| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | AA | AB | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Full Name | University Name | Major | Training Domain / Track | CV | |||||||||||||||||||||||
2 | Nouor Khaled Abu Zraiq | Irbid National University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1dRwPiA-7HhLoMwg4BW0ntcLnDTa2Azxg | |||||||||||||||||||||||
3 | Sham Shadi Hassan Almanasraha | Al-Zaytoonah University | cybersecurity | Cybersecurity / GRC | https://drive.google.com/open?id=1XINWFAjJ0Y3eevuqUTVuAiVqw_S5nXad | |||||||||||||||||||||||
4 | Lama Nedal AbdElfattah AbuAlhumoom | Balqa Applied University | Digital Forensics Investigations | Cybersecurity / SOC | https://drive.google.com/open?id=1qN3QplbSxlmyWomj97gnoaV-MsDQ_tti | |||||||||||||||||||||||
5 | Mohannad Mohammad Helmi Abuhasheesh | The World Islamic Sciences and Education | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=12rTbAnbSnAEYGSb-zvMDdXhlL8b1Y8j2 | |||||||||||||||||||||||
6 | Osama Mohammed Taleb Obeidat | Yarmouk University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1a0_diKjQPO5phnz30q3VI17RbfkjJOTe | |||||||||||||||||||||||
7 | Taha Omar Mohmmad Khamis | Yarmouk University | Cybersecurity | Cybersecurity / GRC | https://drive.google.com/open?id=14uJWCU960a9s8QZQdf5m72UcBuGn82OV | |||||||||||||||||||||||
8 | Murad Khalid Subhi Issa | Al-Zaytoonah University | Cyper Security, Science and Information Technology | Cybersecurity / SOC | https://drive.google.com/open?id=1N5UdHvO9LIWBWUClabZfbF6k3LXtnHMo | |||||||||||||||||||||||
9 | Haneen Nawaf Mohammad Deabiss | The Hashemite University | degree in computer science | Cybersecurity / GRC | https://drive.google.com/open?id=1fw3wqNRXIZo2ISmAnFUHNIl6LNV7_gT1 | |||||||||||||||||||||||
10 | Abdallah issa abdullah gharaibeh | Irbid National University | Cybersecurity | Cybersecurity / SOC | https://drive.google.com/open?id=1qWDAdbY8qQ5SmJ4MpsRkibicC-oOsyoV | |||||||||||||||||||||||
11 | Qabas Hani Ibrahim Sarireh | Mutah University | Computer and Network Security Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1a3lhIC2R8stGEDQZLLl9aPWcX72CKexK | |||||||||||||||||||||||
12 | Momen Zaid Jalal Shehadeh | The Hashemite University | computer science | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1n40QyBz_gHd_otYX2ELicMk_1Ubl3_cO | |||||||||||||||||||||||
13 | saif saleh mahmoud omari | Yarmouk University | CYBER SECURITY | Cybersecurity / SOC | https://drive.google.com/open?id=1Yb3QvJnQrmyaSOBHo-uM9CilTlLVWzqJ | |||||||||||||||||||||||
14 | Ahmad Maher Ghaith | The World Islamic Sciences and Education | Computer Science | Cybersecurity / SOC | https://drive.google.com/open?id=1V6-esZPDmjcn6_Cr_uLRjtBDSdWxqJSc | |||||||||||||||||||||||
15 | Malek Mohammad-Jamal Yaseen Bibers | Irbid National University, | CYBER SECURITY | Cybersecurity / SOC | https://drive.google.com/open?id=1fgtyUBAe4YNaEn3AXWrOFe9RpgvrKJPS | |||||||||||||||||||||||
16 | Abdallah Othman Mohammad AL-Barghouthi | Jerash University, | Computer Networks | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1jemrChDTarPvkEgWFuny1j8WyJmeTwEo | |||||||||||||||||||||||
17 | Leen hassan abdelrazzaq alkharabsheh | Al- Balqa' Applied University (BAU) | Digital Forensics | Cybersecurity / SOC | https://drive.google.com/open?id=1Kg2889gclSD0iLgkTcHDc2c2hmiiVyuM | |||||||||||||||||||||||
18 | Mohammad Yahia Mahmoud Barjakli | The Hashemite University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1I99JT38H3xITcxM9AViMfkugbZFxYmcW | |||||||||||||||||||||||
19 | Bushra mohammad al-bdour | Tafila Technical University | Computer Information Systems | Cybersecurity / GRC | https://drive.google.com/open?id=1HpGJs7pFCmtqXslXZQI-BAusOukkVzT5 | |||||||||||||||||||||||
20 | Majd mohmmed hmmoud odat | Jordan University of Science and Technology | Network Engineering and Security | Cybersecurity / GRC | https://drive.google.com/open?id=1Ym1kVhsUYu9wWqoeu2CGZE1Itq93E2Ty | |||||||||||||||||||||||
21 | Mohammad Salameh Salem AbuSallam | Al-Zaytoonah University of Jordan | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1kx5fKsio4gGGlukvqSjDp7AxLQQ72_4K | |||||||||||||||||||||||
22 | Ahmad Izzedin Ahmad Abdelrahman | Zarqa University, | Software Engineering | Cybersecurity / SOC | https://drive.google.com/open?id=1p_yzEeQ35Z8fy-DGRDPd_7FepNjuctKq | |||||||||||||||||||||||
23 | Anas Ammar Najeeb Alhaj-Najeeb | The Hashemite University | Cyber Security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1K8rgqYlvvkHztFFwa2Kot3c0ivy7wZz0 | |||||||||||||||||||||||
24 | Batool mohammad salameh alfasatleh | Hashemite University | COMPUTER ENGINNER | Cybersecurity / GRC | https://drive.google.com/open?id=1yJuJQY2Q72K6kxDKNMGr3LbeKOTZwqV0 | |||||||||||||||||||||||
25 | Noora Ahmad Wasef Beidas | Amman Arab University, | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1D6H_273NuKBTCE7uXkaF-cOPwKOnlCHJ | |||||||||||||||||||||||
26 | Ali Mohammad Ali Al Maaitah | The World Islamic Sciences and Education | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1ncJIhcUcj1Il3bEu-HsHZTg5rkq-jBJX | |||||||||||||||||||||||
27 | Huda Osama Yousef Alawadi | The World Islamic Sciences and Education | Information and Network Security | Cybersecurity / GRC | https://drive.google.com/open?id=1UzEnfvYP8wiXutXgZvCbje70bdEEEZuz | |||||||||||||||||||||||
28 | Ahmad Mohammad Ibrahim Alajlouni | Al Balqa Applied University | Information and Cyber Security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1AdNvLyByH8gQDNH4rnXgpPFfdEMC3w5D | |||||||||||||||||||||||
29 | Ahmad Rafat Awad albadawi | Irbid National University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1MggKQTTdK7gau4QcaPGOnjRMTYMEjpXG | |||||||||||||||||||||||
30 | محمود جودت علي جمعه | Irbid National University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1Fz86DOxTp9YbAh-Z7Djz4RJwpNMPu67I | |||||||||||||||||||||||
31 | Mariam Ali Hassan Fraihat | The World Islamic Sciences and Education | Information and Network Security and Confidentiality | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1e5nnLgqYGWgT7HEs0MgJE_LSLg6NuDgA | |||||||||||||||||||||||
32 | Abdallah Ahmad Taleb Ahmad | Irbid National University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1bPbmC8SyIctjT0jUkGmkhvSZmgbQ_k4t | |||||||||||||||||||||||
33 | Rania reziq Mahmoud Bala’awy | Al- Balqa' Applied University (BAU) | Computer and networks Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1fnLXUKxv_yLeH6SLYvMuRy9iAF6e-eaJ | |||||||||||||||||||||||
34 | Nour mashhor hasan aljawarneh | Irbid National University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1oUmc-084weXEXV-8VTrhleWtJ4dRK47Z | |||||||||||||||||||||||
35 | ضحى جعفر محمد فسفوس | Al-Hussein Bin Talal University | Network Security and Information Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1Rmp1VnCrjdE4gChk4dwgQdz9cCAdXwKw | |||||||||||||||||||||||
36 | Amany Mohammad Mousa Al Hiary | Al- Balqa' Applied University (BAU) | Computer Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1g5aJKaTCK19XLArbzCITgrNztfCh16Cu | |||||||||||||||||||||||
37 | AYAH MAHER FAWZI BARAKAT | University of Petra | Information Security | Cybersecurity / GRC | https://drive.google.com/open?id=1bI8gVk5fDAJkday1RMQ9zhnujbE9QZST | |||||||||||||||||||||||
38 | Feras Naser Ramadan ALGhamri | Al-Zaytoonah University | Cybersecurity | Cybersecurity / SOC | https://drive.google.com/open?id=1osolxywboLwi_PBckXBPe_-VEv0TnkYN | |||||||||||||||||||||||
39 | naim thaer naim shawahin | Mutah University | Software engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1RjXng9K7wktwA9PwjltPTxKmag0ps1m9 | |||||||||||||||||||||||
40 | salma jalal basheer jalouqa | University of Jordan | Computer Science | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1gjaAyMGehoNKr6la7VF6E1MfetH27kDf | |||||||||||||||||||||||
41 | Abdelkhalek Nael Ahmad Allan | Zarqa University | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1hTws9EDhSAK8ES9iI1f8JeCwpViFdpJK | |||||||||||||||||||||||
42 | yazeed khalid mohammad bani issa | Al-Hussein Bin Talal University | Computer Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1EPPM6xr_KRiinT7jqsUm0m6fWkMFy0QX | |||||||||||||||||||||||
43 | Ayah Hussein Mahmoud Motlaq | Al-Balqa’a Applied University - | communication Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1oomFFEYo8XenNjKPOhBKOHWuGDeAnUte | |||||||||||||||||||||||
44 | Shaimaa khaled mahmoud hayajneh | Yarmouk University | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1v_Lpe5P6dmcYM8KH_Uhb_qebEuw3BYLR | |||||||||||||||||||||||
45 | معتز محمد علي الصواف | Luminus University | Cyber security | Cybersecurity / GRC | https://drive.google.com/open?id=1-syzhQhbLhOOr9bKtI81BqAaBzxVuXU6 | |||||||||||||||||||||||
46 | Ali Mohammad khair ali altwait | Yarmouk University | computer engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=16lLRS4RIRBMFS4orzgW6LvV0sC1GLB3w | |||||||||||||||||||||||
47 | Ahmad Maher Qaffaf | University of Petra | Computer Science | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1mOoLQ2TcF0EJd_ftBZ1p_0XtoccJpJG0 | |||||||||||||||||||||||
48 | Yazan ali hassan alatabi | Philadelphia University, | Computer Science | Cybersecurity / SOC | https://drive.google.com/open?id=1MafVCcZH94rw_-OqrqT-WZBPpE89WeaE | |||||||||||||||||||||||
49 | Eslam Bassam Ali AlKhalailah | Al al-Bayt University | Computer Science | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1_cLOt84uQGVofbI3GT32hfykO71ZSBBJ | |||||||||||||||||||||||
50 | عبدالناصر طلال مصطفى تايه | Al al-Bayt University | Computer Science | Cybersecurity / SOC | https://drive.google.com/open?id=1ereCQZpdNQek5HVI6KWZMJY1HzMiqbY_ | |||||||||||||||||||||||
51 | Malek Arafat Mousa Elaiwat | Hashemite University | computer engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1H7Q3oDzR6u0KoDJ8qcIlX-U7w1xFOvc6 | |||||||||||||||||||||||
52 | Ali hussien ali asfour | Tafila Technical University | CyberSecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=188atq7rppTTR8waGcZ6VS5-VTsQjlVyP | |||||||||||||||||||||||
53 | راشد عمر يوسف علي | Al-Balqa’a Applied University - | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1MmlHY-I9kP0-B9IL5TwkG_uoFJ0aQdNm | |||||||||||||||||||||||
54 | Ziad Ahmad awad shatnawi | Yarmouk University | Cybersecurity | Cybersecurity / SOC | https://drive.google.com/open?id=1mi294Nnzebbw2RqLwDvGdTks1DbiDP6t | |||||||||||||||||||||||
55 | Ahmad Bassam Tawfeeq Natour | Amman Arab University | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1J_VXpK70D1eAu_-C1AUJ1Gei1CGVEuag | |||||||||||||||||||||||
56 | Rasheed Loai Almubaideen | Zarqa University | Computer Science | Cybersecurity / GRC | https://drive.google.com/open?id=1O_H_NrtshjvRpSSieLgSTPI6N2FiplpA | |||||||||||||||||||||||
57 | Abdallah Hussein Ahmad Alghudran | Yarmouk University | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1oHtL1KkD65SqW4UJGLlMblGdRgUqZ7_- | |||||||||||||||||||||||
58 | Mohammad Khaled Ahmad AlShibani | Arab Amman University, | Cybersecurity, | Cybersecurity / SOC | https://drive.google.com/open?id=1rBMDftXnBOGFmJXE5L7YmiJBV73cDJ6S | |||||||||||||||||||||||
59 | ليث خالد سامح ياسين | Yarmouk University | Science in Cybersecurity | Cybersecurity / SOC | https://drive.google.com/open?id=1meFRuJ9hNDuVnbXaR9KK6Mmhw9q4xV_k | |||||||||||||||||||||||
60 | Sajeda Ahmad Kamel Batayneh | Al-Balqa Applied University (BAU) | Computer Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1eQ0LyCsl-jLHtchZe7A_RrZqvFUdgndi | |||||||||||||||||||||||
61 | Anas Mohammad Ahmad Abuhwaiti | University College of Luminos | Cyber security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=13ByULVDlDk5QbH7oVQyFCFMxg3ZwBs3_ | |||||||||||||||||||||||
62 | Rahaf Mohammed Qasim Dalaika | Mutah University | Computer and Network Security Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1gvM8WLHKL9KfoZLk3V7ADdgFZSRRjlGr | |||||||||||||||||||||||
63 | NOUR ABDULLAH MUHAMMAD ABDO | Al-Balqa Applied University (BAU) | Network Systems and Security Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1d0JeHGUUVV_mLksYhkbZa2JIeBJBE9uw | |||||||||||||||||||||||
64 | MOHAMMAD NOUR HUSEIN MOH'D ALOMARI | Al-Balqa Applied University (BAU) | Network and telecommunication | Cybersecurity / SOC | https://drive.google.com/open?id=1rdpm_16yHbcA5O5bGYdR4ndwhQWiEq_u | |||||||||||||||||||||||
65 | Bara' Mousa Saleh Manci | Hashemite University | Computer Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1VZg_xJEvdVB4BtZTG0t88V7FBr0-li9N | |||||||||||||||||||||||
66 | Ayham fuad eqab sarhan | Philadelphia University | Cyber security | Cybersecurity / SOC | https://drive.google.com/open?id=1xy_SluaNMR9ztU6txWYbdXDoHxCSTDzV | |||||||||||||||||||||||
67 | Farah Amjed Ahmad Alsa’di | University of Jordan | Computer Information Systems | Cybersecurity / SOC | https://drive.google.com/open?id=1CVJ3uWRdrWe1dkma8_lnu6SERweFJkh- | |||||||||||||||||||||||
68 | ينال عبد الحميد سلامة العبيسات | Mutah University | Computer and Network Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1LysqS2tz7Wp2QhYxZuqwXSzFe5JMjPYQ | |||||||||||||||||||||||
69 | Mohammad Yousef I.Masri | Al-Ahliyya Amman University | Network and Information Security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1DYfTaIYbG_iFxgY0X-7nEuBg3Lo0xneV | |||||||||||||||||||||||
70 | Ammar Shareef Mohammad Oudeh | University of Jordan | Business Information Technology (BIT) | Cybersecurity / SOC | https://drive.google.com/open?id=1wyfe34SlU-hGUMwjmkkyW0w723g4pi7j | |||||||||||||||||||||||
71 | مجد عادل شكري أبو غنام | Al-Balqa Applied University (BAU) | Network Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1lhDsB9Uxpj-6WBKyvtFn9yjTtEreznMq | |||||||||||||||||||||||
72 | Hamza Tayseer khalaf almasarweh | Al-Zaytoonah University | Software engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1gNoaX2SfhYGtcyUZYyaY6oBUlkDBKSsM | |||||||||||||||||||||||
73 | سماح مصطفى عبدالعزيز جمحاوي | Irbid National University | Cybersecurity | Cybersecurity / GRC | https://drive.google.com/open?id=16_sL6Y_eWkCRCiqzBXvacSuPp864NG6G | |||||||||||||||||||||||
74 | mohammad hussein mohammad zaatreh | Al-Zaytoonah University | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1TtcjXiaSuhBDYPfzbY1N4tY-WhXy8bvy | |||||||||||||||||||||||
75 | Mohammed Faisal Mohammed Karaymeh | Yarmouk University | Computer Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=13aQeqKFeaUreq_TQIq4ywQ83643GrRsW | |||||||||||||||||||||||
76 | Saja Ali Mahmoud Al-Hayek | Yarmouk University | Cybersecurity | Cybersecurity / GRC | https://drive.google.com/open?id=1w5T6rWDL7Eb6nC54GNwH0IPuWWLx80AS | |||||||||||||||||||||||
77 | Jarah hussien husny alaqtash | Al-Balqa Applied University (BAU) | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1mAyVEqTrNzh9XH6TXsyVZBtwLrZt4srv | |||||||||||||||||||||||
78 | Abdallah Fawwaz Faleh Mustafa | The World Islamic Sciences and Education | security and confidentiality of information and networks | Cybersecurity / SOC | https://drive.google.com/open?id=1yKMua_9F9CtTZrc8fA8XmbuJ3sr1Ob1W | |||||||||||||||||||||||
79 | Mohammad Ahmad tawfeeg alahmad | queen noor civil aviation technical college | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1YKqYMizHo5CC6VGC1UBM4twb2v48tjoi | |||||||||||||||||||||||
80 | زيد شاكر سامح الحراحشه | Al-Balqa Applied University (BAU) | NETWORK SECURITY ENGINEER | Cybersecurity / SOC | https://drive.google.com/open?id=1hThg1PtQTTuwzyKMitbOztwbW4BhdkDH | |||||||||||||||||||||||
81 | Saja Saleh Mohammad Daradkeh | Al-Balqa Applied University (BAU) | electrical engineering / network systems and security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1rJMArBNGcqvBGisN7PBOux4YROp2ob00 | |||||||||||||||||||||||
82 | Ahmad wael ahmad al-toubeh | Zarqa University | Cybersecurity | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1KzyJwO1qbMSNf1lGNgTTWOjkAQOjRhyw | |||||||||||||||||||||||
83 | داليا صالح عبد الرزاق الخطيب | Al-Balqa Applied University (BAU) | Information and Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1p_wycT_OdYMeP_pkOARGA1y3qFX-NIQi | |||||||||||||||||||||||
84 | Qusai ibrahim mousa abusalem | Isra University | Cybersecurity | Cybersecurity / SOC | https://drive.google.com/open?id=1-sEhZnlJJnAF0o4nNYnBYCb_moG4jTdw | |||||||||||||||||||||||
85 | Rawan Mohammad Izzat Allahham | Al-Balqa Applied University (BAU) | Telecommunication engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1Q2Rrc6dkqVlUwzGs0xN2EIw0guc0_jzy | |||||||||||||||||||||||
86 | Ayat Khaled Al-Wraikat | Princess Sumaya University for Technology | Computer Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=1-hsEiD4AvO7FbQQg4ek0rxks-3w7kh-Z | |||||||||||||||||||||||
87 | hazem mahmoud abdelhafez aljaafreh | Mutah University | Computer Engineering | Cybersecurity / GRC | https://drive.google.com/open?id=12zlVg99oDmN6z_pHN9pcfMAV8mCcGqpB | |||||||||||||||||||||||
88 | Sama Osama Ali Alrusan | Al Hussein Technical University | Data Analytics and Business Intelligence | Cybersecurity / GRC | https://drive.google.com/open?id=1uLoHPSVGljo4v-YJQ9rJRV6zWEMOqCUU | |||||||||||||||||||||||
89 | Abdullah Khaled Harran Al-Bakheet | University of Bedfordshire | Computer Science and Forensics | Cybersecurity / GRC | https://drive.google.com/open?id=1zduPahW30VFN4ZE50WoRw79m0GVd-3Je | |||||||||||||||||||||||
90 | adnan firas adnan adawi | Amman Arab University | IT in Cyber Security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=14QIm0f1ATV1MQxDI9KcAfq4abvD3PlPV | |||||||||||||||||||||||
91 | Abdalhameed Yousef Atiah AbuAsab | Hashemite University | Computer Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1iu0qFclQAyoESTb2DzhALlWsz8auF0Dv | |||||||||||||||||||||||
92 | ثائر محمد ابراهيم عيد | Hashemite University | Computer Engineering | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1LWwkzFAFK5T4jzRMylDU53eLrqPGOKL9 | |||||||||||||||||||||||
93 | Ghayth Radi Ali Alamrat | Irbid National University, | Cyber Security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1I-P2NdVncSuFca_w-dPEIL2Nptwhkar2 | |||||||||||||||||||||||
94 | Ibrahim Zuhdi Mustafa Hushki | Al-Balqa Applied University (BAU) | SECURITY AND NETWORKING | Cybersecurity / SOC | https://drive.google.com/open?id=1WFb7UP8ZxPuy4o_AG4vVa5nuIlCHpNPA | |||||||||||||||||||||||
95 | sara mohammed ameen ibrahem alshine | Al Al-Bayt University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=1GZltVdnf3TcPOHPxYKYAuZUWGzo0Ct-r | |||||||||||||||||||||||
96 | wafaa abdallah mahmoud alrifai | Al Al-Bayt University | Cyber Security | Cybersecurity / SOC | https://drive.google.com/open?id=10Vaz1n7T0dFAjTzIHUxk6ORVCSXozw9q | |||||||||||||||||||||||
97 | Sora rami mahmoud alrousan | Al-Yarmouk University | Cyber Security | Cybersecurity / GRC | https://drive.google.com/open?id=1wj0TanDDXjf099KbQ9fm-LliGrueoeCq | |||||||||||||||||||||||
98 | Yaqeen Mohammed Jamil Al-Saraireh | the World Islamic Science & Education University, | Cyber Security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1ag0txkw8LSzCybVCPZTLAj69RCUJ8xIO | |||||||||||||||||||||||
99 | Fatima Abdallah Mohammad Al-Quraan | Yarmouk University | Cyber Security | Cybersecurity / Ethical Hacking | https://drive.google.com/open?id=1AEOaD5Yoe0zxt8xsTj-ef45PbrNThICd | |||||||||||||||||||||||
100 | MAHMOUD DAOUD MAHMOUD ALEBAIDAT | Hashemite University | Electrical Engineering | Cybersecurity / SOC | https://drive.google.com/open?id=15aK6b-7ea0uctYCnm_IRB-fTmG82vomR |