The document lists 30 names organized into 10 groups of 3 people each. Each group is associated with a different topic related to cybersecurity: 1) Windows Operating System, 2) Linux Operating System, 3) Network Protocol and Service, 4) Network Infrastructure, 5) Network Attacks, 6) Protecting Network, 7) Cryptography, 8) Security Monitoring, 9) Intrusion Data Analysis, 10) Incident Response handling.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
130 views2 pages
File PDF
The document lists 30 names organized into 10 groups of 3 people each. Each group is associated with a different topic related to cybersecurity: 1) Windows Operating System, 2) Linux Operating System, 3) Network Protocol and Service, 4) Network Infrastructure, 5) Network Attacks, 6) Protecting Network, 7) Cryptography, 8) Security Monitoring, 9) Intrusion Data Analysis, 10) Incident Response handling.