Mete Eminağaoğlu, PhD

Size: px
Start display at page:

Download "Mete Eminağaoğlu, PhD"

Transcription

1 Mete Eminağaoğlu, PhD Information security, IT governance, risk analysis, cryptography, machine learning, data mining, academic, information systems audit and control manager / consultant, project manager, general management 1. PERSONAL DETAILS 1.1. Personal Details Nationality Turkish Languages Turkish (native), English Date of Birth 1973 Driving licence Turkish B Military Service Fulfilled 1.2. Contact Information mete.eminagaoglu@yasar.edu.tr 1.3. Educational Background PhD., Trakya University, Computer Engineering M.Sc., Izmir Institute Of Technology, Computer Software Science B.Sc., Ege University, Computer Engineering Izmir Ozel Turk Koleji 1.4. Employment 2009-present Yasar University Full-time Lecturer Izmir University of Economics Part-time Lecturer Navigator Business & Information Management Services S.A., Assistant General Manager Arkas Holding S.A. Information Systems Security Manager Inform. Security Consultancy & Audit Dept Digiturk, Digital Platform Iletisim Hizmetleri A.S. T.C. Kara Kuvvetleri Komutanligi, Elazig 8. Kolordu Komutanligi, Elazig, TURKEY Security Specialist - IT Dept, Sys & Network Group Network Security & Information Systems Support Officer - OBIM. (military service as a second lieutenant) 11/ /1999 Izmir Institute of Technology 05/ /1996 Chronicle 02/ /1995 New Holland Trakmak A.S. Research Assistant -Computer Engineering Dept Software Engineer - Software R&D Department Software Engineer IT Department 1

2 1.5. Experience 1. June 2007 January 2009 NAVIGATOR Business & Information Management Services SA, Konak Izmir / TURKEY Management of all the executive tasks in Navigator which services to 3 rd parties; Information Security and IT Quality Assurance, Business Applications consultancy, Process and Performance Improvement consultancy, IT Recruitment consultancy Taking part or manageing in some of Navigator s Information Security & IT Governance audit & training projects including (some of the clients: Türk Ekonomi Bankası, Societe Generale Krediver, Türkiye Finans Katılım Bankası, Bristol-Myers Squibb, Bosphorus Shipping Agency, Brightwell BV); ISO27001 & CobiT training & consultancy Business Continuity Planning Internet & web application security Secure software development 2. May 2002 June 2007 Arkas Holding SA, Alsancak, Izmir, TURKEY Development, consultancy and management of Information Security within Arkas Group of Companies, including; Corporate Information Security Strategies Internal Security Audits, Education & training (Information Security Awareness), Education & training (Information Security Technical Concepts), Technical & administrative consultancy, Development & publishing of Information Security policies, procedures & technical standards, Computer forensics & forensic analysis, Contingency planning, emergency & incident response, Tiger Team - penetration tests & vulnerability assessments, Risk Analysis Planning & Implementation of Corporate IT Security Systems Infrastructure & related projects; Network Firewalls, Network & host based IDS / IPS, Content Filtering, Network & desktop Anti-Virus, Personal Firewalls, PKI ( & data encryption, digital signatures, SSL CA) Spyware & malware protection, Wireless network security, VPN gateways, Patch management. Professional Services to 3 rd Party Companies; Education (Information Security Awareness) Training (Information Security - Technical & Administrative) Information Security Audits Information Security Consultancy - Administration & Solution Provider Part-time Instructor at Izmir University of Economics, Department of Computer Programming; Computer Security Course 3. February 2001 May 2002 Digiturk, Digital Platform Iletisim Hizmetleri A.S Besiktas, Istanbul, TURKEY LAN, Intranet & Internet security management Checkpoint FW & Nokia IP650 administration ISS Real Secure IDS administration Test & management of several security-based systems (VPN devices, Radius RAS Servers, SSL accelerators, e-tokens, sniffers, security scanners) 2

3 Win 2K & Win NT4.0 local security management MS IIS 4.0 & 5.0 system / security management & maintenance MS Exchange 5.5, 2000 system / security management & maintenance System & network administration on Win2K, WinNT 4.0 Servers & MS AD architecture Design & programming of data security, system management, network security & networking applications using C, VB December 1999 October 2000 T.C. Kara Kuvvetleri Komutanligi, Elazig 8. Kolordu Komutanligi,Elazig, TURKEY LAN, Intranet & Internetworking security management Network administration, MS Exchange Server 5.5 management, IIS 4.0 management on Win NT Server 4.0 platform Web site design & development for the 8 th Army Corps Intranet Design & development of several Client / Server applications on the 8 th Army Corps Intranet using VBScript & JavaScript Design & development of several application programs using VB4.0,C 5. November 1996 June 1999 Izmir Institute of Technology Urla, Izmir, TURKEY Several research projects related with software security, information security, network & Internet security, database security, cryptanalysis, secure , symmetric data encryption Lecturer (C programming lab CENG -1.mid term students) Given OS security, software security, cryptology seminars Several optimization case-studies using Genetic Algorithms Operating system security benchmark tests and researches on Linux, AIX, Windows NT platforms Simulation applications using SimDL Web Page Design using Web Browse objects for Visual Basic 4.0, VBScript, HTML Design & development of Internet Client/Server applications with VBScript, Visual Basic 4.0 and Active X 6. May 1996 November 1996 CHRONICLE Cankaya, Izmir, TURKEY System Analysis & Project Design Application and on-demand programs with MS VB 3.0 & 4.0, MS Access 7.0 Design & development of Kronik Ofis - Accounting System Software Package Administration & application development on Microsoft SQL Server 6.0 & 6.5 platforms: Account Tracking System with Transact SQL on MS SQL Server Office Automation Programs with MS SQL Server 6.5 Database using Visual Basic SQL Server Library, ODBC API, RDO and DAO Integration, redesign and transportation of Kronik Ofis database from MS Access 7.0 to MS SQL Server 6.5 platform SQL Application Programs using Client-Server Architecture 7. February 1995 November 1995 New Holland Trakmak A.S. Izmir, TURKEY Unisys - BTOS System Administration Systems Analysis & Design Design & development of application programs with MS Access 2.0 Design & development of application programs using Cobol and VSAM file system on BTOS platform 1.6. Professional Certifications March 2006 October 2005 ISO 27001:2005 Lead Auditor BSI-Global, TURKEY CISA (Certified Information Systems Auditor) 3

4 Information Systems Audit & Control Association December 2004 CISSP (Certified Information Systems Security Professional) International Information Systems Security Certification Consortium July 2004 October 2003 BSI BS7799: Lead Auditor BSI-Global, TURKEY SACIS-P (Security, Audit & Control of Information Sys Professional) Smart Valley Mihrabat Cad. Yayabey Sok. No: 33/1 Kavacik, Istanbul, TURKEY 2. SCHOLARLY ACTIVITIES 2.1. PhD Thesis EMINAGAOGLU M, Using Machine Learning Techniques for Deriving a Conceptual Information Security Risk Assessment Model, Computer Engineering, Supervisor: Prof. Dr. Mr. Saban EREN, Trakya University, TURKEY - (dissertation phase) 2.2. MSc Thesis EMINAGAOGLU M, Genetic Algorithmic Approach to the Differential & Linear Cryptanalysis of Symmetric Cryptosystems, Computer Software Engineering, Supervisor: Assoc. Prof. Mr. Ahmet KOLTUKSUZ, Izmir Institute of Technology, TURKEY, BSc Thesis EMINAGAOGLU M, Transportation Simplex Method Modeling & Its Application in Office Automation Systems using a Relational Database, Ege Universtiy, TURKEY, Publications 1. Gökşen Y., Doğan O., Eminağaoğlu M., A Proposed Model for Candidate Selection Process in Political Parties Based On Fuzzy Logic Methodology, Mathematical and Computational Applications, ISSN: X, (2011) *(formally accepted to be published in forthcoming issue in 2011). (Indexed in SCI-expanded) 2. Eminağaoğlu M., Eren Ş., Implementation and Comparison of Machine Learning Classifiers for Information Security Risk Analysis of a Human Resources Department (extended version of prev. symp. work), International Journal of Computer Information Systems and Industrial Management, ISSN: , Vol.3, (2011). (Indexed in INSPEC) 3. Eminağaoğlu M., Uçar E., Eren Ş., The positive outcomes of information security awareness training in companies; a case study, Elsevier, Information Security Technical Journal, ISSN: , Vol. 14 No.4, pp: , (2009). (Indexed in SCOPUS) 4. Eminağaoğlu M., Gökşen Y. "Information Security; What is and What is Not, Information Security Problems in Turkey and Some Related Solutions", Dokuz Eylül University Social Sciences Institute Journal, ISSN: , Vol.11, No.4, pp: 1-15, (2009). (Indexed in DOAJ) 5. Eminağaoğlu M., Eren Ş., Uçar E., Using Binary Classifiers for Information Security Risk Analysis: A Case Study, ISCSE 2011 The 2nd International Symposium on Computing in Science & Engineering - Proceedings Abstracts, 1-4 June 2011, Kuşadası, TURKEY, pp: , (2011). 6. Gökşen Y., Eminağaoğlu M., Doğan O., Data Mining in Medical Records for The Enhancement of Strategic Decisions: A Case Study, EBEEC 2011 The 3rd International Conference The Economies of 4

5 Balkan and Eastern Europe Countries in The Changed World Book of Abstracts, 5-8 May 2011, Pitesti, ROMANIA, pp:52, (2011). 7. Eminağaoğlu M., Eren Ş., Implementation and Comparison of Machine Learning Classifiers for Information Security Risk Analysis of a Human Resources Department, Proceedings of the IEEE 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 8-10 October, Kraków, POLAND., pp: , (2010). 8. Eminağaoğlu M., Eren Ş., Improvement of Password Usage in Companies by means of Customized Technical Solutions and Employee Awareness; a Case Study, The 1st International Symposium on Computing in Science & Engineering, 3-5 June 2010, Kuşadası, TURKEY. 9. Eminağaoğlu M., Kılıçaslan Y., Uçar E., Güner E.S., Using machine learning techniques for information security risk analysis, Proceedings of the Human Factors in Information Security Conference, Elsevier, February 2010, London, U.K. 10. Eminağaoğlu M., Position paper: Analysis and assessment of information security risks using machine learning techniques, Proceedings of the 1st JRC-Turkey Workshop on ICT Security, JRC- IPSC EU Comission, 1-2 December 2009, Izmir, TURKEY. 11. Gökşen, Y., Eminağaoğlu M., Đş Süreçlerinin Etkinliğinde ve Đnsan Gücünün Planlamasında Bilişim Sistemlerinin Rolü, 2 nd ed. ISBN: Altın Nokta Basım Yayın Dağıtım, Konak, Đzmir, TURKEY (November, 2009) 12. Kurtel K., Eminağaoğlu M., Eren Ş., Modeling Business Process Exceptions in UML 2 Notation Proceedings of the XXIII. microcad International Scientific Conference, pp: 67-74, March 2009, University of Miskolc, HUNGARY. 13. Eminağaoğlu M., Using Genetic Algorithms for the Cryptanalysis of Simple Symmetric Block Cryptosystems ISCIS 99 International Symposium on Computer and Information Sciences, Ege University, Izmir, TURKEY (1999). 14. Koltuksuz A., Eminağaoğlu M., Gazioğlu V., Operating Systems Security, Proceedings, The International Symposium on New Achievements in Information and Military Technologies, T.S.K. - K.K.K., June 1997, Ankara, TURKEY) (1997) Other ALES (Academic proficiency exam of Y.Ö.K.) Score: ÜDS (English language proficiency exam of Y.Ö.K.) Score: TECHNICAL SKILLS 3.1. Programing Languages MS Visual C++, MS Visual C#, MS Visual Basic, MS SQL, VBScript, JavaScript, ANSI C, 8086 Assembly, Cobol, SimDL 3.2. Operating Systems Win. 2003, Win. XP, Vista, Win. 7.0, Win. 2K Server & Pro, Win. NT 4.0, Win. 95 / 98, Unix (IBM AIX, Linux RedHat), IBM i-series (OS/400), BTOS, MS DOS, Nokia IPSO Series 3.3. Hardware Platforms IBM (Workstation 6000 Series, AS/400), Unisys (CTOS), Intel PC, Nokia Appliance IP 530 & IP Database Microsoft SQL Server (2000, 7.0, 6.5, 6.0), MS Access (2.0 & 7.0) 3.5. Other Checkpoint (FW-4.1, NG, NGX), WEKA v.3.6.0, MS CA Server, MS Active Directory 2000 & 2003, MS EFS & IPSEC, Cisco IOS, Cisco AiroNet Series, PGP, Symantec (Enterprise A/V, Norton Internet Security), Computer Associates (Unicenter TNG, Innoculan), TrendMicro for Unix, Sybari for MS Exchange, ZoneAlarm Personal Firewall, Kerio Personal Firewall, ISS Proventia Desktop Security, RSA (SecurID, Ace Server), Squid, WebSense, SuperScout, Snort, ISS (Real Secure, Internet Scanner, DB Scanner, System Scanner), GFI LanGuard, Eeye Retina, Nmap, Nessus, SPI Dynamics WebInspect, SolarWinds, MS Office, MS Project, Microsoft Exchange (5.5 & 2000), Kerio Mail Server, MS IIS (4.0, 5.0, 6.0), SAP (R/3, SRM, SEM) 5

6 4. COURSES 4.1. Teaching Experience St. Pölten University of Applied Sciences, AUSTRIA, Graduate & Undergraduate Track 1: CISSP domains; IT Operations Security & Application Development Security Track 2: Information Security Risk Management & Software Risk Management (LLP Erasmus Teaching Staff Mobility Programme; 3 rd May th May 2010) Yasar University, Undergraduate STAT 380 ISO27001/27002 Information Security Management, Dept. of Statistics & Computer Engineering STAT 360 CobiT & ISO Audit of Information Systems, Dept. of Statistics & Computer Engineering Yasar University, Vocational School VCP2 029 IT Security, Dept. of Computer Programming VCP1 110 Introduction to Computer Programming with C++, Dept. of Computer Programming VCP1 210 Programming and Problem Solving, Dept. of Computer Programming UFIT 010 Information Technologies, Dept. of Computer Programming Izmir University of Economics, Undergraduate CS 304 Operating Systems Security, Department of Computer Engineering LOG 464 ISO27001/27002 Information Security Management, Department of Logistics Management Izmir University of Economics, Vocational School VCS272 Computer Security, Software & Programming Department Arkas Holding S.A. 1. Information security awareness training to all the employee in group of companies in Arkas Holding. 2. IT Security, Information Security training to IT staff and to some other departmant staff in several companies in Arkas Holding. 3. IT Security, Information Security, IT Auditor courses to several companies in public & private sectors in Turkey (as a freelance trainer). Navigator S.A. 1. IT Security, Information Security, IT Auditor, Business Continuity Planning & Management, IT Quality Assurance, IT Governance training courses (ref. stand: CobiT, ISACA, ISO27001, ISC 2 ) to several companies in public & private sectors in Turkey. 6

Mete Eminağaoğlu, PhD

Mete Eminağaoğlu, PhD Mete Eminağaoğlu, PhD Information security, IT governance, risk analysis, cryptography, machine learning, academic, information systems audit and control manager / consultant, project manager, general

More information

Izmir University of Economics. Navigator Business & Information Management Services S.A.

Izmir University of Economics. Navigator Business & Information Management Services S.A. Dr. Mete Eminağaoğlu Information security management, machine learning, data mining, cryptography, IT governance, information security risk analysis, information systems audit and control, assistant professor,

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: Availability: BT2691 UNIX Security Specialist British and Danish 13 years Masters Degree

More information

The positive outcomes of information security awareness training in companies e A case study

The positive outcomes of information security awareness training in companies e A case study information security technical report 14 (2009) 223e229 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm The positive outcomes of information security awareness training

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com CRYPTOGEDDON: HEALTH CARE COMPROMISE Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com WHAT IS CRYPTOGEDDON? An online scavenger hunt using hacker tools Use infosec tools to solve

More information

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Intro to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe QualysGuard ICT Security Management Integrated Suite of ICT Security

More information

Research, recommend, and assist in implementing identity automation solution.

Research, recommend, and assist in implementing identity automation solution. Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,

More information

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:

More information

Lecturer in the School of Computer Applications

Lecturer in the School of Computer Applications Lecturer in the School of Computer Applications Job Description The School of Computer Applications is responsible for the disciplines of computing and quantitative methods within the University and has

More information

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400)

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400) Curriculum Vitae Personal information First name(s) / Surname(s) Address Flat No 503, S. S. Lootha Building, King Fizal Road Sharjah (United Arab Emirates) Telephone(s) + 971 6 5730339 Mobile + 971 50

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

Course Description for Operating Systems Hands-On (S&R Technology Lab)

Course Description for Operating Systems Hands-On (S&R Technology Lab) Federal Reserve Board of Governors Course Description for Operating Systems Hands-On (S&R Technology Lab) Last Revised: November 2009 Supervision Technology Risks Educate, Analyze and Manage Federal Reserve

More information

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23 642-812 642-812 Building Converged Cisco Multilayer Switched Networks BCMSN 642-845 642-845 Optimizing Converged Cisco Networks ONT 642-901 642-901 Building Scalable Cisco Internetworks BSCI Building COM+

More information

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...

More information

Websense Certified Engineer Web Security Professional Examination Specification

Websense Certified Engineer Web Security Professional Examination Specification Websense Certified Engineer Web Security Professional Examination Specification Introduction This is an exam specification for the Websense Certified Engineer - Web Security Professional examination. The

More information

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake

More information

Date of birth: March 29, 1981 Place of birth: Prishtina, Kosova Nationality: Albanian Marital status: Single Gender: Male Driving License: Category B

Date of birth: March 29, 1981 Place of birth: Prishtina, Kosova Nationality: Albanian Marital status: Single Gender: Male Driving License: Category B Muhamed Gërxhaliu Address: Imzot Nikë Prela E-31,H:2,Nr:13 Email: gerxhi@yahoo.com Tel: ++377 44 299 601 ++386 49 299 601 ++381 38 554 098 Personal Data Employment Record Date of birth: March 29, 1981

More information

eeye Digital Security Product Training

eeye Digital Security Product Training eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Res. Asst. Mümine KAYA

Res. Asst. Mümine KAYA Res. Asst. Mümine KAYA PERSONAL INFORMATION E-Mail : mkaya@adanabtu.edu.tr Phone : 0 322 455 00 00 Extension: 2042 Date of Birth : 08.11.1986 Place of Birth : Adana Nationality : T.C. ACADEMIC CAREER Adana

More information

JOB DESCRIPTION. *-- Assist with the administration of the Exchange Email Servers and Client Installations, including smart phones.

JOB DESCRIPTION. *-- Assist with the administration of the Exchange Email Servers and Client Installations, including smart phones. JOB DESCRIPTION Title: SENIOR I.T. TECHNICIAN Department: Administrative and Development Services Class Code: 3170 FLSA Status: Non-Exempt Effective Date: July 1, 1998 (Rev 12/2012) Grade Number: 20 GENERAL

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011 ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

+90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis

+90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis TOLGA SEÇİLMİŞ Phone: E-mail: Date of Birth: Web +90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis 2011- present SDL International Istanbul - General About: SDL is a

More information

Computer and Information Sciences

Computer and Information Sciences Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,

More information

MH NOROUZI RÉSUMÉ AND CV

MH NOROUZI RÉSUMÉ AND CV MH NOROUZI RÉSUMÉ AND CV PERSONAL INFORMATION Last Name: NorouziMahalli First Name: MohammadHossein Date of Birth: 1988 Marital status: Single Birth Certificate ID: 9850 Languages Spoken: Native Language:

More information

MICROS Customer Support

MICROS Customer Support MICROS Customer Support Remote Access Policy MICROSCustomerSupport RemoteSupportAccessPolicy Adescriptionofthepoliciesandproceduresrelatingtoremoteaccesstocustomersystemsby MICROSCustomerSupportpersonnel.ThisdocumentalsoincludesMICROS

More information

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc. SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification

More information

Annex 10 Standard Profile Specification and Request Form for Services

Annex 10 Standard Profile Specification and Request Form for Services Annex 10 Standard Profile Specification and Request Form for Services London, Request number: Framework Contract No.: To: Company : Contact: Telephone: e-mail address: Description of the required service:

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

SCOPE: Role Descriptions/Job Profiles

SCOPE: Role Descriptions/Job Profiles SCOPE: Role Descriptions/Job Profiles a) Computing Infrastructure 1. Exchange Administrator Assists with ensuring the availability of email servers and applications, configuring new implementations, and

More information

13 Courses Quick Guide

13 Courses Quick Guide 13 Courses Quick Guide Microsoft Network Infrastructure 2008 Microsoft Certified Solution Associate (MCSA 2012) MCSE 2012 (Private Cloud) MCSE Server infrastructure 2012 Administering & Configuring Microsoft

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

CV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3.

CV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3. CV: AGGELOS HANOU Software Developer (desktop & web app.) Personal information 2 Work experience 3 Education and training 3 Languages 3 Knowledge 4 Additional information 7 Driving license 7 Personal information

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

LAL PAUL. To become an expert in Network Administration especially in Unix flavours.

LAL PAUL. To become an expert in Network Administration especially in Unix flavours. LAL PAUL OBJECTIVE To become an expert in Network Administration especially in Unix flavours. EXPERIENCE 1991 till date Cochin University of Science & Technology,Cochin, India System Administrator Presently

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

More than 6 years of experience in IT Projects/Networking /Systems

More than 6 years of experience in IT Projects/Networking /Systems Mohammed Riyas. V.P Email: riyas101@yahoo.com riyas101@live.com Abu Dhabi Mobile: 055 6693840 U.A.E Passport No: G9871465 Career Objective CURRICULUM VITAE Highly motivated IT Engineer with sound professional

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network

More information

GFI Product Comparison. GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1

GFI Product Comparison. GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1 GFI Product Comparison GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1 General features GFI LanGuard 2011 Retina 5.12.1 Scheduled scans Agent-less Agent-based Integration with Active Directory

More information

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Introduction p. 2. Introduction to Information Security p. 1. Introduction Introduction p. xvii Introduction to Information Security p. 1 Introduction p. 2 What Is Information Security? p. 3 Critical Characteristics of Information p. 4 CNSS Security Model p. 5 Securing Components

More information

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li 60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

IT Certification Programs Certification Programs Microsoft MCDST MCSA / MCSE MCAD / MCSD MCDBA Microsoft Office Specialist Cisco CCNA CCNP CCSP Citrix CCA CCEA CompTIA A+ Network+ Security+ IT Project+

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

BilgeAdam IT Services

BilgeAdam IT Services IT SERVICES BilgeAdam IT Services BilgeAdam, founded in 1997, is the leading IT services company, headquartered in Istanbul-Turkey with an international span since 2007. IT services are: Consulting Training

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

Aslı Seda (Kurt) Bilman

Aslı Seda (Kurt) Bilman CURRICULUM VITAE Aslı Seda (Kurt) Bilman Office Address Department of Economics, Faculty of Economics and Administrative Sciences, Dokuz Eylül University, Dokuzçeşmeler Campus, 35390, Buca, Đzmir Turkey

More information

English Requirement: You must be able to understand and be understood in English.

English Requirement: You must be able to understand and be understood in English. MICHAEL R. BLOOMBERG Mayor MARTHA K. HIRST Commissioner THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATIONS CENTER 18 WASHINGTON STREET NEW YORK, NY 10004 N O T I C E O F E

More information

Constructing a new language from a marxist perspective for social sciences in the 21 st century: a proposal

Constructing a new language from a marxist perspective for social sciences in the 21 st century: a proposal Constructing a new language from a marxist perspective for social sciences in the 21 st century: a proposal Fuat Ercan Güven Selçuk Senem Sönmez Selçuk Abstract As it has been widely argued, 20 th century

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Principal IT Consultant. Michael Buth IT Consultant Werner Str. 29 44388 Dortmund (Germany) +49 231 330 378 76. michael.buth@mbuth.

Principal IT Consultant. Michael Buth IT Consultant Werner Str. 29 44388 Dortmund (Germany) +49 231 330 378 76. michael.buth@mbuth. Michael Buth Principal IT Consultant Personal details Name, Surname Address Phone E-Mail Web Year of birth Education Foreign languages Buth, Michael Michael Buth IT Consultant Werner Str. 29 44388 Dortmund

More information

Ram B. Basnet, Ph.D.

Ram B. Basnet, Ph.D. Ram B. Basnet, Ph.D. EDUCATION New Mexico Tech, Socorro, New Mexico Ph.D. in Computer Science, 5/2010 1/2012, Area of Specialization: Phishing Detection M.S. in Computer Science, 8/2005 12/2007 Colorado

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007

More information

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk A TOP-RATED UNIVERSITY FOR EMPLOYABILITY MSc Information and Network Security T: 01224 262787 h.ahriz@rgu.ac.uk PROGRAMME OVERVIEW Most modern organisations face security risks that threaten their valuable

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04)

Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04) Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04) Levels 1-4 unit handbook for centres www.cityandguilds.com July 2011 Version 1.2 (May 2012) About City & Guilds As the UK s leading

More information

Ahmed Al-Haffar. Objectives. Experience

Ahmed Al-Haffar. Objectives. Experience Ahmed Al-Haffar Kuwait - Salmiya (+965) 9724-9062 E-mail: ahmed.haffar@hotmail.com Objectives A Microsoft techie & B.E Computer Science Engineer, with MCSA, MCTS, MCITP, Network+ and CCNA with 6 years

More information

https://mcp.microsoft.com/authenticate/mcpcredentials.aspx

https://mcp.microsoft.com/authenticate/mcpcredentials.aspx M r ic o o s f t e C t r if ic t a io n D I : 1 0 0 5 8 3 6 Seite 1 von 12 Microsoft Certified Professional Transcript Last Activity Recorded : March 15, 2011 UDO HEUSCHMANN ACTIVE MICROSOFT CERTIFICATIONS:

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

Christian Wangel. Experience

Christian Wangel. Experience Christian Wangel Experience February 2014 Arrow ECS Sweden AB Stockholm Senior Sales Engineer Sales and Technical guidance to partners and colleagues in most IT fields focusing on security and data management.

More information

Virtualization Journey Stages

Virtualization Journey Stages Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

E-mail: st@alskens.dk Homepage: www.alskens.dk Mobil: +45 299 399 08 Linkedin : http://www.linkedin.com/in/sorenthomsen

E-mail: st@alskens.dk Homepage: www.alskens.dk Mobil: +45 299 399 08 Linkedin : http://www.linkedin.com/in/sorenthomsen -------------------------- Name: Søren Thomsen E-mail: st@alskens.dk Homepage: www.alskens.dk Mobil: +45 299 399 08 Linkedin : http://www.linkedin.com/in/sorenthomsen Title: IT Security Consultant, Architect,

More information

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Security+ Certification Course

Security+ Certification Course Your Course Information Security+ Certification Course Swaledale 4 Coaley Lane Houghton-le-Spring Tyne & Wear DH4 4SQ The CompTIA Security+ Certification Course covers the Latest CompTIA Certification

More information

Information Security Attack Tree Modeling for Enhancing Student Learning

Information Security Attack Tree Modeling for Enhancing Student Learning Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department

More information

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with

More information

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP. RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education

More information

Academic Curriculum Vitæ Yeşim Üçdoğruk Gürel

Academic Curriculum Vitæ Yeşim Üçdoğruk Gürel 2014 Academic Curriculum Vitæ Yeşim Üçdoğruk Gürel Address: Dokuz Eylül University, Faculty of Business, Department of Economics Tınaztepe Campus, No: 233, 35160, Buca, İzmir, TURKEY E-mail: yesim.ucdogruk@deu.edu.tr

More information

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Introduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Introduction to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information