Ali Mohammadioun(Ali Kaya is his Turkish name) has achieved many certifications and licenses. The followings are the most important certifications:
Information Systems Audit and Control Association (ISACA)
-
-
ISACA Certified Information Security Manager (CISM)
International Organization for Standardization (ISO)
-
-
ISO 9001
-
-
ISO 27001
-
-
ISO 27001
CompTIA Certifications
-
-
CompTIA – CASP+
-
-
CompTIA – CySA+
-
-
CompTIA – Security+
-
-
CompTIA – CSAE
-
-
CompTIA – CSAP
Microsoft Certifications
-
-
Microsoft Azure Administrator Associate Certification
-
-
Microsoft Certified IT Professional (MCITP)
-
-
Microsoft Certified Trainer
LPIC Certifications
-
-
Linux Professional Institute Certification 1
-
-
Linux Professional Institute Certification 2
Alison Certificates
-
-
Home business
-
-
Interconnecting Cisco Network Devices
-
-
Open AI Security
-
-
Shopify ecommerce
-
-
Certified Information Systems Security Professional
-
-
CompTIA Cloud + Intermediate
Tehran Institute of Technology
-
-
Mikrotik certified network associate
-
-
Network-plus
Other Certificates
-
-
Google Digital Garage – Funamentals of digital marketing
-
-
Brainmeasures Certified Information Systems Security Professional
-
-
Vmware Certified Professional
-
-
Great Learning – Advance Cyber Security
Certificates of paper admission and publication
-
-
Management and protection of computer networks
-
-
an overview of anomaly detection using data mining methods
-
-
Identifying and reducing the effect of ransomware using network and software
-
-
Disaster recovery techniques in database systems
-
-
An overview of anomaly detection using data mining methods
-
-
Examining the role of data mining in business intelligence projects
-
-
Image processing and introduction of its use techniques
-
-
Investigating a mobile phone malware detection method using behavioral features in network traffic
-
-
Investigation and analysis synergy of supporting technologies in artificial intelligence
-
-
Investigation of artificial neural networks
-
-
Examining the available methods for authentication in privacy protection
-
-
Investigating human activity detection methods with video processing
-
-
Measuring security and reliability in authentication of social networking sites