Internet Security Jobs

46 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Fixed-Price - Entry Level ($) - Est. Budget: $1,000 - Posted
I am looking for a unique dating website that is better than or different than any other online. With a dating game that people can pay to play and win a cash award the game will not start until the reserved is met. There will be one upgrade fee for users to play the game and to enjoy other features. I am sure the right web designer can build this website with ease there is nothing difficult about it. I will hire the right person with the right idea for this job please do not ask me to meet you on Skype I look forward from hearing from the right web designer.
Skills: Internet Security Game Design Game Testing Payment Processing
Fixed-Price - Expert ($$$) - Est. Budget: $1,500 - Posted
I need a training course creating on the IoT. Needs to feature what it is, what it does, how it does it, impact on the present and future. Needs also to look into the technicalities from managing a project, integration into home use and commercial use. Please explore all current offerings from Microsoft, Cisco and other big vendors to see how they approach and cover these aspects also. I'm looking for around 100 PPT slides or so and any images used must be original or be attributed to the owner in the slide. It would be ideal to break the subjects into 4 or 5 so I can add an exam testing those aspects. I'll then use these to create my course. Any additional notes for my script would be useful as well as further research for the students and possible projects. The course will be added to my online IT training website www.howtonetwork.com Regards Paul
Skills: Internet Security Embedded Systems
Fixed-Price - Expert ($$$) - Est. Budget: $600 - Posted
Hi I'm looking of a clear crisp, to the point and practical guide for Mobile Security Tutorial covering following chapters: Chapter 1 : Introduction To Mobile Security Chapter 2 : Mobile Platform Attack Vectors (a) What’s An Attack Vector? (b) Consequences of Attack Vectors ? (c) Anatomy of a Mobile Attack (d) How a Hacker can Profit from Mobile when Successfully Compromised (e) Vulnerable Areas in Mobile Business Environment (f) OWASP Mobile Top 10 Risks Chapter 3: App Stores And Security Issues (a) Common Security Issues Facing App Store (b) App Sandboxing Issues Chapter 4 : Introduction To Mobile Spam (a) SMS Phishing Attack (SMiShing) (Targeted Attack Scan) (b) Why SMS Phishing is Effective? (c) SMS Phishing Attack Examples (d) Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections (e) Prevention And Solutions Chapter 5(i) : Introduction To Android OS (a) Android OS Architecture (b) Android Device Administration API (c) Android Vulnerabilities (ii) Android Rooting (a) Android Rooting Tools (b) Rooting Android Phones using SuperOneClick Rooting (c) Android Phones Using Superboot (d) The Importance of Rooting Android Devices (iii) Android Trojan (a) ZitMo (ZeuS-in-the-Mobile) (b) FakeToken and TRAMP.A (c) Fakedefender and Obad (d) FakeInst and OpFake (e) AndroRAT and Dendroid Chapter 6 : Securing Android Devices (i) Google Apps Device Policy (ii) Remote Wipe Service: Remote Wipe Chapter 7 : Android Security Tools (a) DroidSheep Guard (b) TrustGo Mobile Security and Sophos Mobile Security (c) 360 security, AVL, and Avira Antivirus Security (d) Android Vulnerability Scanner: X- (e) Android Device Tracking Tools Chapter 8 : Introduction To iOS ( Apple iOS ) (i) Jailbreaking iOS (a)Types of Jailbreaking (b)Jailbreaking Techniques (c)App Platform for Jailbroaken Devices: Cydia (d)Jailbreaking Tool: Pangu (e)Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac (ii)Jailbreaking Tools (a) Redsn0w and Absinthe (b) evasi0n7 and GeekSn0w (c) Sn0wbreeze and PwnageTool (d) LimeRa1n and Blackra1n Chapter 9 : Guidelines for Securing iOS Devices iOS Device Tracking Tools Chapter 10 : Introduction To Windows OS (i) Windows Phone 8 Architecture (ii) Secure Boot Process (iii) Guidelines for Securing Windows OS Devices (iv) Windows OS Device Tracking Tool: FollowMee GPS Tracker Chapter 11 : Introduction To Blackberry Operating System (i) BlackBerry Enterprise Solution Architecture ( a) Blackberry Attack Vectors (i) Malicious Code Signing (ii) JAD File Exploits and Memory/ Processes Manipulations (iii) Short Message Service (SMS) Exploits (iv) Email Exploits (v) PIM Data Attacks and TCP/IP Connections Vulnerabilities Chapter 12 : Guidelines for Securing BlackBerry Devices (a) BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker (b) Mobile Spyware: mSpy and StealthGenie (c) Mobile Spyware Chapter 13 : Mobile Device Management (MDM) MDM Solution: MaaS360 Mobile Device Management (MDM) MDM Solutions (a) Bring Your Own Device (BYOD) (i) BYOD Risks (ii) BYOD Policy Implementation (iii) BYOD Security Guidelines for Administrator (iv) BYOD Security Guidelines for Employee Chapter 14 : Mobile Security Guidelines and Tools (a) General Guidelines for Mobile Platform Security (b) Mobile Device Security Guidelines for Administrator (c) SMS Phishing Countermeasures (d) Mobile Protection Tool (i) BullGuard Mobile Security (ii) Lookout (iii) WISeID (iv) zIPS (e) Mobile Anti-Spyware Chapter 15 : (i) Mobile Pen Testing (a) Android Phone Pen Testing (b) iPhone Pen Testing (c) Windows Phone Pen Testing (d) BlackBerry Pen Testing (ii) Mobile Pen Testing Toolkit (a) zANTI (b) dSploit (c) Hackode (The Hacker's Toolbox) Glossary : Mobile Security Terminology
Skills: Internet Security Certified Information Systems Security Professional (CISSP) Mobile Programming Network Security
Fixed Price Budget - Entry Level ($) - $1 to $300 - Posted
Hello, I have many websites, some of them are done from scratch and others with frameworks or cms. I would like an expert in security to prevent me from hacking, fishing, and other network vulnerabilities that could make the website slow or that can put a virus on website killing the seo. I would like someone expert who can analysis those vulnerabilities, tell us what kind of vulnerabilties we have and to protect us from them. After the security done, we will try the security and it should be safe.
Skills: Internet Security Information Security