Draft:Alfred Basta
Draft article not currently submitted for review.
This is a draft Articles for creation (AfC) submission. It is not currently pending review. While there are no deadlines, abandoned drafts may be deleted after six months. To edit the draft click on the "Edit" tab at the top of the window. To be accepted, a draft should:
It is strongly discouraged to write about yourself, your business or employer. If you do so, you must declare it. Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
Last edited by Jlwoodwa (talk | contribs) 56 days ago. (Update) |
Dr. Alfred Basta is a professor, mathematician, cryptologist, and musician. Alfred is best known for his books on cybersecurity, presentations about the future of cybersecurity, and for being the most certified cybersecurity professional in the world.
According to Academia.edu, Alfred’s work has been cited in 13,546 papers as of May 2022 https://www.academia.edu/upgrade?feature=name_mentions&trigger=mentions-reminder-readers
Certifications
1. ISO 27001:2022 Lead Auditor
2. GIAC Security Leadership (GSLC)
3. Certified CMMC Professional (CCP)
4. Offensive Security Certified Professional (OSCP)
5. Certified Red Team Operator (CRTO) (48-hour exam)
6. Certified Data Privacy Solutions Engineer (CDPSE)
7. EC-Council's Certified Chief Information Security Officer (CCISO)
8. Certified HIPAA Privacy Security Expert (CHPSE)
9. ECCouncil Computer Hacking Forensic Investigator (CHFI)
10. EC-Council Certified Security Analyst (ECSA)
11. EC-Council Certified Ethical Hacker (CEH)
12. EC-Council Certified Incident Handler Certification (ECIH)
13. EC-Council Certified Cloud Security Engineer (CCSE)
14. Certified Penetration Testing Professional (CPENT)
15. Licensed Penetration Tester (Master)
16. Certified Information Security Manager (CISM)
17. Certified in Governance of Enterprise IT (CGEIT)
18. Certified Information Systems Auditor (CISA)
19. Certified in Risk and Information Systems Control (CRISC)
20. AWS Certified Solutions Architect Professional (SAP)
21. Microsoft Certified: Security Operations Analyst Associate
22. Microsoft 365 Certified: Security Administrator Associate
23. Microsoft Certified: Azure Security Engineer Associate
24. The Project Management Professional (PMP)
25. CompTIA A+ ce
26. CompTIA Security Analytics Professional – CSAP
27. CompTIA Network Vulnerability Assessment Professional – CNVP
28. CompTIA IT Operations Specialist – CIOS
29. CompTIA Secure Cloud Professional – CSCP
30. CompTIA Infrastructure Security Expert – CSIE
31. CompTIA Security Analytics Expert – CSAE
32. CompTIA Secure Infrastructure Specialist – CSIS
33. CompTIA Network Security Professional CNSP
34. CompTIA Security+ ce
35. CompTIA Linux+ ce
36. CompTIA PenTest+ ce
37. CompTIA Advanced Security Practitioner ce (CASP+)
38. CompTIA CySA+ ce
39. CompTIA Cloud+ ce
40. CompTIA Network + ce
41. CompTIA Cloud Admin Professional – CCAP
42. CompTIA Linux Network Professional – CLNP
43. CompTIA Systems Support Specialist – CSSS
44. ISC2 Cryptography
45. ISC2 NIST Cybersecurity Framework
46. Google Cloud Certified Professional Data Engineer
47. Google Cloud Certified Professional Cloud Architect
48. Certified Professional Python Programmer (CPPP)
49. Certified of Cloud Security Knowledge CCSK
50. IASSC Certified Six Sigma Black Belt – ICBB
51. ITIL Foundation Certification in IT Service Management
52. PRINCE2 Foundation Certificate in Project Management
53. Infosec Ethical Hacking Process
54. Infosec PMP Project Management
Books
1. Pen Testing from Contract to Report
https://www.wiley.com/en-us/Pen+Testing+from+Contract+to+Report-p-9781394176809
2. Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
https://www.wiley.com/en-us/Open-Source+Security+Operations+Center+(SOC)%3A+A+Complete+Guide+to+Establishing%2C+Managing%2C+and+Maintaining+a+Modern+SOC-p-9781394201600
3. Computer Security and Penetration Testing
https://www.cengage.com/c/computer-security-and-penetration-testing-2e-basta/9780840020932PF/
4. Mathematics for Information Technology | 1st Edition
https://www.cengage.com/c/mathematics-for-information-technology-1e-basta/9781111127831PF/
5. Linux Operations and Administration | 1st Edition
https://www.cengage.com/c/linux-operations-and-administration-1e-basta/9781111035303PF/
6. Database Security | 1st Edition
https://www.cengage.com/c/database-security-1e-basta/9781435453906PF/
7. IT 대학기초수학
https://library.kongju.ac.kr/#/search/detail/3527254?offset=1
https://front.wemakeprice.com/product/155091913
8. Hacker Techniques and Incident Handling
ISBN-13: 978-0-07-354205-8, ISBN: 0-07-354205-9
https://www.isbns.net/isbn/9780073542058/
https://www.gettextbooks.com/isbn/9780073542058/
9. Segurança de Computadores e Teste de Invasão(1st Edition)
ISBN-13: 978-85-221-1799-4, ISBN: 85-221-1799-3
https://www.isbns.net/isbn/9788522117994/
https://www.abebooks.com/servlet/BookDetailsPL?bi=31186584579&searchurl=an%3Dalfred%2Bbasta%26sortby%3D17&cm_sp=snippet-_-srp1-_-title9
https://www.gettextbooks.com/isbn/9788522117994/
https://www.bookdepository.com/SEGURAN%C3%87A-DE-COMPUTADORES-E-TESTE-DE-INVASAO-Basta-Alfred/9788522117994?ref=grid-view&qid=1653165222931&sr=1-3
10. Autodesk Inventor 2012 e Inventor Lt 2012. Essencial - SÃ rie Guia de Treinamento Oficial(1st Edition)
ISBN-13: 978-85-407-0086-4, ISBN: 85-407-0086-7
https://www.isbns.net/isbn/9788540700864/
https://www.gettextbooks.com/isbn/9788540700864/
11. Cyber Security and Cyber Laws
ISBN-13: 978-93-87511-67-5, ISBN: 93-87511-67-7
https://www.isbns.net/isbn/9789387511675/
https://www.bookdepository.com/Cyber-Security-Cyber-Laws-Alfred-Basta/9789387511675?ref=grid-view&qid=1653165222931&sr=1-4
12. Computer Security
https://www.amazon.com/COMPUTER-SECURITY-Alfred-Basta-Halton/dp/8131507750/ref=sr_1_10?qid=1653165573&refinements=p_27%3AAlfred+Basta&s=books&sr=1-10
https://www.gettextbooks.com/isbn/9788131507759/
13. Computer Security: Concepts, Issues, and Implementation
ISBN-10: 81-315-0689-4 / 8131506894
ISBN-13: 978-81-315-0689-9 / 9788131506899
https://www.gettextbooks.com/isbn/9788131506899/
https://www.bookdepository.com/Computer-Security-Alfred-Basta/9788131507759?ref=grid-view&qid=1653165222931&sr=1-8
14. Voice and Data Integration
ISBN: 0073542075
https://www.paperbackswap.com/VoiceData-Integration/book/0073542075/
15. Firewall and Bastion Hosts
ISBN: 9781424085309
16. Hacker Techniques and Incident Handling
ISBN: 0073542059
Contributions
1. EC-Council CPENT Scheme Committee Chair
https://cert.eccouncil.org/cpent-scheme-committee.html
2. CCSK v5 contributor
Interviews
1. Protecting Your Computer and Yourself from Malware: Expert Advice by Alfred Basta
https://www.youtube.com/watch?v=Ig_vCl4mn14
2. Why the C|PENT Stands Out from Other Industry Certifications | Alfred Basta’s C|PENT Success Story
https://www.youtube.com/watch?v=ryhiw9b96Rc
3. CPENT vs. OSCP: The Ultimate Penetration Testing Showdown | Unbiased Comparison by Alfred Basta
https://www.youtube.com/watch?v=mNPP_D5K04U
== References ==
https://en.wikipedia.org/wiki/Set_(mathematics)
https://en.wikipedia.org/wiki/As_a_service