Problem Solver

Herman Nghidipaa

Herman Nghidipaa

Areas Herman Nghidipaa is Knowledgeable in:

Cyber Security,
Deep Learning,
and Problems solving

Techniques Herman Nghidipaa Uses:

Threat Modeling: This technique involves identifying potential threats to a system or network and assessing the likelihood and impact of those threats. This can help to prioritize security measures and to develop effective mitigation strategies.

Risk Assessment: This technique involves identifying potential risks to a system or network, evaluating the likelihood and impact of those risks, and developing strategies to mitigate or avoid them. This process can help to identify and prioritize security measures based on their potential impact.

Incident Response Planning: This technique involves developing a plan for responding to security incidents, including identifying roles and responsibilities, establishing communication protocols, and developing a process for addressing the incident. Having a well-defined incident response plan in place can help to minimize the impact of a security breach and reduce the time required to recover from an incident.

Penetration Testing: This technique involves simulating an attack on a system or network to identify vulnerabilities and assess the effectiveness of existing security measures. Penetration testing can help to identify weaknesses in a system and to develop effective mitigation strategies.

Defense-in-Depth: This technique involves implementing multiple layers of security measures to protect a system or network. This approach can help to ensure that a single vulnerability or attack does not compromise the entire system and can help to minimize the impact of security breaches.

Herman Nghidipaa's Problem Solving Skills:

  1. Intrusion Analysis
  2. Problem Solver
  3. Research and Analytic Thinking
  4. Operating Systems
  5. Web Technology
  6. Wireless Technology
  7. Forensic Investigation
  8. Research
  9. Network Security

Herman Nghidipaa's Problem Solving Experience:

  1. I was responsible for investigating a potential phishing attack targeting our organization's employees. I quickly analyzed the suspicious email and identified key indicators that it was indeed a phishing attempt. I then led a training session for all employees to raise awareness about the dangers of phishing and how to spot and report suspicious emails, effectively preventing a potential data breach.