Feedback details
Custom Questions
Q1 - Checkbox
Q2 - Checkbox
Q3 - Checkbox
Learner feedback
Individual endorsement
Cyber security management
Cyber operations
Cyber engineering
Cyber threat intelligence
Cyber threat hunting
It risk management
Computer systems
Computer network defense
Computer-aided audit tools
Threat assessment
4.5 stars because nobody is perfect. I trust you will succeed in your field , you can use me as a reference.
I did not see Harp's face , and I love it . It's always better to keep an arm's length in our line of work and he did great. With his skill-set I hope he can get a job as a ethical cyber spy or something better working for the government . Who knows how high he can fly!
Cyber security management
Cyber operations
Cyber engineering
Cyber threat intelligence
Cyber threat hunting
It risk management
Computer systems
Computer network defense
Computer-aided audit tools
Threat assessment
- Author
-
Founder/Director
- Experience
- ICT Ignite Cyber (February 10th - March 7th, 2025)
- Project
- Cybersecurity Threat Analysis and Mitigation
- Created At
- March 8, 2025
Cyber security management
Cyber operations
Cyber engineering
Cyber threat intelligence
Cyber threat hunting
It risk management
Computer systems
Computer network defense
Computer-aided audit tools
Threat assessment