ICT Architecture and Projects Internship
United Nations Development Programme
Copenhagen, Denmark
21 dni temu
... of common network security threats (malware, exploits, backdoors, DDoS attacks, phishing, botnets, etc.), and mitigation strategies is preferred. br * Understanding of Zero Trust Architecture principles like least privilege access, continuous verification ...
www.iagora.com