SlideShare a Scribd company logo
J ul 9, 2025
VICTOR MAESTRE RAMIREZ
Penetration Testing, Threat Hunting, and
Cryptography
an online non-credit course authorized by IBM and offered through Coursera
has successfully completed
DeeDee collette
Manish Kumar
Rav Ahuja
Verify at:
https://coursera.org/verify/AMA4P1V74AFC
Cou rsera h as con firmed th e id en tity of th is in d iv id u al an d
th eir p articip ation in th e cou rse.

More Related Content

PDF
CyberOps Associate - Cisco Networking Academy
PDF
CISSP Domain 8: Software development security
PDF
Certified Information Systems Security Professional (CISSP) Specialization Ce...
PDF
Incident Response and Defense with OpenVAS
PDF
CISSP - Domain 7: Security Operations - InfoSec Institute
PDF
CISSP Domain 6: Security Assessment and Testing
PDF
CISSP Domain 5: Identity and Access Management (IAM)
PDF
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
CyberOps Associate - Cisco Networking Academy
CISSP Domain 8: Software development security
Certified Information Systems Security Professional (CISSP) Specialization Ce...
Incident Response and Defense with OpenVAS
CISSP - Domain 7: Security Operations - InfoSec Institute
CISSP Domain 6: Security Assessment and Testing
CISSP Domain 5: Identity and Access Management (IAM)
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...

More from VICTOR MAESTRE RAMIREZ (20)

PDF
Exploring Rare Disease Through Translational Research
PDF
CyberOps Associate - Cisco Certification
PDF
Incident Response and Digital Forensics Certificate
PDF
The Whole Scientist™ Foundational Skills
PDF
CISSP Domain 4: Communication and Network Security
PDF
CISSP Domain 3: Security Architecture and Engineering
PDF
CISSP Domain 2: Asset Security - InfoSec
PDF
CISSP Domain 1: Security and Risk Management
PDF
Google Cybersecurity Specialization Certificate
PDF
Automate Cybersecurity Tasks with Python
PDF
Linux Certificate of Completion - LabEx Certificate
PDF
Using AI/ML for Space Biology Research
PDF
Sound the Alarm: Detection and Response
PDF
Cyber Threat Hunting - InfoSec Certificate
PDF
Managing Threat Intelligence with Cortex XSOAR
PDF
Auditing Generative AI: Strategy, Analysis & Risk Mitigation
PDF
Manage Security Operations - Microsoft Certification
PDF
Open Source Software Development Methods
PDF
Shell Skill Tree - LabEx Certification (LabEx)
PDF
Cybersecurity Compliance Framework, Standards & Regulations
Exploring Rare Disease Through Translational Research
CyberOps Associate - Cisco Certification
Incident Response and Digital Forensics Certificate
The Whole Scientist™ Foundational Skills
CISSP Domain 4: Communication and Network Security
CISSP Domain 3: Security Architecture and Engineering
CISSP Domain 2: Asset Security - InfoSec
CISSP Domain 1: Security and Risk Management
Google Cybersecurity Specialization Certificate
Automate Cybersecurity Tasks with Python
Linux Certificate of Completion - LabEx Certificate
Using AI/ML for Space Biology Research
Sound the Alarm: Detection and Response
Cyber Threat Hunting - InfoSec Certificate
Managing Threat Intelligence with Cortex XSOAR
Auditing Generative AI: Strategy, Analysis & Risk Mitigation
Manage Security Operations - Microsoft Certification
Open Source Software Development Methods
Shell Skill Tree - LabEx Certification (LabEx)
Cybersecurity Compliance Framework, Standards & Regulations
Ad

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Modernizing your data center with Dell and AMD
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Monthly Chronicles - July 2025
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Empathic Computing: Creating Shared Understanding
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Weekly Chronicles - August'25 Week I
Modernizing your data center with Dell and AMD
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
NewMind AI Monthly Chronicles - July 2025
Ad

Penetration Testing, Threat Hunting, and Cryptography

  • 1. J ul 9, 2025 VICTOR MAESTRE RAMIREZ Penetration Testing, Threat Hunting, and Cryptography an online non-credit course authorized by IBM and offered through Coursera has successfully completed DeeDee collette Manish Kumar Rav Ahuja Verify at: https://coursera.org/verify/AMA4P1V74AFC Cou rsera h as con firmed th e id en tity of th is in d iv id u al an d th eir p articip ation in th e cou rse.