Information Technologies

  • Securing the network with pen testing and social engineering.
  • View on upcoming networking vulnerabilities as well has human errors.