{"id":7304,"date":"2019-11-04T14:29:47","date_gmt":"2019-11-04T10:59:47","guid":{"rendered":"https:\/\/masiha.ir\/blog\/?page_id=7304"},"modified":"2019-11-04T15:29:25","modified_gmt":"2019-11-04T11:59:25","slug":"certificates","status":"publish","type":"page","link":"https:\/\/masiha.ir\/blog\/certificates","title":{"rendered":"\u06af\u0648\u0627\u0647\u06cc\u0646\u0627\u0645\u0647 \u0647\u0627"},"content":{"rendered":"

\"\"<\/strong><\/span><\/h1>\n

Active Network<\/strong><\/span><\/p>\n\n\n\n\n\n\n\n\n
o\u00a0 Extreme Network<\/td>\n2008<\/td>\n<\/tr>\n
o\u00a0 CCNA<\/td>\n2008,2012<\/td>\n<\/tr>\n
o\u00a0 CCNP<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 CCNP Audios<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 CWNA 2007<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Foundry Network<\/td>\n2012<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Passive Network<\/strong><\/span><\/p>\n\n\n\n\n\n\n\n
o\u00a0 Belden<\/td>\n2005<\/td>\n<\/tr>\n
o\u00a0 MK<\/td>\n2005<\/td>\n<\/tr>\n
o\u00a0 Legrand<\/td>\n2005<\/td>\n<\/tr>\n
o\u00a0 Brand Rex<\/td>\n2005<\/td>\n<\/tr>\n
o\u00a0 Fiber Optic<\/td>\n2008<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Network Security<\/strong><\/span><\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
o\u00a0 IT Management Standard<\/td>\n2008<\/td>\n<\/tr>\n
o\u00a0 Digital Signature & E-Government<\/td>\n2009<\/td>\n<\/tr>\n
o\u00a0 Network admin & Security<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 McAfee Antivirus Enterprise admin<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 McAfee Antivirus Policy management<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 National cyber defense – public information<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 National cyber defense \u2013 management<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 Designing Server 2003 Security(70-298)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Security+<\/td>\n2012,2016<\/td>\n<\/tr>\n
o\u00a0 ISMS Implementation<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 ISMS Internal audit<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 Tia 942<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 SSL<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 Sophos UTM Certified dministrator(SCA)<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 Astaro Full UTM<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 Enterprise Manage McAfee,Bitdifender<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 Cyber Defense<\/td>\n2014<\/td>\n<\/tr>\n
o\u00a0 Alertlogic WSM<\/td>\n2016<\/td>\n<\/tr>\n
o\u00a0 CISSP<\/td>\n2016<\/td>\n<\/tr>\n
o\u00a0 CEH<\/td>\n2016<\/td>\n<\/tr>\n
o\u00a0 CCDA & CCDP<\/td>\n2014<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Software & Application<\/strong><\/span><\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n
o\u00a0 PHP<\/td>\n2005<\/td>\n<\/tr>\n
o\u00a0 Redhat<\/td>\n2005<\/td>\n<\/tr>\n
o\u00a0 Managing & Maintaining Microsoft windows server 2003 Environment<\/td>\n2007<\/td>\n<\/tr>\n
o\u00a0 Portal management<\/td>\n2010<\/td>\n<\/tr>\n
o\u00a0 Microsoft Last product and review<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 A+ (220-601)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Active Directory(70-294)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Exchange Server 2007 (70-236)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Isa Server 2004(70-350)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Server 2003 Environment (70-290)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Project Control and Management<\/td>\n2012<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Network Public<\/strong><\/span><\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
o\u00a0 data center<\/td>\n2005<\/td>\n<\/tr>\n
o\u00a0 NGN<\/td>\n2008<\/td>\n<\/tr>\n
o\u00a0 Mitel MN 3300 System Administration<\/td>\n2010<\/td>\n<\/tr>\n
o\u00a0 Mitel MN 3300 ICP<\/td>\n2010<\/td>\n<\/tr>\n
o\u00a0 Mitel MN 3300 System Maintenance<\/td>\n2010<\/td>\n<\/tr>\n
o\u00a0 Mitel ACD<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 Mitel Contact Center Management Administration<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 Mitel 6110<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 IPV6<\/td>\n2011<\/td>\n<\/tr>\n
o\u00a0 Network+<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Network Infra Structure(70-291)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Planning Server 2003 Network Infrastructure<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Voice Over IP (VOIP)<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 Wireless Networking<\/td>\n2012<\/td>\n<\/tr>\n
o\u00a0 VMware V5.0<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 BGP + ripe<\/td>\n2013<\/td>\n<\/tr>\n
o\u00a0 IntelliNAC Training Agenda<\/td>\n2014<\/td>\n<\/tr>\n
o\u00a0 ITIL<\/td>\n2017<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

\n","protected":false},"excerpt":{"rendered":"

Active Network o\u00a0 Extreme Network 2008 o\u00a0 CCNA 2008,2012 o\u00a0 CCNP 2012 o\u00a0 CCNP Audios 2012 o\u00a0 CWNA 2007 2012 o\u00a0 Foundry Network 2012 Passive Network o\u00a0 Belden 2005 o\u00a0 MK 2005 o\u00a0 Legrand 2005 o\u00a0 Brand Rex 2005 o\u00a0 Fiber Optic 2008 Network Security o\u00a0 IT Management Standard 2008 o\u00a0 Digital Signature & E-Government […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/pages\/7304"}],"collection":[{"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/comments?post=7304"}],"version-history":[{"count":1,"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/pages\/7304\/revisions"}],"predecessor-version":[{"id":7305,"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/pages\/7304\/revisions\/7305"}],"wp:attachment":[{"href":"https:\/\/masiha.ir\/blog\/wp-json\/wp\/v2\/media?parent=7304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}