About

[cherry_row bg_type=”parallax_image” class=”negative_indent” image_src=”https://govath.com/wp-content/uploads/2015/05/Business-Consulting.png” parallax_speed=”1.5″ parallax_invert=”no” min_height=”300″]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”yes”]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

[cherry_spacer size=”70″]

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″ offset_xs=”0″ offset_sm=”0″ offset_md=”2″ offset_lg=”2″]

[/cherry_col]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none”]

CSlogo-768x342

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

Working

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”10″ size_xs=”12″ size_sm=”12″ size_lg=”10″ offset_xs=”0″ offset_sm=”0″ offset_md=”1″ offset_lg=”1″]

Alexandros works as Maritime Cyber Security Consultant of SOFTimpact Ltd. Acts as advisor, guide and all-around security guru. With more than 8 years of experience in planning, designing and implementing robust security solutions onboard and offshore. Determines the most effective way to protect computers, networks, software, data and information systems against any possible attacks, perform vulnerability testing, risk analyses and security assessments.

Experienced Information Technology Engineer with a demonstrated history of working in the information technology and services industry. With a strong technical background, on the majority of technologies such as Hyper-V/VMware, Windows, Linux, Databases, Firewalls,IP telephony and cloud technologies. Information technology professional with a Computer Science focused in Computer Science from Frederick University Cyprus.

[/cherry_col]

[/cherry_row]

[cherry_row]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

[cherry_spacer size=”83″]

[/cherry_col]

[/cherry_row]

[cherry_row bg_type=”parallax_image” image_src=”https://govath.com/wp-content/uploads/2015/05/web-development.jpg” parallax_speed=”1.5″ parallax_invert=”no” min_height=”300″]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”yes”]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

Web Development

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

[cherry_spacer size=”73″]

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

Certifications

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

Windows

[/cherry_col_inner]

[/cherry_row_inner]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

 Administering Microsoft SQL Server 2012 Databases

 Microsoft Certified Professional: Installing and Configuring Windows Server 2012

 Microsoft Certified Technology Specialist: SQL Server 2008, Implementation and Maintenance

 Microsoft Certified Technology Specialist: Microsoft Exchange Server 2010, Configuration

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

IP Telephony

[/cherry_col_inner]

[/cherry_row_inner]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

 3CX Certified Engineer

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

CISCO

[/cherry_col_inner]

[/cherry_row_inner]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

CCNA Exploration

  1. Network Fundamentals
  2. Routing Protocols and Concepts
  3. LAN Switching and Wireless
  4. Accessing the WAN

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

Security

[/cherry_col_inner]

[/cherry_row_inner]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

Ethical Hacking
Certification License 40 hours training

End User: Social Engineering
Certification – License SC-7b74103188-bc4046

Improving The Security knowledge in ICT
(EVTEK University Espoo Finland)

 

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

Publication

[/cherry_col_inner]

[/cherry_row_inner]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

Publication: Indoor Mobile Robot Localization Using a Wireless Network: WiFiBot Case Study. IC-AI 2008:668-674 (FREDERICK UNIVERSITY CYPRUS)

 Certificate in Robotics (FREDERICK UNIVERSITY CYPRUS)

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[cherry_col size_md=”4″ size_xs=”12″ size_sm=”12″ size_lg=”4″]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

Linux

[/cherry_col_inner]

[/cherry_row_inner]

[cherry_row_inner type=”fixed-width”]

[cherry_col_inner size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″ offset_xs=”none” offset_sm=”none” offset_md=”none” offset_lg=”none” pull_xs=”none” pull_sm=”none” pull_md=”none” pull_lg=”none” push_xs=”none” push_sm=”none” push_md=”none” push_lg=”none” collapse=”no”]

10 Years Experience (Fedora, Debian)

 

[/cherry_col_inner]

[/cherry_row_inner]

[/cherry_col]

[/cherry_row]

[cherry_row type=”fixed-width”]

[cherry_col size_md=”12″ size_xs=”12″ size_sm=”12″ size_lg=”12″]

[cherry_spacer size=”71″]

[/cherry_col]

[/cherry_row]

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.