protect their IT systems and web applications. Giacomo Cocozziello NSR datasecurity PCI Compliance 11/20/2020 4