{"id":5060,"date":"2019-10-21T09:21:10","date_gmt":"2019-10-21T09:21:10","guid":{"rendered":"http:\/\/shopifycoders.in\/demo\/nordiccyber\/?page_id=5060"},"modified":"2021-07-02T13:03:55","modified_gmt":"2021-07-02T13:03:55","slug":"about-me","status":"publish","type":"page","link":"https:\/\/nordicresilience.dk\/da\/about-me\/","title":{"rendered":"OM"},"content":{"rendered":"[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1572593449401{padding-top: 50px !important;padding-bottom: 10px !important;background-color: #223147 !important;}&#8221;][vc_column 0=&#8221;&#8221;]<div class=\"vcex-module vcex-heading vcex-heading-plain\" style=\"color:#ffffff;font-family:&quot;Quantico&quot;;font-size:32px;font-weight:700;text-align:center;\"><span class=\"vcex-heading-inner clr\">ERFARING<\/span><\/div>[vc_raw_html 0=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJ0aXRsZS1ib3JkZXJlZCUyMiUzRSUwQSUzQ2RpdiUyMGNsYXNzJTNEJTIydGl0bGUtaW5uZXIlMjIlM0UlM0MlMkZkaXYlM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text text_align=&#8221;center&#8221; width=&#8221;815px&#8221;]Med over 200 gennemf\u00f8rte penetrationstest har vi hos Nordic Resilience en solid og trov\u00e6rdig erfaring, som du kan f\u00e5 gavn af.<br \/>\nDisse penetrationstest har v\u00e6ret gennemf\u00f8rt i mange forskellige industrielle, teknologiske og offentlige omr\u00e5der s\u00e5som:[\/vc_column_text]<div class=\"vcex-spacing\" style=\"height:50px\"><\/div>[vc_row_inner el_id=&#8221;experience-list&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"vcex-module vcex-list_item\">Finansiel sektor<\/div><div class=\"vcex-module vcex-list_item\">Online gambling<\/div><div class=\"vcex-module vcex-list_item\">Forsikringsbranchen<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"vcex-module vcex-list_item\">Telekommunikation<\/div><div class=\"vcex-module vcex-list_item\">Kommunal sektor<\/div><div class=\"vcex-module vcex-list_item\">Grossister<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][vc_column_text text_align=&#8221;left&#8221; el_class=&#8221;810px&#8221; width=&#8221;815px&#8221;]\n<p style=\"text-align: justify;\">Vores brede viden med penetrationstest har medf\u00f8rt at vi har erfaring med tests af bl.a. h\u00e6veautomater, centrale finansielle systemer, finansiel investeringsplatform, online-casino og store kommercielle softwarel\u00f8sninger s\u00e5som Salesforce.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1571812912341{padding-top: 100px !important;padding-bottom: 60px !important;background-color: #111d2e !important;}&#8221;][vc_column width=&#8221;4\/12&#8243;]<div class=\"vcex-module vcex-heading vcex-heading-plain\" style=\"color:#ffffff;font-family:&quot;Quantico&quot;;font-size:32px;font-weight:700;\"><span class=\"vcex-heading-inner clr\">MISSION &amp; VISION<\/span><\/div><div class=\"vcex-spacing\" style=\"height:30px\"><\/div>[vc_raw_html 0=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJ0aXRsZS1ib3JkZXJlZDElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMnRpdGxlLWlubmVyMSUyMiUzRSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html]<div class=\"vcex-spacing\" style=\"height:40px\"><\/div>[vc_single_image image=&#8221;5203&#8243; alignment=&#8221;center&#8221; el_class=&#8221;vision-img&#8221;][\/vc_column][vc_column width=&#8221;8\/12&#8243;]<div class=\"vcex-module vcex-heading vcex-heading-plain\" style=\"color:#ffffff;font-family:&quot;Quantico&quot;;font-size:18px;font-weight:700;\"><span class=\"vcex-heading-inner clr\">MISSIONEN FOR NORDIC RESILIENCE<\/span><\/div><div class=\"vcex-spacing\" style=\"height:20px\"><\/div>[vc_column_text 0=&#8221;&#8221;]Nordic Resilience \u00f8nsker at assistere organisationer med at styrke deres cybersikkerhed, via analyser og vejledning. Det er vores overbevisning, at digitale information aldrig skal udg\u00f8re en un\u00f8dig risiko for organisationers fortrolighed, integritet og\/eller tilg\u00e6ngelighed.[\/vc_column_text]<div class=\"vcex-spacing\" style=\"height:50px\"><\/div><div class=\"vcex-module vcex-heading vcex-heading-plain\" style=\"color:#ffffff;font-family:&quot;Quantico&quot;;font-size:18px;font-weight:700;\"><span class=\"vcex-heading-inner clr\">VISIONEN FOR NORDIC RESILIENCE<\/span><\/div><div class=\"vcex-spacing\" style=\"height:20px\"><\/div>[vc_column_text 0=&#8221;&#8221;]En tryggere digital verden er en bedre verden. Vores form\u00e5l er at bidrage til udviklingen af en tryggere digital verden, med \u00e9t betydningsfuldt skridt af gangen.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1575268384543{padding-top: 100px !important;}&#8221;][vc_column 0=&#8221;&#8221;]<div class=\"vcex-module vcex-heading vcex-heading-plain\" style=\"color:#ffffff;font-family:&quot;Quantico&quot;;font-size:32px;font-weight:700;text-align:center;\"><span class=\"vcex-heading-inner clr\">CERTIFICERINGER<\/span><\/div>[vc_raw_html 0=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJ0aXRsZS1ib3JkZXJlZCUyMiUzRSUwQSUzQ2RpdiUyMGNsYXNzJTNEJTIydGl0bGUtaW5uZXIlMjIlM0UlM0MlMkZkaXYlM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html]<div class=\"vcex-spacing\" style=\"height:30px\"><\/div>[vc_row_inner el_id=&#8221;certificates&#8221;][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2019\/10\/eWPT_v1_certificate.png\" width=\"994\" height=\"782\" alt=\"EWPT V1 Certificate\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"font-family:&quot;Quantico&quot;;color:#ffffff;font-size:25px;\">eLearnSecurity - Web Application Penetration Testing (eWPT)<\/h2><div class=\"vcex-feature-box-text clr\"><ul>\n<li>Penetrationstest processer &amp; metoder<\/li>\n<li>Informationsindsamling<\/li>\n<li>Cross-Site Scripting<\/li>\n<li>SQL injection<\/li>\n<li>Authentifikation og autorisation<\/li>\n<li>Sessionssikkerhed<\/li>\n<li>Flash<\/li>\n<li>HTML5<\/li>\n<li>Fil og ressourceangreb<\/li>\n<li>Webservice<\/li>\n<li>XPath<\/li>\n<li>Penetrationstest af Content Management Systemer<\/li>\n<li>Penetrationstest af NoSQL databaser<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2019\/10\/endp_certificate_sm.png\" width=\"235\" height=\"176\" alt=\"Endp Certificate Sm\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"font-family:&quot;Quantico&quot;;color:#ffffff;font-size:25px;\">eLearnSecurity - Network Defense Professional (eNDP)<\/h2><div class=\"vcex-feature-box-text clr\"><ul>\n<li>TCP<\/li>\n<li>Angreb<\/li>\n<li>Perimeterapparater<\/li>\n<li>Sikker netv\u00e6rksdesign<\/li>\n<li>Firewall konfiguration<\/li>\n<li>VPN<\/li>\n<li>Switch konfiguration<\/li>\n<li>Systemsikkerhed<\/li>\n<li>Active Directory<\/li>\n<li>WSUS<\/li>\n<li>Microsoft EMET<\/li>\n<li>Group Policy<\/li>\n<li>Endpoint sikkerhed<\/li>\n<li>Printere<\/li>\n<li>S\u00e5rbarheder<\/li>\n<li>Kontrol og h\u00e5ndtering af leverand\u00f8radgang<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2021\/06\/iso.png\" width=\"500\" height=\"383\" alt=\"Iso\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"font-family:&quot;Quantico&quot;;color:#ffffff;font-size:25px;\">Informationssikkerhed - ISO\/IEC 27001<\/h2><div class=\"vcex-feature-box-text clr\"><ul>\n<li>Oversigt over informationssikkerhed og kravene i ISO \/ IEC 27001-standarden<\/li>\n<li>Metode til implementering i organisationer<\/li>\n<li>V\u00e6rkt\u00f8jer til forberedelse, udrulning, evaluering og forbedring af et informationssikkerhedsstyringssystem<\/li>\n<li>Inspiration til it-sikkerhedsarbejdet via praktiske \u00f8velser og cases<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2021\/07\/aws-certified-cloud-practitioner2.png\" width=\"600\" height=\"600\" alt=\"Aws Certified Cloud Practitioner2\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"color:#ffffff;font-size:25px;\">Certificeret AWS Cloud Practitioner<\/h2><div class=\"vcex-feature-box-text clr\"><p style=\"text-align: left\">Certificeringen bekr\u00e6fter viden indenfor:<\/p>\n<ul>\n<li>Definer hvad AWS Cloud og den globale AWS infrastruktur er<\/li>\n<li>Beskrive grundl\u00e6ggende AWS Cloud-arkitektoniske principper<\/li>\n<li>Beskrive AWS Cloud\u00a0<em>value proposition<\/em><\/li>\n<li>Beskrive n\u00f8gletjenester p\u00e5 AWS-platformen og deres almindelige anvendelse (for eksempel\u00a0<em>compute<\/em>\u00a0og analyse)<\/li>\n<li>Beskrive grundl\u00e6ggende sikkerheds- og overholdelsesaspekter af AWS-platformen og den delte sikkerhedsmodel<\/li>\n<li>Definer fakturerings-, kontoadministrations- og priss\u00e6tningsmodeller<\/li>\n<li>Identificer dokumentationskilder eller tekniske hj\u00e6lpemidler (for eksempel whitepapers eller supportsager)<\/li>\n<li>Beskriv grundl\u00e6ggende \/ kerneegenskaber ved implementering og drift af AWS Cloud<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2021\/06\/PACSP.png\" width=\"500\" height=\"383\" alt=\"PACSP\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"color:#ffffff;font-size:25px;\">Pentester Academy Cloud Security Professional (PACSP)<\/h2><div class=\"vcex-feature-box-text clr\"><p style=\"text-align: left\">Pensum for denne certificering fokuserer p\u00e5 viden om og udnyttelse \/ hacking af de 5 mest anvendte komponenter i AWS-implementeringer:<\/p>\n<ul>\n<li>Identitets- og adgangsstyring (IAM)<\/li>\n<li>API Gateway<\/li>\n<li>Lambda<\/li>\n<li>Cloud-databaser<\/li>\n<li style=\"text-align: left\">Simple Storage Service (Amazon S3)<\/li>\n<\/ul>\n<\/div><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2019\/10\/eWPTX_certificate_sm.png\" width=\"500\" height=\"383\" alt=\"EWPTX Certificate Sm\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"font-family:&quot;Quantico&quot;;color:#ffffff;font-size:25px;\">eLearnSecurity - Web Application Penetration Testing eXtreme (eWPTX)<\/h2><div class=\"vcex-feature-box-text clr\"><ul>\n<li>Encoding og filtering<\/li>\n<li>Simpel omg\u00e5else<\/li>\n<li>Cross-Site Scripting<\/li>\n<li>XSS \u2013 Filter og WAF omg\u00e5else<\/li>\n<li>Cross-Site Request Forgery<\/li>\n<li>HTML5<\/li>\n<li>SQL injection<\/li>\n<li>SQLi \u2013 Filter og WAF omg\u00e5else<\/li>\n<li>XML angreb<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2019\/12\/endp_certificate_sm1.jpg\" width=\"235\" height=\"176\" alt=\"Endp Certificate Sm1\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"font-family:&quot;Quantico&quot;;color:#ffffff;font-size:25px;\">Offensive Security - Offensive Security Certified Professional (OSCP)<\/h2><div class=\"vcex-feature-box-text clr\"><ul>\n<li>Passiv informationsindsamling<\/li>\n<li>Aktiv informationsindsamling<\/li>\n<li>S\u00e5rbarhedsscanning<\/li>\n<li>Buffer overflows<\/li>\n<li>Win32 buffer overflow udnyttelse<\/li>\n<li>Linux buffer overflow udnyttelse<\/li>\n<li>Arbejde med <em>exploits<\/em><\/li>\n<li>Filoverf\u00f8rsler<\/li>\n<li>Privilegieeskalering<\/li>\n<li>Klient-side angreb<\/li>\n<li>Webapplikationsangreb<\/li>\n<li>Password angreb<\/li>\n<li>Port omdirigering og tunneling<\/li>\n<li>Metasploit Frameworket<\/li>\n<li>Omg\u00e5else af antivirus software<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2021\/06\/azure.png\" width=\"500\" height=\"383\" alt=\"Azure\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"font-family:&quot;Quantico&quot;;color:#ffffff;font-size:25px;\">Certificeret Azure AZ-900<\/h2><div class=\"vcex-feature-box-text clr\"><ul>\n<li>Beskrive Azure cloudbegreber<\/li>\n<li>Beskrive kernetjenester i Azure<\/li>\n<li>Beskrive kernel\u00f8sninger og styringsv\u00e6rkt\u00f8jer i Azure<\/li>\n<li>Beskrive generelle sikkerheds- og netv\u00e6rkssikkerhedsfunktioner<\/li>\n<li>Beskrive funktioner for identitet, governance, privatliv og overholdelse heraf<\/li>\n<li>Beskrive Azure omkostningsstyring og serviceniveauaftaler<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-feature-box clr left-content-right-image\" style=\"text-align:center;\"><div class=\"vcex-feature-box-media clr\" style=\"width:100%;\"><div class=\"vcex-feature-box-image\" ><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nordicresilience.dk\/da\/wp-content\/uploads\/2021\/07\/AWS-Certified-Security-Specialty.png\" width=\"512\" height=\"512\" alt=\"AWS Certified Security Specialty\" data-no-retina=\"\" \/><\/div><\/div><div class=\"vcex-feature-box-content clr\" style=\"width:100%;\"><h2 class=\"vcex-feature-box-heading\" style=\"color:#ffffff;font-size:25px;\">Certificeret AWS Security - Specialty<\/h2><div class=\"vcex-feature-box-text clr\"><p style=\"text-align: left\">Certificeringen bekr\u00e6fter dybdeg\u00e5ende viden indenfor:<\/p>\n<ul>\n<li>En forst\u00e5else af specialiserede dataklassifikationer og AWS-databeskyttelsesmekanismer<\/li>\n<li>En forst\u00e5else af datakrypteringsmetoder og AWS-mekanismer til implementering af dem<\/li>\n<li>En forst\u00e5else af sikre internetprotokoller og AWS-mekanismer til implementering af dem<\/li>\n<li>En fungerende viden om AWS sikkerhedstjenester og funktioner i tjenester for at give et sikkert produktionsmilj\u00f8<\/li>\n<li>Kompetence opn\u00e5et ved to eller flere \u00e5rs erfaring med produktionsinstallation ved hj\u00e6lp af AWS-sikkerhedstjenester og -funktioner<\/li>\n<li>Evne til at tr\u00e6ffe afvejninger med hensyn til omkostninger, sikkerhed og implementeringskompleksitet givet et s\u00e6t applikationskrav<\/li>\n<li>En forst\u00e5else af sikkerhedsoperationer og risiko<\/li>\n<\/ul>\n<\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1572593449401{padding-top: 50px !important;padding-bottom: 10px !important;background-color: #223147 !important;}&#8221;][vc_column 0=&#8221;&#8221;][vc_raw_html 0=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJ0aXRsZS1ib3JkZXJlZCUyMiUzRSUwQSUzQ2RpdiUyMGNsYXNzJTNEJTIydGl0bGUtaW5uZXIlMjIlM0UlM0MlMkZkaXYlM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][vc_column_text text_align=&#8221;center&#8221; width=&#8221;815px&#8221;]Med over 200 gennemf\u00f8rte penetrationstest har vi hos Nordic Resilience en solid og trov\u00e6rdig erfaring, som du kan f\u00e5 gavn af. Disse penetrationstest har v\u00e6ret gennemf\u00f8rt i mange&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5060","page","type-page","status-publish","hentry","entry","no-media"],"_links":{"self":[{"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/pages\/5060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/comments?post=5060"}],"version-history":[{"count":119,"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/pages\/5060\/revisions"}],"predecessor-version":[{"id":5677,"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/pages\/5060\/revisions\/5677"}],"wp:attachment":[{"href":"https:\/\/nordicresilience.dk\/da\/wp-json\/wp\/v2\/media?parent=5060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}