Links

LinkedIn Profile

Scrape LinkedIn Profiles and get information about anyone.
To enable this engine, set theengine=linkedinparameter. Use theurl=<profile_url>parameter to specify the target LinkedIn profile.
Scraping LinkedIn profiles is a highly effective method for collecting valuable data on professionals, including their job titles, companies, educational backgrounds, and other key information.
Get information from any LinkedIn profile

LinkedIn Profile API Integration Examples

We will use the following URL as an example for this request:
https://social.webscrapingapi.com/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/

Ready to Use LinkedIn Profile Scraping Scripts:

cURL
NodeJS
Python
PHP
Go
Java
.NET
Ruby
curl --request GET --url "https://social.webscrapingapi.com/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/"
const http = require("https");
const options = {
"method": "GET",
"hostname": "social.webscrapingapi.com",
"port": null,
"path": "/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/",
"headers": {}
};
const req = http.request(options, function (res) {
const chunks = [];
res.on("data", function (chunk) {
chunks.push(chunk);
});
res.on("end", function () {
const body = Buffer.concat(chunks);
console.log(body.toString());
});
});
req.end();
import http.client
conn = http.client.HTTPSConnection("social.webscrapingapi.com")
conn.request("GET", "/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/")
res = conn.getresponse()
data = res.read()
print(data.decode("utf-8"))
<?php
$curl = curl_init();
curl_setopt_array($curl, [
CURLOPT_URL => "https://social.webscrapingapi.com/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/",
CURLOPT_RETURNTRANSFER => true,
CURLOPT_ENCODING => "",
CURLOPT_MAXREDIRS => 10,
CURLOPT_TIMEOUT => 30,
CURLOPT_HTTP_VERSION => CURL_HTTP_VERSION_1_1,
CURLOPT_CUSTOMREQUEST => "GET",
]);
$response = curl_exec($curl);
$err = curl_error($curl);
curl_close($curl);
if ($err) {
echo "cURL Error #:" . $err;
} else {
echo $response;
}
package main
import (
"fmt"
"net/http"
"io/ioutil"
)
func main() {
url := "https://social.webscrapingapi.com/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/"
req, _ := http.NewRequest("GET", url, nil)
res, _ := http.DefaultClient.Do(req)
defer res.Body.Close()
body, _ := ioutil.ReadAll(res.Body)
fmt.Println(res)
fmt.Println(string(body))
}
HttpResponse<String> response = Unirest.get("https://social.webscrapingapi.com/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/")
.asString();
var client = new RestClient("https://social.webscrapingapi.com/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/");
var request = new RestRequest(Method.GET);
IRestResponse response = client.Execute(request);
require 'uri'
require 'net/http'
require 'openssl'
url = URI("https://social.webscrapingapi.com/v1?engine=linkedin&api_key=<YOUR-API-KEY>&url=https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/")
http = Net::HTTP.new(url.host, url.port)
http.use_ssl = true
http.verify_mode = OpenSSL::SSL::VERIFY_NONE
request = Net::HTTP::Get.new(url)
response = http.request(request)
puts response.read_body

LinkedIn Profile API Specific Parameters

#1: URL Parameter

Parameter
Type
Description
url Required
string
The URL of the profile you are looking to scrape information from.
Response Example
{
"search_parameters": {
"linkedin_url": "https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/?original_referer=",
"engine": "linkedin",
"linkedin_domain": "linkedin.com",
"device": "desktop",
"url": "https://www.linkedin.com/in/zaid-sabih-al-quraishi-5444a6127/"
},
"search_information": {
"organic_results_state": "Results for exact spelling",
"total_results": null,
"query_displayed": null
},
"public_identifier": "zaid-sabih-al-quraishi-5444a6127",
"profile_pic_url": "https://media.licdn.com/dms/image/C5603AQHHJn7xn-H-Yg/profile-displayphoto-shrink_800_800/0/1517031515134?e=2147483647&v=beta&t=0xhdbasx_051WbBQKTntrZmSiM5_wciBq4L9wY6rLZE",
"background_cover_image_url": "https://media.licdn.com/dms/image/C5616AQEBLx4J6UJrvw/profile-displaybackgroundimage-shrink_200_800/0/1661516974355?e=2147483647&v=beta&t=kuFKAAKoSCh7MNMkbe8nJm1COe5_C7oS0lCkV1DaTgI",
"full_name": "Zaid Sabih Al Quraishi",
"occupation": "CEO & Founder at Bug Bounty",
"city": "Dublin",
"state": " County Dublin",
"country": " Ireland",
"headline": "Protecting Businesses from Cyber Threats & Increasing Cyber Security Awareness | CEO & Founder",
"summary": "My name is Zaid Al-Quraishi, I am a professional ethical hacker, computer scientist, and the founder and CEO of zSecurity, ZSVPN & Bug-Bounty. I am passionate about utilising my skills to improve the security of organisations and individuals by identifying and resolving vulnerabilities in their systems.As an experienced ethical hacker, I understand the importance of adhering to a strict code of ethics and always working within legal boundaries. I have in-depth knowledge and experience in the field of cyber security, and I have helped over 1 million students worldwide on multiple teaching platforms to gain a better understanding of the subject.My company, zSecurity & Bug-Bounty, specializes in providing ethical hacking services and bug-bounty programs to help organisations identify and remediate vulnerabilities in their systems. I am dedicated to helping organisations improve their security posture and protect against cyber threats.👉 To find out more about how Bug Bounty can help protect your business schedule a call with me here: https://calendly.com/bug-bounty-com/call",
"experiences": [
{
"starts_at": {
"month": "Mar",
"year": "2021"
},
"ends_at": null,
"company": "Bug Bounty",
"company_url": "https://www.linkedin.com/company/bugbounty-com?trk=public_profile_experience-item_profile-section-card_subtitle-click",
"title": "CEO & Founder",
"description": "Bug-bounty.com by zSecurity harnesses the power of the crowd to test the security of applications.\n\nThe idea is to bridge the gap between businesses and ethical hackers, all under the supervision of the experts at zSecurity.",
"location": "Dublin, County Dublin, Ireland"
},
{
"starts_at": {
"month": "Jan",
"year": "2017"
},
"ends_at": null,
"company": "zSecurity",
"company_url": "https://www.linkedin.com/company/zsecurity-com?trk=public_profile_experience-item_profile-section-card_subtitle-click",
"title": "CEO",
"description": "zSecurity is a leading provider of cyber security training and services. In addition to our online courses we provide Pen Testing, code review and consulting services.\n\nWe’ve trained over 800,000 students, across 219 countries and we have over 1M followers online.\n\nzSecurity is the No.1 destination for those looking to learn about security, ethical hacking, and business protection."
},
{
"starts_at": {
"month": "Jun",
"year": "2014"
},
"ends_at": null,
"company": "Udemy",
"company_url": "https://www.linkedin.com/company/udemy?trk=public_profile_experience-item_profile-section-card_subtitle-click",
"title": "Instructor",
"description": "I have the top rated ethical hacking course on Udemy.\n\nI also teach on StackSocial and StackSkills, and our own platform zSecurity with over 800,000 students enrolled."
},
{
"starts_at": {
"month": "Oct",
"year": "2011"
},
"ends_at": {
"month": "Sep",
"year": "2016"
},
"company": "iSecur1ty",
"company_url": "https://www.linkedin.com/company/isecur1ty?trk=public_profile_experience-item_profile-section-card_subtitle-click",
"title": "Pentester & Head Trainer",
"description": "iSecur1ty.com - is a cyber security company which provides penetration testing and consultation services."
},
{
"starts_at": {
"month": "Sep",
"year": "2010"
},
"ends_at": {
"month": "Oct",
"year": "2011"
},
"company": "iSecur1ty",
"company_url": "https://www.linkedin.com/company/isecur1ty?trk=public_profile_experience-item_profile-section-card_subtitle-click",
"title": "Administrator & Editor",
"description": "ISecur1ty is one of the largest ethical hacking communities in the Arab speaking world. I worked in the website while I was in secondary school. My responsibilities included:\n- Keeping the website up to date by writing news and tutorials.\n- Editing topics sent by other users and ensuring they meet the standards\n- Answering questions asked by users in the Q/A section\n- Responding to enquiries by other people/companies and organizing partnerships with them.\n- Arrange monthly…"
},
{
"starts_at": {
"month": "Mar",
"year": "2014"
},
"ends_at": {
"month": "Mar",
"year": "2014"
},
"company": "PageFair",
"company_url": "https://www.linkedin.com/company/pagefair?trk=public_profile_experience-item_profile-section-card_subtitle-click",
"title": "Software Development Intern",
"description": "During my two week mid-term, I was taken on to do paid work experience by PageFair. My role was to write Python programs to analyze data on major websites traffic. I then used the Flask framework to display the results in an easy to digest manner. Part of the work which I completed was then used by the company's CEO during a conference presentation.",
"location": "Dublin"
}
],
"education": [
{
"starts_at": {
"month": "2012"
},
"ends_at": {
"month": "2016"
},
"field_of_study": "Computer Science",
"degree_name": "Bachelor's degree",
"school": "University College Dublin",
"school_linkedin_profile_url": "https://www.linkedin.com/school/university-college-dublin/?trk=public_profile_school",
"activities_and_societies": "Activities and Societies: NetSoc, Science Soc, Mountaineering club"
}
],
"languages": [
"English",
"Arabic"
],
"accomplishment_organisations": [],
"accomplishment_publications": [
{
"name": "The Ultimate Dark Web, Anonymity, Privacy & Security Course",
"publisher": "udemy",
"published_on": {
"day": 8,
"month": "October",
"year": 2019
},
"description": "An online course designed to teach how properly and securely use both the clear and dark web. Students will learn how to access hidden (onion) services, communicate privately and anonymously using instant messages and email, manually use end-to-end encryption to protect their privacy and make it impossible to read even if it gets intercepted, sign and verify files, share files anonymously, transfer funds anonymously using crypto currencies and much more! You'll also learn how to do all of this in a secure manner making it very difficult for hackers or other entities to hack you or de-anonymise you, and even if you get hacked these entities won't be able to easily control your system or de-anonymise you.",
"url": "https://www.udemy.com/course/the-ultimate-dark-web-anonymity-privacy-security-course/"
},
{
"name": "Learn Ethical Hacking From Scratch [Book]",
"publisher": "Packt",
"published_on": {
"day": 5,
"month": "August",
"year": 2018
},
"description": "This book is based on my best selling course (Learn Ethical Hacking From Scratch), it is designed to introduce people to ethical hacking, it covers the most important fields of ethical hacking such as network hacking, server-side attacks, client-side attacks, social engineering, website hacking and more! The book assumes students have no prior knowledge in hacking or penetration testing and takes them to an intermediate level being able to test the security of systems like black-hat hackers and secure them like security experts.",
"url": "https://www.amazon.com/Learn-Ethical-Hacking-Scratch-penetration/dp/1788622057/"
},
{
"name": "Learn Python & Ethical Hacking From Scratch",
"publisher": "Udemy",
"published_on": {
"day": 24,
"month": "June",
"year": 2018
},
"description": "This is an online course designed to teach python programming and ethical hacking at the same time, the course assumes students have NO prior knowledge in any of these topics, and by the end of it they'll be at a high intermediate level being able to combine both of these skills and write python programs to hack into computer systems exactly the same way that black hat hackers do, not only that but you'll be able to use the programming skills they learn here to write any program even if it has nothing to do with hacking.",
"url": "https://www.udemy.com/learn-python-and-ethical-hacking-from-scratch/"
},
{
"name": "Network Hacking Continued - Intermediate to Advanced",
"publisher": "Zaid Al Quraishi",
"published_on": {
"day": 7,
"month": "November",
"year": 2017
},
"description": "This is a more advanced network hacking course that is designed to build up on my basic network hacking and my introduction to ethical hacking courses, this course focuses on network hacking covering more technical and advanced methods, this course also puts students on the right track to start turning their ideas into reality by teaching how to analyse traffic using MITMproxy and write python scripts that implement their ideas.",
"url": "https://www.udemy.com/network-hacking-continued-intermediate-to-advanced/"
},
{
"name": "Learn Social Engineering From Scratch",
"publisher": "Udemy",
"published_on": {
"day": 15,
"month": "May",
"year": 2017
},
"description": "This is a complete course that focuses on social engineering, it starts with generating evil files for Windows, OS X, Linux and Android, what I mean by evil files is any file that achieves our goal, from backdoors to credential harvesters and keyloggers we have it all covered, not only that but students also learn how to bypass anti-virus programs and create trojans by embedding these files with normal files that the user would use. The course also covers smart delivery methods to deliver these trojans, post exploitation and security.",
"url": "https://www.udemy.com/learn-social-engineering-from-scratch/"
},
{
"name": "Learn Website Hacking / Penetration Testing From Scratch",
"publisher": "Udemy",
"published_on": {
"day": 15,
"month": "November",
"year": 2016
},
"description": "This course focuses on web application penetration testing, it is split into a number of sections where each section covers a common vulnerability, in each of these sections students learn how to discover, exploit, bypass different security implementations, and finally secure web applications from this vulnerability. The course also covers post exploitation where students learn what can they do once they successfully manage to exploit these vulnerabilities.",
"url": "https://www.udemy.com/learn-website-hacking-penetration-testing-from-scratch/"
},
{
"name": "Learn Ethical Hacking From Scratch",
"publisher": "Zaid Sabeeh Al Quraishi",
"published_on": {
"day": 1,
"month": "July",
"year": 2016
},
"description": "This course has been the top ethical hacking course on Udemy for nearly 18 months, it is designed to introduce people to ethical hacking, it assumes that students know nothing about what hacking is, so it covers some basic terminology, linux basics, and then it branches into a number of sections covering the most common hacking topics, these sections are network hacking, server-side and client-side attacks, social engineering, information gathering, website/web application penetration testing and post exploitation.",
"url": "https://www.udemy.com/learn-ethical-hacking-from-scratch"
},
{
"name": "Learn Hacking/Penetration Testing Using Android",
"publisher": "Udemy",
"published_on": {
"day": 1,
"month": "June",
"year": 2015
},
"description": "This course focuses on using Android as a penetration testing tool, first it covers how to weaponise the device, then it covers a number of attacks that would work great with an Android phone because of its portability, not only that but because it is a device that people normally plug into computers without thinking too much about it, it opens the door to a wide range of social engineering attacks, by simply connecting the phone to a computer via USB, we can bypass login screens, reroute network traffic or even gain full control over the computer.",
"url": "https://www.udemy.com/learn-hackingpenetration-testing-using-android-from-scratch/"
},
{
"name": "Learn Wi-Fi Hacking Penetration Testing From Scratch",
"publisher": "Udemy",
"published_on": {
"day": 1,
"month": "June",
"year": 2014
},
"description": "This course focuses on the basics of network hacking, it starts by giving an overview of how networks work and how devices communicate with each other, then it divides into three main sections which show how to exploit this method of communication to discover information about connected clients, crack WEP/WPA/WPA2, reroute traffic using ARP poisoning, run a number of man in the middle attacks and more.",
"url": "https://www.udemy.com/wifi-hacking-penetration-testing-from-scratch/"
}
],
"accomplishment_honors_awards": [],
"accomplishment_patents": [],
"accomplishment_courses": [],
"accomplishment_projects": [
{
"starts_at": {
"month": "October",
"year": "8,"
},
"ends_at": null,
"title": "The Ultimate Dark Web, Anonymity, Privacy & Security Course",
"url": "https://www.udemy.com/course/the-ultimate-dark-web-anonymity-privacy-security-course/",
"description": "An online course designed to teach how properly and securely use both the clear and dark web. Students will learn how to access hidden (onion) services, communicate privately and anonymously using instant messages and email, manually use end-to-end encryption to protect their privacy and make it impossible to read even if it gets intercepted, sign and verify files, share files anonymously, transfer funds anonymously using crypto currencies and much more! You'll also learn how to do all of this in a secure manner making it very difficult for hackers or other entities to hack you or de-anonymise you, and even if you get hacked these entities won't be able to easily control your system or de-anonymise you."
},
{
"starts_at": {
"month": "August",
"year": "5,"
},
"ends_at": null,
"title": "Learn Ethical Hacking From Scratch [Book]",
"url": "https://www.amazon.com/Learn-Ethical-Hacking-Scratch-penetration/dp/1788622057/",
"description": "This book is based on my best selling course (Learn Ethical Hacking From Scratch), it is designed to introduce people to ethical hacking, it covers the most important fields of ethical hacking such as network hacking, server-side attacks, client-side attacks, social engineering, website hacking and more! The book assumes students have no prior knowledge in hacking or penetration testing and takes them to an intermediate level being able to test the security of systems like black-hat hackers and secure them like security experts."
},
{
"starts_at": {
"month": "June",
"year": "24,"
},
"ends_at": null,
"title": "Learn Python & Ethical Hacking From Scratch",
"url": "https://www.udemy.com/learn-python-and-ethical-hacking-from-scratch/",
"description": "This is an online course designed to teach python programming and ethical hacking at the same time, the course assumes students have NO prior knowledge in any of these topics, and by the end of it they'll be at a high intermediate level being able to combine both of these skills and write python programs to hack into computer systems exactly the same way that black hat hackers do, not only that but you'll be able to use the programming skills they learn here to write any program even if it has nothing to do with hacking."
},
{
"starts_at": {
"month": "November",
"year": "7,"
},
"ends_at": null,
"title": "Network Hacking Continued - Intermediate to Advanced",
"url": "https://www.udemy.com/network-hacking-continued-intermediate-to-advanced/",
"description": "This is a more advanced network hacking course that is designed to build up on my basic network hacking and my introduction to ethical hacking courses, this course focuses on network hacking covering more technical and advanced methods, this course also puts students on the right track to start turning their ideas into reality by teaching how to analyse traffic using MITMproxy and write python scripts that implement their ideas."
},
{
"starts_at": {
"month": "May",
"year": "15,"
},
"ends_at": null,
"title": "Learn Social Engineering From Scratch",
"url": "https://www.udemy.com/learn-social-engineering-from-scratch/",
"description": "This is a complete course that focuses on social engineering, it starts with generating evil files for Windows, OS X, Linux and Android, what I mean by evil files is any file that achieves our goal, from backdoors to credential harvesters and keyloggers we have it all covered, not only that but students also learn how to bypass anti-virus programs and create trojans by embedding these files with normal files that the user would use. The course also covers smart delivery methods to deliver these trojans, post exploitation and security."
},
{
"starts_at": {
"month": "November",
"year": "15,"
},
"ends_at": null,
"title": "Learn Website Hacking / Penetration Testing From Scratch",
"url": "https://www.udemy.com/learn-website-hacking-penetration-testing-from-scratch/",
"description": "This course focuses on web application penetration testing, it is split into a number of sections where each section covers a common vulnerability, in each of these sections students learn how to discover, exploit, bypass different security implementations, and finally secure web applications from this vulnerability. The course also covers post exploitation where students learn what can they do once they successfully manage to exploit these vulnerabilities."
},
{
"starts_at": {
"month": "July",
"year": "1,"
},
"ends_at": null,
"title": "Learn Ethical Hacking From Scratch",
"url": "https://www.udemy.com/learn-ethical-hacking-from-scratch",
"description": "This course has been the top ethical hacking course on Udemy for nearly 18 months, it is designed to introduce people to ethical hacking, it assumes that students know nothing about what hacking is, so it covers some basic terminology, linux basics, and then it branches into a number of sections covering the most common hacking topics, these sections are network hacking, server-side and client-side attacks, social engineering, information gathering, website/web application penetration testing and post exploitation."
},
{
"starts_at": {
"month": "June",
"year": "1,"
},
"ends_at": null,
"title": "Learn Hacking/Penetration Testing Using Android",
"url": "https://www.udemy.com/learn-hackingpenetration-testing-using-android-from-scratch/",
"description": "This course focuses on using Android as a penetration testing tool, first it covers how to weaponise the device, then it covers a number of attacks that would work great with an Android phone because of its portability, not only that but because it is a device that people normally plug into computers without thinking too much about it, it opens the door to a wide range of social engineering attacks, by simply connecting the phone to a computer via USB, we can bypass login screens, reroute network traffic or even gain full control over the computer."
},
{
"starts_at": {
"month": "June",
"year": "1,"
},
"ends_at": null,
"title": "Learn Wi-Fi Hacking Penetration Testing From Scratch",
"url": "https://www.udemy.com/wifi-hacking-penetration-testing-from-scratch/",
"description": "This course focuses on the basics of network hacking, it starts by giving an overview of how networks work and how devices communicate with each other, then it divides into three main sections which show how to exploit this method of communication to discover information about connected clients, crack WEP/WPA/WPA2, reroute traffic using ARP poisoning, run a number of man in the middle attacks and more."
}
],
"accomplishment_test_scores": [
{
"name": "Stage 4 GPA",
"score": "3.95",
"date_on": {
"month": "Jun",
"year": "2016"
}
},
{
"name": "Stage 3 GPA",
"score": "3.93",
"date_on": {
"month": "Jun",
"year": "2015"
}
},
{
"name": "Stage 2 GPA",
"score": "4.17",
"date_on": {
"month": "Jun",
"year": "2014"
}
},
{
"name": "Stage 1 GPA",
"score": "4.03",
"date_on": {
"month": "Jun",
"year": "2013"
}
}
],
"volunteer_work": [],
"certifications": [],
"connections": 500,
"people_also_viewed": [
{
"link": "https://ng.linkedin.com/in/2faisalgama?trk=public_profile_recommendations",
"name": "Faisal A. Garba",
"location": "“Zaid Sabih is super-awesome! I was wandering in the field of cybersecurity with no sense of direction. But his courses gave me a whole sense of direction. I have achieved alot and have helped alot of other people with the knowledge I have gained using his courses. ”"
},
{
"name": "LinkedIn User",
"location": "“He is very well versed in his subjects (Ethical Hacking) and stays well informed about its latest trends and is a very resourceful person.”"
},
{
"link": "https://ie.linkedin.com/in/adrianbude?trk=public_profile_browsemap",
"name": "Adrian Bude",
"summary": "Protecting Businesses from Cyber Threats & Increasing Cyber Security Awareness 🔒 | CTO & Co-Founder",
"location": "Ireland"
},
{
"link": "https://gr.linkedin.com/in/dimitris-kalopisis-698a251ab?trk=public_profile_browsemap",
"name": "Dimitris Kalopisis",
"summary": "OSCP | Teaching Assistant & Digital Manager at zSecurity | Ethical Hacker",
"location": "Kaválla"
},
{
"link": "https://uk.linkedin.com/in/davidbombal?trk=public_profile_browsemap",
"name": "David Bombal",
"summary": "Author, Instructor and YouTuber - I've now reached 30,000 connections on LinkedIn and am unable to accept new connections. Please follow me instead.",
"location": "Oxford"
},
{
"link": "https://www.linkedin.com/in/husseinmuhaisen?trk=public_profile_browsemap",
"name": "Hussein Muhaisen",
"summary": "A High-Flyer Engineer, Tech and Cybersecurity"
},
{
"link": "https://www.linkedin.com/in/kevinmitnick?trk=public_profile_browsemap",
"name": "Kevin Mitnick",
"summary": "The World's Most Famous Hacker | CEO | Author | Professional Speaker",
"location": "Henderson, NV"
},
{
"link": "https://in.linkedin.com/in/farah-hawa-a012b8162?trk=public_profile_browsemap",
"name": "Farah Hawa",
"summary": "Team Lead Security Operations at Bugcrowd",
"location": "Mumbai"
},
{
"link": "https://www.linkedin.com/in/dalemeredith?trk=public_profile_browsemap",
"name": "Dale Meredith",
"summary": "Cyber Security Speaker, Pluralsight Author, Trainer, Certified EC-Council Instructor. Blogger, Batman Addict",
"location": "Syracuse, UT"
},
{
"link": "https://www.linkedin.com/in/themarigalloway?trk=public_profile_browsemap",
"name": "Mari Galloway, MSIS CISSP, Cyber Ninja",
"summary": "Award winning Cyber and Nonprofit Exec, Linkedin Learning Instructor, Speaker, Author, Mentor, Automation",
"location": "Las Vegas, NV"
},
{
"link": "https://uk.linkedin.com/in/housenathan?trk=public_profile_browsemap",
"name": "Nathan House",
"summary": "Leading Cyber Security Expert - CEO and Founder at StationX",
"location": "Richmond"
},
{
"link": "https://ch.linkedin.com/in/kolochenko?trk=public_profile_browsemap",
"name": "Ilia Kolochenko, PhD, MSc, LLM",
"summary": "Founder at ImmuniWeb | Adjunct Professor of Cybersecurity & Cyber Law | Member of Europol EDEN & EU CyberNet",
"location": "Geneva"
},
{
"link": "https://in.linkedin.com/in/ansh-bhawnani?trk=public_profile_browsemap",
"name": "Ansh Bhawnani",
"summary": "Application Security Engineer | OSCP | CEH | GPEN | Content Creator",
"location": "Bhilai"
},
{
"link": "https://uk.linkedin.com/in/angela-yu1?trk=public_profile_browsemap",
"name": "Angela Yu",
"summary": "Founder of The App Brewery | NHS Doctor | International Speaker Teaching 1 million people how to code.",
"location": "London"
},
{
"link": "https://sg.linkedin.com/in/loiliangyang?trk=public_profile_browsemap",
"name": "LOI LiangYang",
"summary": "AWS Security | CISSP | Certified Ethical Hacker | CompTIA Security+ | Adjunct Lecturer for Cybersecurity",
"location": "Singapore"
},
{
"link": "https://nl.linkedin.com/in/jenniferwennekers?trk=public_profile_browsemap",
"name": "Jennifer Wennekers",
"summary": "🛡️ Cyber Threat Management Enthusiast | \"OutOfBand\" Podcast Host | Mentor | Women4Cyber European Female Cybersecurity Role Model",
"location": "Amsterdam"
},
{
"link": "https://www.linkedin.com/in/jmportilla?trk=public_profile_browsemap",
"name": "Jose Marcial Portilla",
"summary": "Head of Data Science",
"location": "United States"
},
{
"link": "https://ca.linkedin.com/in/malty?trk=public_profile_browsemap",
"name": "Youssef Elmalty",
"summary": "Principal Security Advisor @ Amazon Web Services",
"location": "Vancouver, BC"
},
{
"link": "https://pt.linkedin.com/in/nunoteodoro?trk=public_profile_browsemap",
"name": "Nuno Martins da Silveira Teodoro",
"summary": "Chief Information Security Officer | Author & Keynote Speaker | Cybersecurity Strategy Exec Advisor | Global Fortune 500 CISO",
"location": "Lisbon"
},
{
"link": "https://ee.linkedin.com/in/martin-bullman?trk=public_profile_browsemap",
"name": "Martin Bullman",
"summary": "Co-Founder & CTO @ QuickMinutes",
"location": "Tallinn"
},
{
"link": "https://uk.linkedin.com/in/dnewell1?trk=public_profile_browsemap",
"name": "David Newell",
"summary": "Co-Founder at Unflow (YC S19)",
"location": "London"
},
{
"link": "https://ie.linkedin.com/in/chand-sheikh?trk=public_profile_browsemap",
"name": "Chand Sheikh",
"summary": "Python development, Django, artificial intelligence (AI) and Machine Learning (ML) to contribute innovative ideas that support current and future advancements in technology",
"location": "Cork Metropolitan Area"
}
],
"recommendations": [
{
"recommended_by": "Faisal A. Garba",
"content": "“Zaid Sabih is super-awesome! I was wandering in the field of cybersecurity with no sense of direction. But his courses gave me a whole sense of direction. I have achieved alot and have helped alot of other people with the knowledge I have gained using his courses. ”"
},
{
"recommended_by": "LinkedIn User",
"content": "“He is very well versed in his subjects (Ethical Hacking) and stays well informed about its latest trends and is a very resourceful person.”"
}
],
"activities": [
{
"title": "Learn how to hack phones & computers using a link 🔗 https://lnkd.in/ePYc-dfz #hack #EthicalHacking #CyberSecurity https://lnkd.in/ePYc-dfz",
"link": "https://www.linkedin.com/posts/zaid-sabih-al-quraishi-5444a6127_hack-phones-computers-using-a-link-activity-7009124438273097729-wbV6?trk=public_profile_share_view",
"status": "Shared by Zaid Sabih Al Quraishi"
},
{
"title": "#Hack with #SMS https://lnkd.in/ehNfPZVz #Hacking #ethicalhacking #cybersecurity",
"link": "https://www.linkedin.com/posts/zaid-sabih-al-quraishi-5444a6127_hack-with-sms-sms-spoofing-like-mr-robot-activity-7000080313741623296-HMFc?trk=public_profile_share_view",
"status": "Shared by Zaid Sabih Al Quraishi"
},
{
"title": "#BlackFriday starts early at zSecurity! We discounted our #hacking hardware, courses and memberships 👇 https://lnkd.in/eKsxjS4r #cybersecurity…",
"link": "https://www.linkedin.com/posts/zaid-sabih-al-quraishi-5444a6127_blackfriday-hacking-cybersecurity-activity-6999008772593438720-ShYo?trk=public_profile_share_view",
"status": "Shared by Zaid Sabih Al Quraishi"
},
{
"title": "Learn #BugBounty hunting from scratch 🐞 Get 50% discount + Free VIP membership! 1 day left for this discount 👇 https://lnkd.in/e8MfiQpP",
"link": "https://www.linkedin.com/posts/zaid-sabih-al-quraishi-5444a6127_bugbounty-activity-6984876328164454400-mA1G?trk=public_profile_share_view",
"status": "Shared by Zaid Sabih Al Quraishi"
},
{
"title": "The minute you begin to value yourself, others will too. If you are ready to realize your value in 2022, you will attract the clientele that values…",
"link": "https://www.linkedin.com/posts/theheathermonahan_2022goals-value-negotiate-activity-6968558977341136896-Or5y?trk=public_profile_like_view",
"status": "Liked by Zaid Sabih Al Quraishi"
},
{
"title": "Brain bubbles: Researchers describe the dynamics of cavitation in soft porous material",
"link": "https://www.linkedin.com/posts/henry-val-2116804_brain-bubbles-researchers-describe-the-dynamics-activity-6970738095063240704-LTUp?trk=public_profile_like_view",
"status": "Liked by Zaid Sabih Al Quraishi"
},
{
"title": "Thank you. Without your support, this would never have been possible. Thank you. YouTube",
"link": "https://www.linkedin.com/posts/davidbombal_thank-you-without-your-support-this-would-activity-6948022544457175040-xzXW?trk=public_profile_like_view",
"status": "Liked by Zaid Sabih Al Quraishi"
},
{
"title": "[ V I D E O ] Top 5 Best #hacking Hardware! https://lnkd.in/gErZNkhZ #ethicalhacking #cybersecurity",
"link": "https://www.linkedin.com/posts/zaid-sabih-al-quraishi-5444a6127_top-5-best-hacking-hardware-activity-6945708680445145088-mL8S?trk=public_profile_share_view",
"status": "Shared by Zaid Sabih Al Quraishi"
}
],
"similarly_named_profiles": [],
"articles": [],
"groups": []
}