Skip to main content

Hello, I'm Cyber Security Professional

Welcome to my Blog, my name is Juan Padilla, I'm from Mexico, and I'm Cyber Security Professional.



My Certifications:


GCFE http://www.giac.org/certified-professional/juan-francisco-padilla-suaste/135799


My Codes of Ethics Signed:

Giac Code of Ethics: https://www.giac.org/about/ethics

EC-Council Code of Ethics: https://www.eccouncil.org/code-of-ethics/

PentesterLab badges:


* PentesterLab's Introduction Badge.
* PentesterLab's Essential Badge.
* PentesterLab's Unix Badge.
* PentesterLab's White Badge.
* PentesterLab's Serialize Badge.
* PentesterLab's Interceptor Badge.
* PentesterLab's Yellow Badge.
* PentesterLab's PCAP Badge.


HacktheBox - Capture The Flag, Actual Ranking Level: Hacker:



Courses:


 FOR408: Computer Forensic Investigations - Windows In-Depth, 
2013 - Impartido por Andres Velazquez, http://www.andresvelazquez.com/

 Desarrollo Ágil con Groovy & Grails
2011 - Impartido por Jose Juan R. Zuñiga @neodevelop 
Y por Domingo Suarez Torres @domix


Follow me:

Hire me:






Comments

Popular posts from this blog

Forensics Challenges

Hi this is a compilation of computer forensics challenges: https://www.hackthebox.eu Cost: Free Here you can find five forensics challenges: My Favorite is Reminiscent because is about Memory Forensics, and is a topic very important, frequently is necessary get a memory dump, to know whats happened. SANS DFIR Monterey 2015 Cost: Free This challenge is about Network forensics, is one of my favorite,  you can download from:  dfir.to/FOR572-Challenge-Data You need response 6 questions, here the questions:  https://www.surveymonkey.com/r/BZMXTKM The answers are there:  https://digital-forensics.sans.org/blog/2015/02/08/2015-network-challenge-results/?reply-to-comment=23892 https://public.attackdefense.com/ Cost: Free - Temporally This Page is a new project of pentesteracademy, has a several forensics challenges, in three categories: Wi-fi Browser Log Analysis If you know of other challe...

MindNode - Nmap Commands

Hi, I will share my diagrams of several cybersecurity topic, in this post the topic is Nmap.