“Verlaine is an exceptional creator with impressive problem-solving skills & mentorship. He is calm, professional and very dependable. His warm personality and skill set in the tech ecosystem will be an asset to any organization. I'd be delighted to have him on my team any day because he goes above and beyond. He is a Mentor & a Global Talent.”
| CARVIEW |
Sign in to view verlaine j’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view verlaine j’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Lubumbashi, Haut-Katanga, Democratic Republic of the Congo
Sign in to view verlaine j’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
5K followers
500+ connections
Sign in to view verlaine j’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with verlaine j
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with verlaine j
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view verlaine j’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Services
Activity
Sign in to view verlaine j’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
I hit 100k LinkedIn impressions in 2 weeks. By IGNORING almost every “expert” rule. LinkedIn internet will SWEAR there is ONE correct way to grow:…
I hit 100k LinkedIn impressions in 2 weeks. By IGNORING almost every “expert” rule. LinkedIn internet will SWEAR there is ONE correct way to grow:…
Liked by verlaine j muhungu
Experience & Education
-
Informa TechTarget
********** ******
-
**** ******
******* *** ******* *******
-
**********
********** ******
-
***** ********** *******
-
View verlaine j’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Publications
-
Moving to DevOps? Discover 5 Python Modules to Shine in Your New Journey
Hackernoon
See publicationDevOps is not a technology, it's a culture, a philosophy, Since its advent in 2007 different teams around the globe have made a great impact by launching successful products. do you want to be part of the movement? start your journey now!
-
Generative AI: the Good and the Bad, a Midjourney Experience
Hackernoon
See publicationMidjourney is an AI tool that turns text into pictures in a minute. The tool has been adopted by digital creators, influencers, writers, and bloggers. Midjourney prevents extreme violence, sexual or pornographic themes, and reposting publicly the creations of others without their permission.
-
The Future of Cybersecurity in the Age of AI: Developers vs Generative AI?
Hackernoon
See publicationSince the advent of the internet, there has been a growing buzz surrounding the emergence of generative Ai. According to Ray Kurzweil, AI is expected to surpass human intelligence and pass the Turing test by 2029. He also predicts that by 2045, humans will merge with the AI we have created - a concept he refers to as "The Singularity"
-
Types of Nmap scans and best practices
Tech Target
See publicationNmap has been the most popular network reconnaissance tool for the past 25 years. With our world becoming increasingly connected, it is crucial for network engineers with security skills to know how to use this tool to prevent possible attacks by bad actors. By using Nmap, engineers can discover vulnerabilities in networks and create more secure systems.
-
An introduction to Git for network engineers
Tech Target
See publicationThe culture of blaming different teams for issues is no longer prevalent in today's workplace. Linus Torvald, the founder of the operating system, developed Git, the most widely used version control system. This system helps distributed teams track their projects from anywhere in the world. As the world of networking moves towards NetdevOps, it is crucial for network engineers to understand and use Git.
-
How to interact with network APIs using cURL, Postman tools
Tech Target
See publicationNetwork APIs are ubiquitous. From our smartphones interacting with remote servers to data centers spanning the globe, network engineers who want to move towards automation and programmability should learn how to work with a set of devices for improved efficiency. The CLI is not suitable for complex tasks!
-
Python interpreter vs. IDE: What network engineers should know
Tech Target
See publicationWhen network engineers transition to automation, learning Python is essential. As they explore various tools, they may feel overwhelmed. Starting with an interpreter and IDE is a good way to begin their training.
-
Pangea Cyber a Spaas for developers Part 1
Tales of Technology
See publicationPangea provides top-tier developer services, learn how to secure the digital world with an API-driven approach.
-
A guide to network APIs and their use cases
Tech Target
See publicationApis changed the way we work now in network engineering, we went from manual processes to automation, and the CLI can't handle complex work anymore like before,as networks scale API is the new CLI !
-
My First Common Vulnerability Exposure (CVE) | A DevNet Journey - Part 1
Cisco Learning Network
See publicationNmap plays a crucial role in network audit, discover how to use it on the Windows Linux subsystem to discover vulnerabilities.
Projects
-
100 Days of Cisco pyATS
Whether you're just starting your automation journey or looking to level up, this is your chance to practice, learn, and grow with one of the most powerful test automation frameworks in the industry.
Why pyATS?
✅ Built by Cisco, used far beyond Cisco
✅ Designed for safe, repeatable, real-world automation testing
✅ Powered by Python,the defacto language of automation
✅ Perfect for building confidence and creativity in the AI era
This initiative is…Whether you're just starting your automation journey or looking to level up, this is your chance to practice, learn, and grow with one of the most powerful test automation frameworks in the industry.
Why pyATS?
✅ Built by Cisco, used far beyond Cisco
✅ Designed for safe, repeatable, real-world automation testing
✅ Powered by Python,the defacto language of automation
✅ Perfect for building confidence and creativity in the AI era
This initiative is inspired by the incredible work of John Capobianco and Daniel Wade. It’s an honor to carry this forward and build a community around it.Other creators
Honors & Awards
-
Cisco learning Network community ambassador 2023
Cisco learning Network
The community ambassador program recognizes dedicated learners who are the most active, engaged, helpful members on the Cisco Learning Network.
this all-inclusive program allows to empower individual members who have made a positive impact and established them into roles as respected community leaders.
https://learningnetwork.cisco.com/s/blogs/a0D6e00000sSxqpEAC/community-ambassadors-announcement-for-2023 -
Cisco learning network rookie
Cisco
The Community Spotlight Awards recognize members of the Cisco Learning Network in various categories, who demonstrate leadership and commitment to peers by making a significant contribution of time and expertise within the community.
-
Cisco Netriders Challenge Top talent Subsaharan Africa (CCENT) TOP 25
Cisco
Cisco Networking Academy NetRiders IT skills competitions are a great opportunity for students and alumni to showcase their networking abilities, learn valuable new IT skills, and gain visibility among talent recruiters in the growing ICT and networking field.
Languages
-
Français
Full professional proficiency
-
English
Full professional proficiency
-
Swahili
Native or bilingual proficiency
-
German
Elementary proficiency
-
Finnish
Elementary proficiency
Recommendations received
8 people have recommended verlaine j
Join now to viewView verlaine j’s full profile
-
See who you know in common
-
Get introduced
-
Contact verlaine j directly
Other similar profiles
Explore more posts
-
Anna Ribeiro
IndustrialCyber
CompTIA announced it is developing a new certification focused on core cybersecurity skills for operational technology (OT) environments. The upcoming SecOT+ certification targets the persistent gap between #OT and IT expertise. It aims to equip #cybersecurity professionals, ranging from floor technicians and #industrial engineers to cybersecurity engineers and network architects, with a unified skill set to detect, mitigate, and respond to security threats in #manufacturing and #criticalinfrastructure environments. Detailing how the introduction of CompTIA’s SecOT+ certification reshapes the talent pipeline and workforce readiness in critical infrastructure sectors, James Stanger, chief technology evangelist at CompTIA, told Industrial Cyber that the #organization has several goals in mind regarding the development of #cybersecuritytalent. “First, it should help workers enter into the OT world more quickly. No one has ever tried that before on the scale we have in mind,” Stanger said. “Second, it should help traditional OT workers understand how IT security works. OT workers have traditionally focused on availability, more than confidentiality, integrity, #authentication, and #encryption. Because OT is a fundamental part of the world’s critical infrastructure, and because OT and IT technologies are now being combined, it is vital that OT workers become literate about IT technology concerns, as well.” https://lnkd.in/gAzU8uct
164
11 Comments -
Darktrace
Fragmented tools are failing SOC teams in the cloud era! For the first time, security teams can detect novel cloud threats in real time, automatically investigate them with forensic depth, and respond decisively — all within a single solution built for hybrid and multi-cloud environments. Read the full blog! 👇 🔗 https://lnkd.in/gYAaEdpm
67
-
Microsoft Threat Intelligence
Human-operated ransomware attacks frequently involve compromising domain controllers, which attackers then use as the primary spreader device — the system responsible for distributing ransomware at scale within a compromised environment. Ransomware threat actors exploit domain controllers to fulfill two requirements that are critical to deploying ransomware on multiple devices simultaneously: access to high-privilege accounts and central network assets. Compromising a domain controller allows threat actors to extract password hashes as well as create and elevate privileged accounts to facilitate lateral movement. Domain controllers also provide access to many endpoints in the network and can be exploited to rapidly deploy ransomware across an environment. Security teams constantly face the complex challenge of striking the right balance between security and operational functionality when it comes to protecting domain controllers. Unlike other endpoints, domain controllers must remain highly accessible to authenticate users, enforce policies, and manage resources across the environment, making it difficult to apply traditional security measures without disrupting business continuity. To address this challenge, we have expanded our contain device capability in Defender for Endpoint to include granular containment of critical assets such as domain controllers through automatic attack disruption. This means that if domain controller is compromised, it is immediately contained in less than three minutes, preventing the threat actor from moving laterally and deploying ransomware, while at the same time maintaining the operational functionality of the device. The expansion also adds containment of IP addresses linked to undiscovered devices, which can identify and incriminate malicious IP addresses linked to unmanaged or undiscovered devices and automatically contain those IPs, preventing attackers from getting their foot in the door through vulnerable, unmanaged devices. Learn more about this update through our blog: https://msft.it/6047qFEZl More details on these automatic attack disruption enhancements are available through our tech community blog, and official documentation: https://msft.it/6048qFEZm https://msft.it/6049qFEZW
244
10 Comments -
Daily REDTeam
✅ Penetration Testing Best Practices Checklist Navigating the world of cybersecurity can be challenging, but effective penetration testing (pentesting) is crucial for safeguarding your organization. Here’s a quick checklist to optimize your pentesting efforts: 1. **Define Your Objectives**: Understand why you're conducting a pentest. Align your goals with the outcomes you seek—security improvement, compliance, or customer reassurance. 2. **Know Your Pentests**: Differentiate between internal vs. external pentests, vulnerability assessments, and security audits. Clarity here is key! 3. **Threat Enumeration**: Assess risks to identify areas most vulnerable to attacks. Where is your sensitive data? Are you using outdated applications? 4. **Scope and Budget**: Clearly define the scope and ensure your budget aligns with your objectives. Remember, you often get what you pay for! 5. **Prepare the Environment**: Ensure a controlled environment for testing, minimizing disruptions during the process. 6. **Communication is Key**: Keep your team informed and available for questions during the pentest. Clear communication can prevent misunderstandings. 7. **Post-Test Actions**: After the pentest, review the findings, prioritize vulnerabilities, and schedule retests as necessary. 👉 Let's make the daily red team a priority! #PenetrationTesting #Cybersecurity #InfoSec #SecurityAwareness #BestPractices #dailyredteam #VulnerabilityManagement #Sqreen
304
7 Comments -
BlackBerry
Nation-state actors are targeting core infrastructure like telecom networks, ISPs, and internet routing systems by leveraging lawful intercept tools and AI-powered social engineering to carry out long-term, strategic espionage — often undetected for years. Gregory Richardson, Vice President, Advisory CISO at BlackBerry, explains how campaigns like Salt Typhoon are forcing CISOs and telecom leaders to rethink their security priorities. Read the full Help Net Security interview: https://lnkd.in/dwJCd6KQ #BlackBerry #SecureCommunications #ZeroTrust #SaltTyphoon
47
-
Rapid7
🚨 On September 25, 2025, #Cisco published advisories for 3 vulnerabilities affecting multiple different Cisco products. CVE-2025-20333 & CVE-2025-20362 are known to be exploited in the wild, while the third vuln, CVE-2025-20363, is said to be at high risk thereof. Find mitigation guidance and more in the Rapid7 blog: https://r-7.co/4pLZs0Y
50
-
The Shadowserver Foundation
We are scanning for & reporting Nakivo Backup & Replication CVE-2024-48248 (arbitrary file read) vulnerable instances in our Vulnerable HTTP report: https://lnkd.in/dX7Afu4a. ~208 vulnerable instances seen 2025-02-26 Dashboard map view of vulnerable instances: https://lnkd.in/dpB7hrSP Data is tagged 'vulnerable-nakivo-backup' since 2025-02-13 thanks to watchTowr. We have also added the 'cve-2024-48248' tag as well starting today. These kind of products have historically been targeted by ransomware operators. If you run Nakivo, make sure to update your instance to the latest version! (vulnerability was silently patched 2024-11-04). For an in-depth analysis of the vulnerability, please read the watchTowr blog at https://lnkd.in/esdzVTGv #cybersecurity #vulnerabilitymanagement #riskmanagement #situationalwareness #threatintelligence #attacksurface #shadowserver #CyberCivilDefense
25
1 Comment -
Corelight
SOC analysts face hundreds of alerts every day. Multi-layered detections provide context that cuts investigation time and reduces false positives—so analysts can respond faster and with confidence. 👉 See how layering your detection helps clarify and accelerate response. Learn more: https://lnkd.in/gBgsYyUC
26
1 Comment -
Cybersecurity and Infrastructure Security Agency
OT Owners & Operators: Cyber threat actors can exploit products lacking #SecureByDesign principles such as weak authentication and limited logging. We know that it is difficult and costly for asset owners to defend against these threats if security is not considered and implemented in the design and development of OT products. https://go.dhs.gov/Ujv Our 🆕 guide, created with global partners provides a comprehensive overview of how you can integrate 🔒 security into your procurement process when purchasing industrial automation and control systems, as well as other OT products. 👉 https://go.dhs.gov/Ujv
75
2 Comments -
Seceon Inc.
𝗜𝘀 𝘆𝗼𝘂𝗿 𝗰𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗽𝗿𝗼𝗴𝗿𝗮𝗺 𝘁𝗿𝘂𝗹𝘆 𝗿𝗲𝘀𝗶𝗹𝗶𝗲𝗻𝘁? With 𝗦𝗲𝗰𝗲𝗼𝗻 𝗮𝗶𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗦𝗰𝗼𝗿𝗲𝟯𝟲𝟬 & 𝗕𝗜𝟯𝟲𝟬, you gain more than just visibility - you gain actionable intelligence to stay ahead of evolving #cyberthreats. 𝗞𝗲𝘆 𝗛𝗶𝗴𝗵𝗹𝗶𝗴𝗵𝘁𝘀: • Unified visibility into internal & external attack surfaces (networks, endpoints, #cloud, #OT, #IoT) • Continuous compliance reporting across NIST 2.0, PCI-DSS, HIPAA, GDPR & more • Customizable dashboards & reports for real-time posture monitoring • AI/ML-powered #anomaly detection & automated remediation • Benchmarking & risk scoring to track cybersecurity effectiveness Seceon empowers 𝗜𝗧 𝘁𝗲𝗮𝗺𝘀, 𝗠𝗦𝗣𝘀 & 𝗠𝗦𝗦𝗣𝘀 𝘁𝗼 𝘀𝗶𝗺𝗽𝗹𝗶𝗳𝘆 𝗰𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲, 𝗿𝗲𝗱𝘂𝗰𝗲 𝗿𝗶𝘀𝗸𝘀, 𝗮𝗻𝗱 𝗿𝗲𝘀𝗽𝗼𝗻𝗱 𝘁𝗼 𝘁𝗵𝗿𝗲𝗮𝘁𝘀 𝗶𝗻 𝗿𝗲𝗮𝗹 𝘁𝗶𝗺𝗲 - turning complexity into clarity. Whether it’s meeting regulations, preventing breaches, or proving ROI to stakeholders, 𝗦𝗰𝗼𝗿𝗲𝟯𝟲𝟬 & 𝗕𝗜𝟯𝟲𝟬 𝗱𝗲𝗹𝗶𝘃𝗲𝗿 𝘁𝗵𝗲 𝗶𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 𝘆𝗼𝘂 𝗻𝗲𝗲𝗱. Explore the full datasheet and see how Seceon helps you measure, monitor, and mitigate risks 24x7. #CyberSecurity #Compliance #AI #RiskManagement #MSSP #MSP #Seceon Shikha Pandey Chandra Shekhar Pandey Argha Bose Vinay Ojha Tom Ertel Maggie MacAlpine Sana Anjali Devi Waldek Mikolajczyk Pushpendra Mishra 🇮🇳 Kriti Tripathi Aashish Kumar Goela Jocelyn Joy Amancio Britto
59
1 Comment -
Kaspersky
Interesting APT research and cybersecurity news of the week ▪️ A new trojan, GodRAT, targets financial organizations. This malware traces its roots to the well-known Gh0st RAT code and is similar to the AwesomePuppet malware linked to the Winnti/APT41 group. https://lnkd.in/dumhyypK ▪️ Data leaks from the Kimsuky threat cluster revealed details about the WgetCloud service, which attackers use to mask their operations. https://lnkd.in/dmS6SS5W ▪️ Targeting Linux desktops is gaining momentum. Recently, malicious .desktop files were spotted in APT36/Transparent Tribe attacks on Asian organizations. https://lnkd.in/g332sCT4 ▪️ APT Muddy Water has increased attacks worldwide, focusing on CFOs of organizations https://lnkd.in/eXVMpNzr ▪️ Microsoft analyzed current ClickFix attack scenarios: https://lnkd.in/dBeaN4as ▪️ Kaspersky ICS CERT provides an overview of the modern vehicle threat landscape. The analysis covers the balance of complexity, effectiveness, and profitability that has historically made vehicle attacks unprofitable, though shifting factors may increase future risks. https://lnkd.in/gxRBPnws ▪️ Another large TDS on compromised WordPress sites: Help TDS, primarily used to redirect users to fake tech support sites. https://lnkd.in/dSp65Dry ▪️ An intriguing attack on LLMs in email scanners: hidden prompts were found in a phishing campaign designed to overload language models, increasing chances of bypassing defenses. https://lnkd.in/d9M8P2e3 ▪️ Another analysis of cryptojacking campaigns targeting Redis servers, this time by TA Nastratus: https://lnkd.in/dNit-PaC ▪️ Numerous password managers are vulnerable to ClickJacking attacks, allowing extraction of auto-filled passwords. However, this requires the site to be vulnerable to XSS or DNS subdomain takeover. https://lnkd.in/gZ76ZncV ▪️ Positive news to end with: African police arrested over 1,200 perpetrators across 18 countries involved in BEC and ransomware attacks. Operation Serengeti 2.0 was supported by eight cybersecurity companies, including Kaspersky. https://lnkd.in/dv7M95Hj #APT #digest
35
-
SANS Institute
Leadership plays a critical role in ICS/OT cyber readiness. Scenario-driven training helps leaders and teams prepare for what really happens in an attack—from first signs to coordinated response. The ICS Cybersecurity Awareness Training includes: ✔️ Tabletop exercises designed for leadership ✔️ Real-world ICS/OT attack scenarios ✔️ Practical, role-based lessons for all levels See how small, focused modules can help leadership guide smarter, faster decisions when it counts. 🔗 https://lnkd.in/edAkwzX9 #ICSSecurity #OTSecurity #WorkforceSecurity
13
1 Comment -
BleepingComputer
Large Language Models (LLMs) can provide many benefits to security professionals by helping them analyze logs, detect phishing attacks, or offer threat intelligence. Learn from Wazuh about how to incorporate an LLM, like ChatGPT, into its open source security platform. #wazuh #xdr #siem #llm #sponsored ➡️Learn more: https://lnkd.in/ekyrp_pv
85
-
e-Learn Cyber Security
𝗧𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝘁𝗼 𝗟𝗲𝘃𝗲𝗹 𝗨𝗽 𝗬𝗼𝘂𝗿 𝗖𝗮𝗿𝗲𝗲𝗿 𝗶𝗻 𝟮𝟬𝟮𝟱 🔐 Whether you're defending systems (Blue Team), attacking them to make them stronger (Red Team), or leading strategy, there’s a certification path for you: 1️⃣ Blue Team (Defensive Security) – Security+, CySA+, GCFA, GCIH 2️⃣ Red Team (Offensive Security) – eJPT, OSCP, OSEP, OSEE 3️⃣ Leadership – CISM, CISA, CISSP, CGEIT Pro Tip: Start with foundational certs, then specialize in Red, Blue, or Leadership tracks based on your career goals. Which track are you on – Blue, Red, or Leadership? 🔔 Follow e-Learn Cyber Security for more cybersecurity tips! #CyberSecurity #Certifications #BlueTeam #RedTeam #InfoSec #CareerGrowth
750
23 Comments -
ExtraHop
Earlier this year, the Chinese cyberespionage group APT41 was caught using Impacket in attacks targeting African government IT services. This tool is also a favorite of infamous threat actors like BlackCat, making it a critical threat you need to watch closely. Our ExtraHop threat team breaks it down on the blog: https://xtra.li/41VJRl6
41
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
View verlaine j’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
LinkedIn is better on the app
Don’t have the app? Get it in the Microsoft Store.
Open the app