CERTIFICATIONS

At Aumakua Technical Solutions, our personnel hold top level certifications to ensure we are trained and up-to-date on all aspects of cyber security and intelligence.

The mobile security of the network helps to ensure that the security of the network is not compromised by the mobile devices, their applications, and their connections.

Knowledge of the following:

  • Technology: The technologies involved in the system include the cellular concept, sector and omnidirectional cells, the reuse of frequencies, and the splitting of cells
  • Mobile Architecture: A mobile architecture includes MSCs, GMSCs, HLRs, VLRs, AUCs, EIRs, BSCs, BTSs, IWFs (fax and data calls), MINs, and Identity Numbers
  • Over-the-Air-Interface: An Over-the-Air (OTA) interface contains the following elements: frequency bands, FDMA and radio channels, TDMA and physical channels, hopping physical channels, logical channels, channel mapping, and burst structure
  • Radio Transmission: There are several types of path loss, attenuation, shadowing, interferences, multipath fading, as well as solutions to transmission difficulties: dynamic power regulation, channel coding, interleaving, antenna diversity, frequency hopping, adaptive equalization, timing advance; speech coding, modulation.
  • Traffic: The establishment of radio connections, updating of location information, detachment of IMSI, handover of calls, SMS messages, international roaming, and billing
  • Security: Authentication and ciphering, equipment checking, and AUC functions
  • Base Transceiver Stations: Its functions, its classification, the hardware design, the antenna configuration, and the transmission network topology

Knowledge of the following:

  • Current CDMA technology from a technical and business perspective, beginning with CDMA fundamentals and the 2G IS-95 standard, to a comprehensive understanding of 3G CDMA2000 and wideband 3G CDMA (WCDMA) in UMTS/HSPA/HSPA+ deployments and implementation

Knowledge of the following:

  • The technical differences between UMTS, HSPA, and HSPA+ technology and their evolution.
  • UMTS is the Universal Mobile Telecommunications System, which introduces the process of linking to 3G systems, High Speed Packet Access (HSPA) and HSPA+ networks.

Knowledge of the following: 

  • The many essential elements of Long Term Evolution (LTE), including the foundations of LTE, LTE RAN, OFDMA/SC-FDMA concepts, a brief introduction to MIMO, a planning process for LTE cells, capacity planning for LTE cells, EPC, IMS, Diameter, EPC Signaling, Security, Voice over LTE, a number of advanced features of LTE, microwave and metro Ethernet backhauls, PPE-TE, MPLS-TP, etc.

Knowledge in the following: 

  • A wireless LAN infrastructure based on EEE 802.11ax enabling enterprises and service providers to support new and emerging applications, while delivering a higher quality of service for older applications. 
  • The new standard for wireless LANs (IEEE 802.11ax) allowing access points to support an increased number of clients in dense environments which result in a better user experience for typical wireless LANs. As a result, features such as 4K video, Ultra HD, wireless office, and Internet of Things (IoT) can be operated more predictably for advanced applications

Security of data and hardware connected to the internet, including hardware, software, and data, refers to preventing hackers from obtaining access to that information.

Knowledge of the following:

Viruses, worms, spyware and other types of malicious software fall under the category of malware. It is the action of clicking on a malicious link or attachment on a webpage that activates malware, which then leads to the installation of dangerous software on your computer. As per Cisco reports, malware can be used in the following ways once it has been activated:

  • The blockage of key components of the network (ransomware)
  • The installation of additional harmful software
  • Transmit data from the hard drive in order to obtain information covertly (spyware)
  • The system is rendered inoperable as a result of disruption of individual components

Knowledge of the following:

  • According to the Cybersecurity and Infrastructure Security Agency (CISA), Emotet “is a highly sophisticated, modular banking Trojan that primarily functions as a dropper or downloader of other banking Trojans that appears to be related to banking. As a result, Emotet has been consistently classified as one of the most destructive and costly malware programs.”

Knowledge of the following:

Cyber attacks that cause a denial of service.
 
  • DoS: Denial of Service cause computers and networks to be unable to respond to requests. An attack originating from a computer network is called a distributed DoS (DDoS). 
  • Flood Attacks: It is common for cyber attackers to perform a DoS through the use of a flood attack. Cyber attackers may employ several other techniques, and some are able to launch other attacks during the period when the network is down. 
  • Botnets: A botnet, sometimes also referred to as a zombie system, is part of a network whose goal is to overwhelm the processing power of its target. There are many botnets located all around the world, making it nearly impossible to identify them.

Knowledge in the following: 

Man-in-the-middle Attacks: When hackers manipulate a two-way interaction between two parties in order to gain access to sensitive data by filtering and stealing data after interrupting the traffic they are feeding through

Knowledge in the following: 

  • Attacks that are carried out by using fake communication, such as an email, to trick the recipient into opening the email and doing what it instructs them to do, including providing their credit card information.

Knowledge in the following:

  • The injection of Structured Query Language (SQL) into a server, which is one of the most common types of cyber attacks, results from insertion of malicious code into the database of the server. Infected servers release information when they become infected with a virus.

Knowledge in the following: 

Social Engineering: It is common for cyber attackers to use social engineering techniques as a form of password attack, and Data Insider defines it as a strategy in which attackers use people to trick them into breaking standard security procedures. In addition to accessing a password database or guessing the password outright, there are other types of password attacks.

Knowledge in the following:

  • Access points for hackers exist in devices that connect to the internet or other networks. According to a report by Cytelligence, hackers redirected their attention to smart homes and IoT devices in 2019, such as smart TVs, voice assistants, connected baby monitors and smartphones, as well as smart homes and IoT devices. 

Knowledge in the following: 

  • Cyber attackers are more likely to find an entry point into a network if they can gain access to personal devices such as laptops and cellphones which store data, as these small devices are easy to access.

Certification process that is used to verify the authenticity of digital assets and to keep systems and data secure from malicious actors.

Knowledge in the following: 

  • Mission Training: Agency Certified Training (Train the Trainers)

Knowledge in the following: 

  • Training certification in ensuring systems and networks are secure and reliable and that data and information is being transmitted safely.

Knowledge in the following: 

  • Training certification in ensuring that the processes and systems involved in a particular process are secure.

Knowledge in the following: 

  • Defense against malicious actors: Security system that uses a combination of hardware and software to detect and prevent malicious activity.

Knowledge in the following: 

  • Process of verifying the authenticity of systems and testing a product or service to ensure it meets certain criteria before issuing a certificate of compliance.

Knowledge in the following: 

  • Using advanced technology to verify the authenticity of a product or service to ensure the product or service meets certain security and privacy standards according to industry and legal regulations.

Knowledge in the following: 

  • Using encryption to protect data from being intercepted, manipulated or tampered by cybercriminals.

Knowledge in the following: 

  • Comprehensive approach with the implementation of multiple security measures and technologies, including: encryption, authentication, access control, and other measures. This certification also requires the use of advanced monitoring and detection systems to detect and respond to threats in a timely manner.

Share this:

stay one step
   ahead of hackers

Protect Your Reputation and Customers from Cybercriminals by Training with ATS!

Act Now to Safeguard Your Data and Network from Cyber Attacks

We will not send you spam. Our team will be in touch within 24 to 48 hours Mon-Fri (but often much quicker)
Thanks for reaching out to ATS for your cybersecurity needs! Our experts will make contact with you soon.