Welcome to my personal website. I am a software developer and IT security professional focused on building quality software and bettering the security of IT landscapes.
I have been combining my passion for software development with a keen interest in IT security for some time.
When AFK, I enjoy hiking and jogging.
If you are looking for the CVE-2020-15711 advisory, please take a look here.
Elsewhere
If you would like to get in touch, feel free to reach out via LinkedIn or Mastodon DMs. In most cases, I respond within a week. Below you can find my public key for confidential communication (ID: 1F7C6923873D6B48562CF71BAADC393558A4B092).
-----BEGIN PGP PUBLIC KEY BLOCK-----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=5RXV
-----END PGP PUBLIC KEY BLOCK-----
Depends on the threat model, but usually it is recommended to independently establish the authenticity of the key according to the Web of trust model and not just trust what you find here, regardless of HTTPS.
Certificate Repository
Here you can find a list of certificates for various courses, trainings, etc. (in no specific order) that I have completed. They are linked from my LinkedIn profile and usually used to demonstrate my bias towards continuous learning, or at least one aspect of it.
- Certified Secure Software Lifecycle Professional (CSSLP)
- Offensive Security Certified Professional (OSCP)
- MikroTik Certified Routing Engineer (MTCRE)
- MikroTik Certified Network Associate (MTCNA)
- Certified Ethical Hacker (CEH)
- Full Stack Web Attack
- Threat Modeling Masterclass
- Dutch Language Course (A1A)
- Dutch Language Course (A1B)
- Assessing Application Security
- Web Application Penetration Testing
- DevSecOps: Integrating Security into DevOps
- Preparing for a Zero Trust Initiative
- Ransomware: Identify, Protect, Detect, Recover
- Learning Threat Modeling for Security Professionals
- Building a Strong Culture of Security
- Learning the OWASP Top 10
- Securing the Remote Workforce
- Navigating Cyber Insurance
- Crowdsourced Security
- Coaching
- Leading People
- Meeting Management
- Presentation Skills
- Strategic Thinking
- Team Management
- Time Management
- Writing Skills
- Overcome Overthinking
- Managing Your Time
- Tips for Working Remotely
- Asserting Yourself, an Empowered Choice
- Communicating with Diplomacy and Tact
- Communicating with Emotional Intelligence
- Consulting Foundations
- Critical Roles Consultants Play (and the Skills You Need to Fill Them)
- Critical Thinking
- Excel: Charts in Depth
- Executive Presence on Video Conference Calls
- Leading When You're Not in Charge
- Project Management Reinvented for Non-Project Managers
- Tips for Better Business Writing
- Unlock Your Team's Creativity
- Writing a Business Case
Privacy policy: no personally identifiable information (PII) is collected, stored or processed. No cookies or equivalent technology is used.
© 2021, 2025 Mislav Božičević. This content was prepared or accomplished by the author in his personal capacity. The opinions expressed here are the author's own and do not reflect the view of any previous or current employers. Unless you obtained explicit consent from the copyright owner, you are prohibited from using any data or content from this website to train AI/ML models.