Cisco asa 5505 stopping ddos attacks jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 cisco asa 5505 stopping ddos attacks jobs found, pricing in USD

    I'm seeking a skilled robotics engineer to simulate basic robotic movements in Gazebo. My project's scope includes: - Engineering a robotic system to perform automated maneuvers. - Implementing basic movements such as forward motion, turning, and stopping. Your expertise should ideally include: - Proficiency in robotics engineering inclusive of controller expertise and Gazebo simulation. - Familiarity with automated systems and their movements. I anticipate this project to be less complex but I demand accuracy in basic functions.

    $146 (Avg Bid)
    $146 Avg Bid
    15 bids

    I'm in need of an ethical hacker to assist in testing the security of our network and web applications. This is to ascertain the effectiveness of our current security measures. Key Tasks: - Network penetration testing - Web application security testing Access: - You will have full system access, which will enable you to conduct comprehensive testing across all areas. Ideal Experience: - P...focus on network and web application security testing - Familiarity with various penetration testing tools and methodologies - Ability to document and communicate vulnerabilities effectively - Strong understanding of IT security principles and best practices. Your assistance in this project will be invaluable in helping us fortify our security measures and protect our systems from malicious ...

    $32 (Avg Bid)
    Urgent
    $32 Avg Bid
    12 bids
    Linux Server Maintenance 6 days left
    VERIFIED

    Hello^^^^. I'm using Amazon AWS and would like to request server maintenance. First of all, I would like to ask you to do as much as possible for server security and privacy, such as SSL installation, automatic backup once a day, DDOS attack prevention, system performance optimization, hacking prevention, encryption between data transmissions, real-time monitoring, data recovery, backdoor checking, backdoor checking and deletion of compromised files, attack root identification and blocking, suspicious process occupation identification and recovery, server hacking analysis, server access history tracking, password recovery and complexity setting, virus and malicious software checking,,data leakage prevention.....etc My current monthly budget is about $50, Please send me a prop...

    $125 (Avg Bid)
    $125 Avg Bid
    22 bids

    We are seeking experienced cybersecurity consultants for a project focused on assessing and enhancing our client's DDoS protection mechanisms, incident response processes and overall security posture. Budget: ~$7000 Location: Riyadh (Onsite) 60 Days Responsibilities: - Review and assess the configuration and setup of DDoS protection systems, including network and application layer defense mechanisms - Evaluate the effectiveness of existing cybersecurity incident management processes, procedures, and playbooks - Assess DDoS detective and preventive controls from a technology infrastructure and security perspective - Audit the configuration and setup of network appliances (routers, switches, firewalls) for security best practices - Review and optimize the SIEM (Se...

    $81 / hr (Avg Bid)
    $81 / hr Avg Bid
    5 bids

    I'm seeking a network engineer with expertise in using Cisco Packet Tracer for a small-scale ISP network project. - Tasks: The main responsibilities of the project will involve configuring and setting up the entire network structure including routers, switches, and other necessary network components. Additionally, I will require assistance in ensuring the network is secure and troubleshooting any issues that may arise during the process. - Goal: The main aim of this project is to successfully build and simulate a small-scale ISP network using Cisco Packet Tracer. - Experience: The ideal candidate for this project should possess: - Proficiency in using Cisco Packet Tracer for network design and simulation. - Strong understanding of network configuration and secu...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    16 bids

    I'm seeking a network engineer with expertise in using Cisco Packet Tracer for a small-scale ISP network project. - Tasks: The main responsibilities of the project will involve configuring and setting up the entire network structure including routers, switches, and other necessary network components. Additionally, I will require assistance in ensuring the network is secure and troubleshooting any issues that may arise during the process. - Goal: The main aim of this project is to successfully build and simulate a small-scale ISP network using Cisco Packet Tracer. - Experience: The ideal candidate for this project should possess: - Proficiency in using Cisco Packet Tracer for network design and simulation. - Strong understanding of network configuration and...

    $23 (Avg Bid)
    $23 Avg Bid
    15 bids

    I need a versatile programmer who can work with Python, C or any other programming language to develop a system for identifying Distributed Denial of Service (DDoS) attacks with the help of machine learning algorithms. Skills and Experience: - Extensive experience in Python, C, or similar programming languages - Knowledge of Machine Learning algorithms - Experience in network security would be beneficial - Proven track record in detecting cyber threats in a small network environment. Your success will be judged by your ability to create a reliable, data-driven system capable of efficiently detecting DDoS attacks in a small-scale network.

    $384 (Avg Bid)
    $384 Avg Bid
    17 bids

    ...process seamlessly within the application. 2. **UI/UX Design:** - Design and implement intuitive screens for phone number entry and OTP verification. - Ensure a smooth and responsive user experience throughout the authentication flow. 3. **Security Measures:** - Implement encryption techniques to protect user data. - Incorporate measures to prevent security threats like brute force attacks and unauthorized access. 4. **Error Handling:** - Implement error handling mechanisms to handle edge cases gracefully. - Provide informative feedback to users during the authentication process. 5. **Testing:** - Conduct rigorous testing to validate the reliability and security of the authentication system. - Perform unit tests and integration tests to ensure robust f...

    $91 (Avg Bid)
    $91 Avg Bid
    24 bids

    I'm in need of an experienced developer to create a new cryptocurrency that is based on the Bitcoin blockchain platform. Key Features: * Fast Transaction Processing: The cryptocurrency should be designed to complete transactions swiftly and efficiently. * High Security: It is of paramount importance that the cryptocurrency has advanced security features to protect it against cyber-attacks and fraud. * Scalability: The cryptocurrency must be capable of scaling to accommodate a high volume of transactions as the user base grows. Ideal Skills: * Experience with the Bitcoin blockchain platform * Proven experience in developing cryptocurrency * In-depth understanding of security protocols * Knowledge of frameworks for scaling up systems Prior experience with cryptocurrency cre...

    $2516 (Avg Bid)
    $2516 Avg Bid
    67 bids

    ...CI/CD: Implement CI/CD pipelines using GitHub Actions to automate testing and deployment. Cloudflare: Use Cloudflare for security (DDoS protection, WAF, SSL/TLS encryption), performance optimization (CDN, image optimization), and DNS management. 3. Specific Integrations or Third-Party Services OKTA: For secure tenant-based authentication and user management. GitHub: For version control and collaboration. DataStax Astra: Managed Cassandra database service for data storage. Netlify or Vercel: For hosting and deploying the frontend application. Monitoring and Logging: Prometheus and Grafana for monitoring. The ELK Stack for logging and analysis. Cloudflare: For DDoS protection, CDN, SSL/TLS encryption, load balancing, and traffic analytics. 4. Expected User Base and T...

    $558 (Avg Bid)
    $558 Avg Bid
    115 bids

    I urgently require a ...breach on my website. The site was hacked, and I received a notification from a security provider regarding this. The primary goal is to remove the malware and secure the website to prevent future attacks. Key Tasks: - Identify the extent of the breach and locate the malware. - Completely remove all malware, malicious code, and backdoors. - Implement security protocols and measures to fortify the site from future breaches. Requirements: - Proven experience in restoring hacked Wordpress sites and proficient in malware removal. - Expertise in security and best practices to prevent cyber-attacks. - Excellent communication skills and a proactive approach to problem-solving. Your expertise is urgently needed to rectify this issue and ensure the site i...

    $159 (Avg Bid)
    $159 Avg Bid
    35 bids

    ...Yankee Clipper Travel. It will be on the same page either directly above or under the ad you created. The ad will be the same dimensions as the ad you just did. (I re-uploaded the ad specs document into the Files section.) I also uploaded an image that we think would be a great main image for the ad. You have done work for Frank-in-Cisco before so you already have the logo and understand the colors and look and feel. In the ad, please incorporate the Frank-In-Cisco logo. (I've included in the Files section the old ad you did for us as a reminder.) This is an LGBTQ+ (gay) publication so please also incorporate the pride flag into the design. (We've also included an official 2024 SF Pride logo as well as the pride flag and trans flag in Files so you have an...

    $50 (Avg Bid)
    $50 Avg Bid
    1 bids

    need a large object made form ASA. Need to be able to put in an STL file

    $129 (Avg Bid)
    $129 Avg Bid
    75 bids

    ...controller coordinates with access control systems, such as induction loops, keypads, RFID readers, or other authentication methods, to permit or restrict entry. All of these methods are connected to one of the ‘Commands’. These commands are divided into following: - O : only starts the opening movement - C : only starts the closing movement - O – S – C : is a toggle function between opening, stopping and closing Position detection: The controller uses feedback from an encoder and two (ore one) limit switches to determine the gate's precise position along the track, ensuring accurate opening and closing operations according to their respective motion curve. Safety protocols: To avoid any risk of crushing between the latch post and the gate leaf ...

    $1258 (Avg Bid)
    NDA
    $1258 Avg Bid
    12 bids

    I urgently require a ...breach on my website. The site was hacked, and I received a notification from a security provider regarding this. The primary goal is to remove the malware and secure the website to prevent future attacks. Key Tasks: - Identify the extent of the breach and locate the malware. - Completely remove all malware, malicious code, and backdoors. - Implement security protocols and measures to fortify the site from future breaches. Requirements: - Proven experience in restoring hacked Wordpress sites and proficient in malware removal. - Expertise in security and best practices to prevent cyber-attacks. - Excellent communication skills and a proactive approach to problem-solving. Your expertise is urgently needed to rectify this issue and ensure the site i...

    $150 (Avg Bid)
    $150 Avg Bid
    127 bids
    Cisco Task 2 days left

    I have a Cisco task that needs immediate attention. Please find the attached file for detailed information. - The deadline for this task is within a week, so I need someone who can commit to this timeframe and deliver high-quality work. - I prefer communication through emails for updates and progress tracking.

    $78 (Avg Bid)
    $78 Avg Bid
    20 bids

    Creating something with the Cisco Packet Tracer Network Design Proposal for a Newly Established Bank Create a simple networking topology for a bank using Cisco Packet Tracer. A newly established bank is seeking to set up its IT infrastructure promptly, and you are one of the contenders for this project. The bank requires a simulated version of the proposed plan before making a final decision. The bank has provided you with the building's blueprint (see attached image), indicating it is a three-story structure with the following layout: First Floor: - Room 1: Accounting Department (3 employees) - Room 2: Checking and Savings Department (4 employees) - Central Hall: Public area where clients can connect to a separate network Second Floor: - General Manager’s Offi...

    $27 (Avg Bid)
    $27 Avg Bid
    7 bids

    ...work to circa £1,500, possibly £2,000. A lot of what is required is basic coding but there will be some need for more senior individuals to be involved. In terms of working, I would provide detailed specs and be available most days to provide input, if required, with oversight from a senior developer in the UK. Inevitably, there will be urgent responses required at some point, such as the VM stopping but I’d expect that to be fairly rare. However, I would need estimated timelines to work to for my own planning and, whilst I wouldn’t hold anyone rigidly to these, I would need to be made aware of any changes. There needs to be decent quality control and, for an agreement, I would build in the usual boilerplate clauses around IP and data protection. ...

    $18 / hr (Avg Bid)
    $18 / hr Avg Bid
    67 bids

    I'm in need of a specialist to develop an automated interface for managing 1 Cisco switch. The purpose of this interface is primarily for configuration management. Critical features of this interface should entail: - A few ability to automatically apply configuration changes on friendly interface - Need only 5 configurations - Using Python Programming - Capacity to perform regular configuration backups saved locally A solid understanding of Cisco switch architecture and prior experience with automated interface design are required for this project. Knowledge of configuration management practices would certainly set you apart in this space. Efficiency and reliability are key here, so your ability to develop an automated solution that can streamline these processes will ...

    $28 (Avg Bid)
    $28 Avg Bid
    9 bids

    I'm dealing with a challenging issue related to my Cisco FLEX solution. Specifically, I'm unable to activate the licenses associated with my Cisco Unified Communications. The stumbling block seems to be that the activation key is not recognized. This has put a significant hold on my operations, and I'm looking for a skilled professional who can resolve this promptly. Ideal Skills & Experience: - Proficiency in configuring and troubleshooting Cisco FLEX solution - Deep understanding of Cisco Unified Communications - Ability to diagnose and rectify activation key issues I look forward to receiving your informed bid.

    $23 (Avg Bid)
    $23 Avg Bid
    5 bids

    Project Duration: 1 Hour Project Type: PHP & MySQL Server Type: Linux Ubuntu PHP Type: 8.2 & Above Number of Improvements: 4 Project Overview: We would like some modification made to two existing PHP files that: 1) Fixes a bug stopping one of the files from inserting new records into our database 2) Inserts additional data into a new db field 5* FEEDBACK WILL BE LEFT FOR YOU

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    76 bids
    Stop DDOS Attack 1 day left
    VERIFIED

    There appears to be a ddos attack on one of my servers, I have cloudflare active on all sites, and even with under attack mode on some sites, the ddos attack continues Ubuntu/Nginx server, no web panel

    $155 (Avg Bid)
    $155 Avg Bid
    21 bids

    ...machine learning system aimed at predicting heart risk issues for patients. This system is intended to primarily benefit doctors, patients, and admin workers in the medical field. Key Responsibilities: 1. Developing Predictive Models: The main objective of this system is to efficiently predict the likelihood of a patient having heart-related issues, specifically coronary artery disease, heart attacks, and arrhythmia. Expertise in machine learning algorithms and predictive modelling is crucial. 2. Integration of Data Sets: The system must be able to handle vast sources of patient data to generate accurate predictions. These include patient's medical history, lifestyle information, as well as real-time health data. Extensive knowledge in data integration and management is n...

    $153 (Avg Bid)
    $153 Avg Bid
    28 bids

    I'm looking for a knowledgeable and experienced individual to review my technical project, specifically focusing on network security, cyber attacks, and comprehensive testing. Key Requirements: - In-depth knowledge of network security, cyber attacks, and testing methodologies - Proven experience in identifying vulnerabilities and protecting against cyber attacks - Ability to conduct comprehensive testing and provide detailed reports - Experience working with Raspberry Pi and understanding its security concerns The ideal candidate will have a strong background in cyber security and will be able to provide insights and recommendations to enhance the security of the project.

    $167 (Avg Bid)
    $167 Avg Bid
    18 bids

    I am seeking an experienced network engineer who can set up a remote access VPN on my Cisco ASR1001 router. TASKS: 1. The VPN setup should specifically use L2TP/IPSec protocol. 2. The authentication should be password-based. Skills & Experience: - Expert knowledge of L2TP/IPSec VPNs - Proven experience with Cisco ASR1001 router setup - Strong understanding of password-based authentication - Good troubleshooting skills and attention to detail. Please provide examples of similar router/VPN setups you have handled.

    $335 (Avg Bid)
    $335 Avg Bid
    31 bids

    We are in urgent need of an OVH Server Security Specialist to address recurring security issues with our server. Our server has been frequently compromised by viruses, resulting in the creation of malicious files and folders across directories. Additionally, these viruses have been generating .htaccess files that block access to internal pages of o...environment and business needs. 3- Configure and optimize server settings, firewall rules, and access controls to enhance security posture and prevent future breaches. 4- Install and configure robust antivirus and malware detection solutions to proactively identify and remove malicious software. If you have the expertise and experience to secure our OVH server and protect websites from malicious attacks, please apply to this post. Be...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    10 bids

    I'm in search of an experienced Radius Server Developer who can take on a comprehensive project. create a radius server that can communicate with OLT, ROUTERS AND VM on HUAWEI, CISCO, FIBERHOME, VSOLUTION, MIKROTIK, UBIQUIT and others through PPPOE, VLAN, IPOE, HOTSPOT ETC

    $1062 (Avg Bid)
    $1062 Avg Bid
    8 bids

    ...skilled cyber security professional who can assist with ensuring the integrity and safety of our systems. The ideal candidate should have expertise in network security, application security, and data security. Key project components include: - Conducting a thorough vulnerability assessment to identify potential weaknesses in our current systems. - Performing penetration testing to simulate cyber-attacks and evaluate the effectiveness of our security measures. - Executing a comprehensive security audit to ensure that our systems are aligned with industry best practices and compliant with HIPAA, GDPR, and PCI DSS. Your role will be crucial in ensuring our organization is not only secure from cyber threats, but also in compliance with relevant regulations. Experience with these c...

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    10 bids

    I'm looking for experienced Python and Ansible experts to help me with network automation specifically focusing on Cisco switches. • Your primary task will be to automate my existing network comprising of Cisco Switch devices. • Your specialties should unquestionably include Python, Ansible, and a thorough understanding of switch automations. • Proficiency with Cisco devices is a must. This project requires someone with great attention to detail and in-depth understanding of network automation to enhance efficiency of my network devices.

    $294 (Avg Bid)
    $294 Avg Bid
    17 bids

    First, please note that I don't do business with low-ballers. This document contains all of the details of the project. I went over it extensively with the assistance of Gemini AI to make sure it was complete and thorough. So if you plan to place a low-ball price in order to get me to talk with you so you can give me your real, higher price later, don't waste your time bidding at all because...add functionality for: Capturing an image for each garden space Triggering email sending functionality 8. Security Considerations: The developer should implement security measures throughout the application: Secure storage of SMTP server credentials within a bundled configuration. Input validation for user-entered data (e.g., email address). Sanitize user input to prevent potential injec...

    $582 (Avg Bid)
    $582 Avg Bid
    100 bids

    I'm in need of an expert to analyze our Joomla website's recent spike in traffic. I'm concerned whether this is genuine or bot-generated. This is a high-priority task for me, and I need immediate action. Key Tasks: - Verify i...bot-generated - Implement necessary security measures to prevent future bot traffic - Restore the website online and ensure it can handle an increased traffic load Ideal Freelancer: - Proficient in Joomla and its security features - Experienced in analyzing web traffic and differentiating bot-generated traffic from genuine - Familiar with implementing security measures to protect websites from bot attacks - Available to tackle this issue urgently If you're confident in your abilities to address these requirements promptly and effectivel...

    $140 (Avg Bid)
    $140 Avg Bid
    65 bids

    ...http://localhost:54801/__devtools__/ as a separate window 2024-05-09T03:45:06.634816+00:00 app[web.1]: ➜ Vue DevTools: Press Alt(⌥)+Shift(⇧)+D in App to toggle the Vue DevTools 2024-05-09T03:45:06.634816+00:00 app[web.1]: 2024-05-09T03:46:05.561388+00:00 heroku[web.1]: Error R10 (Boot timeout) -> Web process failed to bind to $PORT within 60 seconds of launch 2024-05-09T03:46:05.574879+00:00 heroku[web.1]: Stopping process with SIGKILL 2024-05-09T03:46:05.660887+00:00 heroku[web.1]: Process exited with status 137 2024-05-09T03:46:05.685307+00:00 heroku[web.1]: State changed from starting to crashed 2024-05-09T03:47:59.261592+00:00 heroku[router]: at=error code=H10 desc="App crashed" method=GET path="/" host= request_id=b0da96d1-687e-42ca-bc8f-20a9cce116f4 ...

    $34 (Avg Bid)
    $34 Avg Bid
    15 bids

    I'm in need of a cybersecurity expert who is well-versed with Microsoft Office 365. I've recently received an O365 login repo...with detailed written feedback. The questioned application activity is highlighted in red. - I do not require ongoing monitoring, so this will be a one-time project. Ideal Skills & Experience: - Proficiency in Microsoft Office 365 is a must. You should have deep understanding of the platform and its security features. - Extensive experience in cybersecurity, particularly in dealing with shell attacks and access logs. - Strong analytical and reporting skills. You have to be able to translate your findings into a comprehensive, detailed report. Your analysis and insights will be crucial for me to ensure the security of my systems. Looking forw...

    $74 (Avg Bid)
    $74 Avg Bid
    18 bids

    I'm in need of an hack...penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are crucial for ...

    $100 (Avg Bid)
    $100 Avg Bid
    16 bids

    I'm currently facing potential malware attacks causing unexpected slowdowns, particularly affecting my website load times. Hence, I'm in urgent need of a knowledgeable cyber security professional who can identify and rectify issues within my server files. Key Responsibilities: - Investigate the root cause for the slowdown of the website load times - Pinpoint potential malware in server files - Advance and fortify the security system to prevent future occurrences Ideal Skills: - Proficiency in cybersecurity - Solid understanding of server operations, particularly SQL - Experience in malware detection and prevention Your task: Use your expertise to bring back operational efficiency and bolster my domains server's security. If you can catch the malware predator an...

    $111 (Avg Bid)
    $111 Avg Bid
    8 bids

    I'm looking to initiate a pilot project for integrating my Cisco systems with temperature sensors. The main goal of this integration is to have a real-time display of temperature data in a dashboard, which will be critical for monitoring and decision-making. Key Requirements: - The project will involve setting up the necessary connections between my Cisco systems and temperature sensors, leveraging API for seamless communication. - The data received from the sensors should be visualized effectively on a dashboard. The preferred visualization method for the temperature data is graphs, which should be clear and easy to read. Ideal Skills and Experience: - Proficiency in Cisco systems and API integration. - Proven experience with temperature sensors and real-time d...

    $266 (Avg Bid)
    $266 Avg Bid
    24 bids

    ...control over the positioning and orientation of objects within the machine's workspace. 4. **Directional Flexibility**: The actuators are equipped to move in multiple directions within a circular disk, offering flexibility in maneuvering objects along curved or circular paths. This capability enables complex motion patterns and trajectories to be executed with precision. 5. **Coordinated Stopping**: To prevent collisions or interference between moving components, the control system is programmed to stop specific actuators when others are in motion. For example, when actuators are moving southward, those moving northward will halt to avoid conflicts in motion. 6. **Adjustable Speed**: The control panel allows for the adjustment of each actuator's speed independe...

    $2914 (Avg Bid)
    $2914 Avg Bid
    16 bids

    Hi i need Someone who can create on Cisco N5K-C5548UP QoS profiles so i can rate limit Interfaces to 1Gbit Up and 1gbit down. And Same for 2gbit Up and 2gbit down. Someone that has experiences and can create such profiles so i can apply them on Interfaces If needed. Please let me know and consult.

    $143 (Avg Bid)
    $143 Avg Bid
    27 bids

    Join Our Team at ETI - Your Gateway to Success in Networking! Position: Sales Executive (Commission-Based) Company Overview: ETI (Expert Technologie Informatique) is a leading network training center specializing in CISCO certification programs, including CCNA, CCNP, and CCIE. With a reputation for excellence and a commitment to empowering professionals with cutting-edge networking skills, we offer comprehensive training solutions tailored to individual and corporate needs. Job Description: We are seeking a dynamic and results-driven Sales Executive to join our team on a commission-based arrangement. As a Sales Executive, you will be responsible for identifying and acquiring new clients for our CCNA, CCNP, and CCIE training programs. Leveraging your sales expertise and networking sk...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    8 bids

    ...conscious organization, we're hiring a cybersecurity expert for a comprehensive penetration testing on our Linux-based system. Emphasis lies primarily on our web-based applications, with the aim to identify and eradicate any potential vulnerabilities. Key Tasks: - Perform Open Source Intelligence (OSINT) - Port scanning - Man-in-the-middle (MiTM) attack simulation - Focus intensively on injection attacks (SQL, XSS) - Authentication and session management puncturing - Cross-Site Scripting (XSS) evaluation The ideal freelancer will have: - Strong experience in cybersecurity and penetration testing - Excellent knowledge and experience with Linux-based systems - Proven experience in web application security testing - Firm understanding of SQL, XSS and authentication vulnerabil...

    $628 (Avg Bid)
    NDA
    $628 Avg Bid
    13 bids

    ...hashing and the use of access tokens, to prevent unauthorized access. 5. Input Validation and Sanitization: To mitigate the risk of security vulnerabilities, the application will implement strict input validation and sanitization techniques. This section emphasizes the importance of validating user input to prevent common vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. 6. Secure Transaction Processing: The application will incorporate secure transaction processing mechanisms to ensure the integrity and confidentiality of financial transactions. This section discusses the implementation of secure communication protocols, such as HTTPS, to protect sensitive data during transit. It also highlights the need for transaction validation and auditin...

    $289 (Avg Bid)
    $289 Avg Bid
    9 bids

    ...experience with Cisco Packet Tracer, specifically in implementing complex network security measures such as network routing, VLAN configuration, firewall setup, VPN, assigning IP addresses and implementing network-based firewalls. The ability to successfully ping is crucial. The right candidate must also be well versed in the Open Shortest Path First (OSPF) for routing protocols. Your role will involve: - Designing and implementing complex network models - Configuring OSPF as the routing protocol - Assigning IP addresses across all devices - Installing and setting up firewalls to protect the network - Configuring VLANs to segment network traffic - Ensuring successful ping across all devices - Setting up VPN for secure remote access Solid knowledge and experience with OSPF and...

    $40 (Avg Bid)
    $40 Avg Bid
    12 bids

    ...recycling company 'Matt-Less' and would like a male character creating as the 'face' of our brand. The idea in our head is along the lines of Peter Perfect from the Wacky Races cartoon series, a dapper, good looking, smooth 'hunk', attractive to girls, chivalrous, charming, witty, immaculately presented and successful. He is a winner, a racecar driver, Peter had a crush on Penelope Pitstop, often stopping to help her; Sometimes Peter Perfect demonstrated an unusual elasticity ability, although this seemed to be just a gag. Despite numerous mechanical mishaps and other incidents, Peter always keeps a cheerful demeanor and lives up to his image as the perfect gentleman. He's been shown as being unnaturally strong and is able to lift boulders ...

    $111 (Avg Bid)
    $111 Avg Bid
    172 bids

    ...crucial project, we aim to significantly improve the cybersecurity of data stored on the Google Cloud Platform (GCP), using cutting-edge artificial intelligence methods. Our main goals are as follows: - Use Machine Learning and Deep Learning to detect and mitigate any potential cyber threats before they occur. - Utilize AI to predict and intercept Unauthorized Access, Data Breaches, and Malware Attacks, thereby bolstering our defense mechanisms. The ideal candidate will be proficient in AI, specifically Machine Learning and Deep Learning, and have extensive knowledge of cybersecurity on clouds. Experience with GCP would be a valuable advantage. It's essential for the chosen freelancer to be adept at translating complex AI algorithms into practical cybersecurity solutions. ...

    $1185 (Avg Bid)
    $1185 Avg Bid
    48 bids

    ...is used on a pump body. The size of the motor is about 15cm × 15cm, which can achieve levitation and rotation. . Smooth operation of the rotor is crucial. We plan to mount a turbine rotor on the motor rotor so that it can rotate and pump liquid, just like a pump. We plan to add multiple sensors to the rotor to detect its position and height. Also, we want to be able to control the starting and stopping of the motor via an external button. These are the goals of our project....

    $174 (Avg Bid)
    $174 Avg Bid
    12 bids

    Check existing config. Create VLANs, IDs and name tag based on the existing design. Configure and test Device. Then move onto the next VLAN and so on. Both Console and Web interface available. Trunk Ports required for new APs. Switches will include Stackable Sg350x. I also have a number of HP Procurves but not to worry if these are not possible.

    $83 (Avg Bid)
    $83 Avg Bid
    19 bids

    I'm looking for an experienced Python developer with knowledge in SAN switch health checks to write a script for automating my Cisco switch health checkup. The script will need to automate several tasks including: - Gathering output of overall switch health - Checking the conditions of each hardware status - send an automatic email via outlook I would like to see applicants demonstrate their experience in writing similar scripts, and especially in performing SAN switch health checks. Your familiarity with Python scripting and Cisco products will be vital for this project. Your application should reflect your past experience in the area. I am eager to see your detailed project proposals to assist in making an informed decision. Is this a task you can confidently deliver...

    $13 (Avg Bid)
    $13 Avg Bid
    4 bids

    Cisco SG350x Health check. Pull out an audit. Currently unplugged. Needs approval before we put it back online. Copy same config as the others on the same VLANs are working.

    $127 (Avg Bid)
    $127 Avg Bid
    13 bids

    Hi there, I’m just looking for someone to assist with configuring Mac Address Bypass (MAB) on our existing Cisco ISE server and Cisco 9200 switch today. If you have any experience setting it up and have ideas on best practises, plesse reach out, thanks

    $25 / hr (Avg Bid)
    $25 / hr Avg Bid
    13 bids