About
Motasem Hamdan is a Syrian-Lebanese content creator, instructor, swimmer and Entrepreneur who creates cyber security training videos and articles, provides marketing consultancy and writes research papers in healthcare cyber security.
Articles by Motasem
-
Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF
Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF
By Motasem Hamdan
-
Microsoft Cyber Security Analyst SC-900 Study Notes
Microsoft Cyber Security Analyst SC-900 Study Notes
By Motasem Hamdan
-
Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks
Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks
By Motasem Hamdan
Contributions
-
What are the best practices for maintaining your network adapter drivers?
1- Regularly check for updates from the device manager of Windows OS 2- Before installing any update, make sure it's compatible with your version of Windows. 3- When you encounter network connectivity problems, first disable the network adapter device and re-enable it and if this doesn't solve the issue, right click on the driver and select uninstall, restart your PC and the issue should be resolved. 4- Use Windows troubleshooter to check for the root causes of errors.
Activity
-
Did you know - that TryHackMe has around 75 Modules to learn from? Some of the key topics that these learning modules cover are: - Advanced Client…
Did you know - that TryHackMe has around 75 Modules to learn from? Some of the key topics that these learning modules cover are: - Advanced Client…
Liked by Motasem Hamdan
-
It's wonderful and great time at the #IFCCWorldLab2024 Conference in #Dubai! Sharing the latest developments and technologies in clinical chemistry…
It's wonderful and great time at the #IFCCWorldLab2024 Conference in #Dubai! Sharing the latest developments and technologies in clinical chemistry…
Liked by Motasem Hamdan
-
Honoring outstanding achievements! the Faculty of Health Sciences hosted a special gathering to recognize students who made it to the Dean's Honor…
Honoring outstanding achievements! the Faculty of Health Sciences hosted a special gathering to recognize students who made it to the Dean's Honor…
Liked by Motasem Hamdan
Experience
Education
Licenses & Certifications
Volunteer Experience
Publications
-
Data Loss Prevention in Implantable Medical Devices
scopus - ORCID
In this paper, a review of the Safety, Privacy and Security of Implantable Medical devices is written to shed lights on the current practices of privacy and security and how they apply to implantable medical devices to prevent data loss or theft. The paper reviews important security aspects of implantable medical devices such as the software used, the communication protocols between the programmer and the IMD, The telemetry interface and the hardware and sensors. Then the paper discusses from a…
In this paper, a review of the Safety, Privacy and Security of Implantable Medical devices is written to shed lights on the current practices of privacy and security and how they apply to implantable medical devices to prevent data loss or theft. The paper reviews important security aspects of implantable medical devices such as the software used, the communication protocols between the programmer and the IMD, The telemetry interface and the hardware and sensors. Then the paper discusses from a security point of view the reasons why more robust and rigorous security controls should be adopted to protect patient's life, increase quality of medical services and comply to local laws.
-
The use of internet of things to solve real case scenarios
Part of challenge
This presentation contains a detailed approach to the solution that was submitted to the first cisco packet tracer challenge and considered among the best 10
-
Block Bitorrent and IM clients Using Cisco ASA firewall
IEEE-Cybrary
Blocking Bittorrent and IM clients has become an important matter for organizations who care about their compliance and security policies.This working paper explains briefly how to deal with bittorrent and IM peer to peer clients in your network
-
Practical Approach to protect Patient health Information
IEEE-Cybrary
This chapter explains briefly how PHI in any healthcare provider could be protected in terms of physical and technical security guideline. PHI is very important to protect against fraud and identity theft to avoid both financial loss and reputation damage to the patient and the covered entity. This chapter could be a great aid to information security professionals who manage the confidentiality, integrity and availability of PHI in healthcare providers.
Courses
-
Hebrew Language Level A
Jerusalem University
Projects
-
Cybersecurity and Penetration Testing Notes Catalog
- Present
Cyber security and penetration testing notes catalog divided by category and contains over 1k pages of notes taken from field work.
Honors & Awards
-
Cisco Global Cyber Security Scholarship
Cisco
-
Cisco Packet Tracer Challenge - Top 10 Projects - round 1 Winners
Cisco
Design a network diagram using PT 7.0 and Implement IOT devices to find a solution for an epidemic in your area
Test Scores
-
TOEFL IBT
Score: 115/120
Languages
-
English
Native or bilingual proficiency
-
Arabic
Native or bilingual proficiency
-
Turkish
Full professional proficiency
-
Hebrew
Professional working proficiency
-
Spanish
Elementary proficiency
Recommendations received
13 people have recommended Motasem
Join now to viewPeople also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Motasem Hamdan
5 others named Motasem Hamdan are on LinkedIn
See others named Motasem Hamdan