{"id":20,"date":"2016-03-18T13:46:13","date_gmt":"2016-03-18T13:46:13","guid":{"rendered":"http:\/\/fourtytwo.me\/wp\/?page_id=20"},"modified":"2025-01-03T09:34:06","modified_gmt":"2025-01-03T09:34:06","slug":"knowledge","status":"publish","type":"page","link":"https:\/\/fourtytwo.me\/?page_id=20","title":{"rendered":"Knowledge"},"content":{"rendered":"<p>Knowledge (Netzwerk):<\/p>\n<ul>\n<li>ISO\/OSI-Schichtmodell (Layer 1 &#8211; 7)<\/li>\n<li>TCP\/IP<\/li>\n<li>Verschiedene Routingprotokolle<\/li>\n<li>High-Availability L\u00f6sungen (bspw. VRRP, CARP u.a.)<\/li>\n<\/ul>\n<p>Knowledge (Betriebssysteme):<\/p>\n<ul>\n<li>Oracle Solaris<\/li>\n<li>Checkpoint IPSO<\/li>\n<li>Checkpoint GAIA<\/li>\n<li>Checkpoint VSX<\/li>\n<li>CISCO PIX OS<\/li>\n<li>CISCO IOS<\/li>\n<li>FortiOS<\/li>\n<li>Screen OS<\/li>\n<li>JunOS<\/li>\n<li>F5 TMOS<\/li>\n<li>RedHat Enterprise Linux<\/li>\n<li>*BSD<\/li>\n<li>Verschiedene andere Linux Distributionen<\/li>\n<\/ul>\n<p>Knowledge (Tools):<\/p>\n<ul>\n<li>SIEM (QRadar, SPLUNK und Alienvault)<\/li>\n<li>Loganalyse (SPLUNK)<\/li>\n<li>Verinice IT-Grundschutz Tool<\/li>\n<li>Kommandozeilentools: ping, dig, nslookup, telnet, traceroute, route, netstat, tcpdump<\/li>\n<li>Wireshark, tshark<\/li>\n<li>DDI-L\u00f6sungen infoblox und Men &amp; Mice<\/li>\n<\/ul>\n<p>Als Consultant verf\u00fcge ich \u00fcber langj\u00e4hrige Erfahrung mit folgenden IT Security Produkten:<\/p>\n<ul>\n<li>Checkpoint Firewall (4.1 &#8211; R81.20, MDS [Multi Domain Server], VSX)<\/li>\n<li>FortiGate Firewalls<\/li>\n<li>Juniper Netscreen Firewalls<\/li>\n<li>Cisco PIX und Cisco ASA Firewalls<\/li>\n<li>PaloAlto NG Firewall<\/li>\n<li>PulseSecure und Juniper SSL-VPN<\/li>\n<li>Bluecoat Proxy L\u00f6sungen<\/li>\n<li>AlienVault Unified Security Management<\/li>\n<li>SPLUNK Loganalyse<\/li>\n<\/ul>\n<p>Als Consultant verf\u00fcge ich \u00fcber langj\u00e4hrige Erfahrung mit folgenden Groupware Komponenten:<\/p>\n<ul>\n<li>Open-Xchange (7.10.3 und 7.10.4)<\/li>\n<li>Dovecot IMAP Server<\/li>\n<li>Cyrus-Imapd<\/li>\n<li>Postfix MTA<\/li>\n<li>rspamd<\/li>\n<li>MariaDB \/ MariaDB Galera Cluster<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Knowledge (Netzwerk): ISO\/OSI-Schichtmodell (Layer 1 &#8211; 7) TCP\/IP Verschiedene Routingprotokolle High-Availability L\u00f6sungen (bspw. VRRP, CARP u.a.) Knowledge (Betriebssysteme): Oracle Solaris Checkpoint IPSO Checkpoint GAIA Checkpoint VSX CISCO PIX OS CISCO IOS FortiOS<a class=\"moretag\" href=\"https:\/\/fourtytwo.me\/?page_id=20\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"page-sidebar.php","meta":{"footnotes":""},"class_list":["post-20","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fourtytwo.me\/index.php?rest_route=\/wp\/v2\/pages\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourtytwo.me\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fourtytwo.me\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fourtytwo.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fourtytwo.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20"}],"version-history":[{"count":4,"href":"https:\/\/fourtytwo.me\/index.php?rest_route=\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":276,"href":"https:\/\/fourtytwo.me\/index.php?rest_route=\/wp\/v2\/pages\/20\/revisions\/276"}],"wp:attachment":[{"href":"https:\/\/fourtytwo.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}