Mete Eminağaoğlu, PhD
|
|
- Judith Peters
- 8 years ago
- Views:
Transcription
1 Mete Eminağaoğlu, PhD Information security, IT governance, risk analysis, cryptography, machine learning, data mining, academic, information systems audit and control manager / consultant, project manager, general management 1. PERSONAL DETAILS 1.1. Personal Details Nationality Turkish Languages Turkish (native), English Date of Birth 1973 Driving licence Turkish B Military Service Fulfilled 1.2. Contact Information mete.eminagaoglu@yasar.edu.tr 1.3. Educational Background PhD., Trakya University, Computer Engineering M.Sc., Izmir Institute Of Technology, Computer Software Science B.Sc., Ege University, Computer Engineering Izmir Ozel Turk Koleji 1.4. Employment 2009-present Yasar University Full-time Lecturer Izmir University of Economics Part-time Lecturer Navigator Business & Information Management Services S.A., Assistant General Manager Arkas Holding S.A. Information Systems Security Manager Inform. Security Consultancy & Audit Dept Digiturk, Digital Platform Iletisim Hizmetleri A.S. T.C. Kara Kuvvetleri Komutanligi, Elazig 8. Kolordu Komutanligi, Elazig, TURKEY Security Specialist - IT Dept, Sys & Network Group Network Security & Information Systems Support Officer - OBIM. (military service as a second lieutenant) 11/ /1999 Izmir Institute of Technology 05/ /1996 Chronicle 02/ /1995 New Holland Trakmak A.S. Research Assistant -Computer Engineering Dept Software Engineer - Software R&D Department Software Engineer IT Department 1
2 1.5. Experience 1. June 2007 January 2009 NAVIGATOR Business & Information Management Services SA, Konak Izmir / TURKEY Management of all the executive tasks in Navigator which services to 3 rd parties; Information Security and IT Quality Assurance, Business Applications consultancy, Process and Performance Improvement consultancy, IT Recruitment consultancy Taking part or manageing in some of Navigator s Information Security & IT Governance audit & training projects including (some of the clients: Türk Ekonomi Bankası, Societe Generale Krediver, Türkiye Finans Katılım Bankası, Bristol-Myers Squibb, Bosphorus Shipping Agency, Brightwell BV); ISO27001 & CobiT training & consultancy Business Continuity Planning Internet & web application security Secure software development 2. May 2002 June 2007 Arkas Holding SA, Alsancak, Izmir, TURKEY Development, consultancy and management of Information Security within Arkas Group of Companies, including; Corporate Information Security Strategies Internal Security Audits, Education & training (Information Security Awareness), Education & training (Information Security Technical Concepts), Technical & administrative consultancy, Development & publishing of Information Security policies, procedures & technical standards, Computer forensics & forensic analysis, Contingency planning, emergency & incident response, Tiger Team - penetration tests & vulnerability assessments, Risk Analysis Planning & Implementation of Corporate IT Security Systems Infrastructure & related projects; Network Firewalls, Network & host based IDS / IPS, Content Filtering, Network & desktop Anti-Virus, Personal Firewalls, PKI ( & data encryption, digital signatures, SSL CA) Spyware & malware protection, Wireless network security, VPN gateways, Patch management. Professional Services to 3 rd Party Companies; Education (Information Security Awareness) Training (Information Security - Technical & Administrative) Information Security Audits Information Security Consultancy - Administration & Solution Provider Part-time Instructor at Izmir University of Economics, Department of Computer Programming; Computer Security Course 3. February 2001 May 2002 Digiturk, Digital Platform Iletisim Hizmetleri A.S Besiktas, Istanbul, TURKEY LAN, Intranet & Internet security management Checkpoint FW & Nokia IP650 administration ISS Real Secure IDS administration Test & management of several security-based systems (VPN devices, Radius RAS Servers, SSL accelerators, e-tokens, sniffers, security scanners) 2
3 Win 2K & Win NT4.0 local security management MS IIS 4.0 & 5.0 system / security management & maintenance MS Exchange 5.5, 2000 system / security management & maintenance System & network administration on Win2K, WinNT 4.0 Servers & MS AD architecture Design & programming of data security, system management, network security & networking applications using C, VB December 1999 October 2000 T.C. Kara Kuvvetleri Komutanligi, Elazig 8. Kolordu Komutanligi,Elazig, TURKEY LAN, Intranet & Internetworking security management Network administration, MS Exchange Server 5.5 management, IIS 4.0 management on Win NT Server 4.0 platform Web site design & development for the 8 th Army Corps Intranet Design & development of several Client / Server applications on the 8 th Army Corps Intranet using VBScript & JavaScript Design & development of several application programs using VB4.0,C 5. November 1996 June 1999 Izmir Institute of Technology Urla, Izmir, TURKEY Several research projects related with software security, information security, network & Internet security, database security, cryptanalysis, secure , symmetric data encryption Lecturer (C programming lab CENG -1.mid term students) Given OS security, software security, cryptology seminars Several optimization case-studies using Genetic Algorithms Operating system security benchmark tests and researches on Linux, AIX, Windows NT platforms Simulation applications using SimDL Web Page Design using Web Browse objects for Visual Basic 4.0, VBScript, HTML Design & development of Internet Client/Server applications with VBScript, Visual Basic 4.0 and Active X 6. May 1996 November 1996 CHRONICLE Cankaya, Izmir, TURKEY System Analysis & Project Design Application and on-demand programs with MS VB 3.0 & 4.0, MS Access 7.0 Design & development of Kronik Ofis - Accounting System Software Package Administration & application development on Microsoft SQL Server 6.0 & 6.5 platforms: Account Tracking System with Transact SQL on MS SQL Server Office Automation Programs with MS SQL Server 6.5 Database using Visual Basic SQL Server Library, ODBC API, RDO and DAO Integration, redesign and transportation of Kronik Ofis database from MS Access 7.0 to MS SQL Server 6.5 platform SQL Application Programs using Client-Server Architecture 7. February 1995 November 1995 New Holland Trakmak A.S. Izmir, TURKEY Unisys - BTOS System Administration Systems Analysis & Design Design & development of application programs with MS Access 2.0 Design & development of application programs using Cobol and VSAM file system on BTOS platform 1.6. Professional Certifications March 2006 October 2005 ISO 27001:2005 Lead Auditor BSI-Global, TURKEY CISA (Certified Information Systems Auditor) 3
4 Information Systems Audit & Control Association December 2004 CISSP (Certified Information Systems Security Professional) International Information Systems Security Certification Consortium July 2004 October 2003 BSI BS7799: Lead Auditor BSI-Global, TURKEY SACIS-P (Security, Audit & Control of Information Sys Professional) Smart Valley Mihrabat Cad. Yayabey Sok. No: 33/1 Kavacik, Istanbul, TURKEY 2. SCHOLARLY ACTIVITIES 2.1. PhD Thesis EMINAGAOGLU M, Using Machine Learning Techniques for Deriving a Conceptual Information Security Risk Assessment Model, Computer Engineering, Supervisor: Prof. Dr. Mr. Saban EREN, Trakya University, TURKEY - (dissertation phase) 2.2. MSc Thesis EMINAGAOGLU M, Genetic Algorithmic Approach to the Differential & Linear Cryptanalysis of Symmetric Cryptosystems, Computer Software Engineering, Supervisor: Assoc. Prof. Mr. Ahmet KOLTUKSUZ, Izmir Institute of Technology, TURKEY, BSc Thesis EMINAGAOGLU M, Transportation Simplex Method Modeling & Its Application in Office Automation Systems using a Relational Database, Ege Universtiy, TURKEY, Publications 1. Gökşen Y., Doğan O., Eminağaoğlu M., A Proposed Model for Candidate Selection Process in Political Parties Based On Fuzzy Logic Methodology, Mathematical and Computational Applications, ISSN: X, (2011) *(formally accepted to be published in forthcoming issue in 2011). (Indexed in SCI-expanded) 2. Eminağaoğlu M., Eren Ş., Implementation and Comparison of Machine Learning Classifiers for Information Security Risk Analysis of a Human Resources Department (extended version of prev. symp. work), International Journal of Computer Information Systems and Industrial Management, ISSN: , Vol.3, (2011). (Indexed in INSPEC) 3. Eminağaoğlu M., Uçar E., Eren Ş., The positive outcomes of information security awareness training in companies; a case study, Elsevier, Information Security Technical Journal, ISSN: , Vol. 14 No.4, pp: , (2009). (Indexed in SCOPUS) 4. Eminağaoğlu M., Gökşen Y. "Information Security; What is and What is Not, Information Security Problems in Turkey and Some Related Solutions", Dokuz Eylül University Social Sciences Institute Journal, ISSN: , Vol.11, No.4, pp: 1-15, (2009). (Indexed in DOAJ) 5. Eminağaoğlu M., Eren Ş., Uçar E., Using Binary Classifiers for Information Security Risk Analysis: A Case Study, ISCSE 2011 The 2nd International Symposium on Computing in Science & Engineering - Proceedings Abstracts, 1-4 June 2011, Kuşadası, TURKEY, pp: , (2011). 6. Gökşen Y., Eminağaoğlu M., Doğan O., Data Mining in Medical Records for The Enhancement of Strategic Decisions: A Case Study, EBEEC 2011 The 3rd International Conference The Economies of 4
5 Balkan and Eastern Europe Countries in The Changed World Book of Abstracts, 5-8 May 2011, Pitesti, ROMANIA, pp:52, (2011). 7. Eminağaoğlu M., Eren Ş., Implementation and Comparison of Machine Learning Classifiers for Information Security Risk Analysis of a Human Resources Department, Proceedings of the IEEE 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 8-10 October, Kraków, POLAND., pp: , (2010). 8. Eminağaoğlu M., Eren Ş., Improvement of Password Usage in Companies by means of Customized Technical Solutions and Employee Awareness; a Case Study, The 1st International Symposium on Computing in Science & Engineering, 3-5 June 2010, Kuşadası, TURKEY. 9. Eminağaoğlu M., Kılıçaslan Y., Uçar E., Güner E.S., Using machine learning techniques for information security risk analysis, Proceedings of the Human Factors in Information Security Conference, Elsevier, February 2010, London, U.K. 10. Eminağaoğlu M., Position paper: Analysis and assessment of information security risks using machine learning techniques, Proceedings of the 1st JRC-Turkey Workshop on ICT Security, JRC- IPSC EU Comission, 1-2 December 2009, Izmir, TURKEY. 11. Gökşen, Y., Eminağaoğlu M., Đş Süreçlerinin Etkinliğinde ve Đnsan Gücünün Planlamasında Bilişim Sistemlerinin Rolü, 2 nd ed. ISBN: Altın Nokta Basım Yayın Dağıtım, Konak, Đzmir, TURKEY (November, 2009) 12. Kurtel K., Eminağaoğlu M., Eren Ş., Modeling Business Process Exceptions in UML 2 Notation Proceedings of the XXIII. microcad International Scientific Conference, pp: 67-74, March 2009, University of Miskolc, HUNGARY. 13. Eminağaoğlu M., Using Genetic Algorithms for the Cryptanalysis of Simple Symmetric Block Cryptosystems ISCIS 99 International Symposium on Computer and Information Sciences, Ege University, Izmir, TURKEY (1999). 14. Koltuksuz A., Eminağaoğlu M., Gazioğlu V., Operating Systems Security, Proceedings, The International Symposium on New Achievements in Information and Military Technologies, T.S.K. - K.K.K., June 1997, Ankara, TURKEY) (1997) Other ALES (Academic proficiency exam of Y.Ö.K.) Score: ÜDS (English language proficiency exam of Y.Ö.K.) Score: TECHNICAL SKILLS 3.1. Programing Languages MS Visual C++, MS Visual C#, MS Visual Basic, MS SQL, VBScript, JavaScript, ANSI C, 8086 Assembly, Cobol, SimDL 3.2. Operating Systems Win. 2003, Win. XP, Vista, Win. 7.0, Win. 2K Server & Pro, Win. NT 4.0, Win. 95 / 98, Unix (IBM AIX, Linux RedHat), IBM i-series (OS/400), BTOS, MS DOS, Nokia IPSO Series 3.3. Hardware Platforms IBM (Workstation 6000 Series, AS/400), Unisys (CTOS), Intel PC, Nokia Appliance IP 530 & IP Database Microsoft SQL Server (2000, 7.0, 6.5, 6.0), MS Access (2.0 & 7.0) 3.5. Other Checkpoint (FW-4.1, NG, NGX), WEKA v.3.6.0, MS CA Server, MS Active Directory 2000 & 2003, MS EFS & IPSEC, Cisco IOS, Cisco AiroNet Series, PGP, Symantec (Enterprise A/V, Norton Internet Security), Computer Associates (Unicenter TNG, Innoculan), TrendMicro for Unix, Sybari for MS Exchange, ZoneAlarm Personal Firewall, Kerio Personal Firewall, ISS Proventia Desktop Security, RSA (SecurID, Ace Server), Squid, WebSense, SuperScout, Snort, ISS (Real Secure, Internet Scanner, DB Scanner, System Scanner), GFI LanGuard, Eeye Retina, Nmap, Nessus, SPI Dynamics WebInspect, SolarWinds, MS Office, MS Project, Microsoft Exchange (5.5 & 2000), Kerio Mail Server, MS IIS (4.0, 5.0, 6.0), SAP (R/3, SRM, SEM) 5
6 4. COURSES 4.1. Teaching Experience St. Pölten University of Applied Sciences, AUSTRIA, Graduate & Undergraduate Track 1: CISSP domains; IT Operations Security & Application Development Security Track 2: Information Security Risk Management & Software Risk Management (LLP Erasmus Teaching Staff Mobility Programme; 3 rd May th May 2010) Yasar University, Undergraduate STAT 380 ISO27001/27002 Information Security Management, Dept. of Statistics & Computer Engineering STAT 360 CobiT & ISO Audit of Information Systems, Dept. of Statistics & Computer Engineering Yasar University, Vocational School VCP2 029 IT Security, Dept. of Computer Programming VCP1 110 Introduction to Computer Programming with C++, Dept. of Computer Programming VCP1 210 Programming and Problem Solving, Dept. of Computer Programming UFIT 010 Information Technologies, Dept. of Computer Programming Izmir University of Economics, Undergraduate CS 304 Operating Systems Security, Department of Computer Engineering LOG 464 ISO27001/27002 Information Security Management, Department of Logistics Management Izmir University of Economics, Vocational School VCS272 Computer Security, Software & Programming Department Arkas Holding S.A. 1. Information security awareness training to all the employee in group of companies in Arkas Holding. 2. IT Security, Information Security training to IT staff and to some other departmant staff in several companies in Arkas Holding. 3. IT Security, Information Security, IT Auditor courses to several companies in public & private sectors in Turkey (as a freelance trainer). Navigator S.A. 1. IT Security, Information Security, IT Auditor, Business Continuity Planning & Management, IT Quality Assurance, IT Governance training courses (ref. stand: CobiT, ISACA, ISO27001, ISC 2 ) to several companies in public & private sectors in Turkey. 6
Mete Eminağaoğlu, PhD
Mete Eminağaoğlu, PhD Information security, IT governance, risk analysis, cryptography, machine learning, academic, information systems audit and control manager / consultant, project manager, general
More informationIzmir University of Economics. Navigator Business & Information Management Services S.A.
Dr. Mete Eminağaoğlu Information security management, machine learning, data mining, cryptography, IT governance, information security risk analysis, information systems audit and control, assistant professor,
More informationIf you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you
More informationMasters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish
SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: Availability: BT2691 UNIX Security Specialist British and Danish 13 years Masters Degree
More informationThe positive outcomes of information security awareness training in companies e A case study
information security technical report 14 (2009) 223e229 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm The positive outcomes of information security awareness training
More informationCAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
More informationCRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com
CRYPTOGEDDON: HEALTH CARE COMPROMISE Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com WHAT IS CRYPTOGEDDON? An online scavenger hunt using hacker tools Use infosec tools to solve
More informationIntro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Intro to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe QualysGuard ICT Security Management Integrated Suite of ICT Security
More informationResearch, recommend, and assist in implementing identity automation solution.
Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,
More informationCurriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name
Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:
More informationLecturer in the School of Computer Applications
Lecturer in the School of Computer Applications Job Description The School of Computer Applications is responsible for the disciplines of computing and quantitative methods within the University and has
More informationCurriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400)
Curriculum Vitae Personal information First name(s) / Surname(s) Address Flat No 503, S. S. Lootha Building, King Fizal Road Sharjah (United Arab Emirates) Telephone(s) + 971 6 5730339 Mobile + 971 50
More informationAdditional Offeror Qualifications: Not applicable.
Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationArcSight Supports a Wide Range of Security Relevant Products
ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the
More informationCiscoWorks SIMS(Netforensics)
Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture
More informationkerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies
KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP
More informationCourse Description for Operating Systems Hands-On (S&R Technology Lab)
Federal Reserve Board of Governors Course Description for Operating Systems Hands-On (S&R Technology Lab) Last Revised: November 2009 Supervision Technology Risks Educate, Analyze and Manage Federal Reserve
More informationDiversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23
642-812 642-812 Building Converged Cisco Multilayer Switched Networks BCMSN 642-845 642-845 Optimizing Converged Cisco Networks ONT 642-901 642-901 Building Scalable Cisco Internetworks BSCI Building COM+
More informationREQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM
REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...
More informationWebsense Certified Engineer Web Security Professional Examination Specification
Websense Certified Engineer Web Security Professional Examination Specification Introduction This is an exam specification for the Websense Certified Engineer - Web Security Professional examination. The
More informationAustralian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012
Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake
More informationDate of birth: March 29, 1981 Place of birth: Prishtina, Kosova Nationality: Albanian Marital status: Single Gender: Male Driving License: Category B
Muhamed Gërxhaliu Address: Imzot Nikë Prela E-31,H:2,Nr:13 Email: gerxhi@yahoo.com Tel: ++377 44 299 601 ++386 49 299 601 ++381 38 554 098 Personal Data Employment Record Date of birth: March 29, 1981
More informationeeye Digital Security Product Training
eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationInterdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro
Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that
More informationTABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationChapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
More informationRes. Asst. Mümine KAYA
Res. Asst. Mümine KAYA PERSONAL INFORMATION E-Mail : mkaya@adanabtu.edu.tr Phone : 0 322 455 00 00 Extension: 2042 Date of Birth : 08.11.1986 Place of Birth : Adana Nationality : T.C. ACADEMIC CAREER Adana
More informationJOB DESCRIPTION. *-- Assist with the administration of the Exchange Email Servers and Client Installations, including smart phones.
JOB DESCRIPTION Title: SENIOR I.T. TECHNICIAN Department: Administrative and Development Services Class Code: 3170 FLSA Status: Non-Exempt Effective Date: July 1, 1998 (Rev 12/2012) Grade Number: 20 GENERAL
More informationIntel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
More informationACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
More informationCitrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
More information+90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis
TOLGA SEÇİLMİŞ Phone: E-mail: Date of Birth: Web +90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis 2011- present SDL International Istanbul - General About: SDL is a
More informationComputer and Information Sciences
Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,
More informationMH NOROUZI RÉSUMÉ AND CV
MH NOROUZI RÉSUMÉ AND CV PERSONAL INFORMATION Last Name: NorouziMahalli First Name: MohammadHossein Date of Birth: 1988 Marital status: Single Birth Certificate ID: 9850 Languages Spoken: Native Language:
More informationMICROS Customer Support
MICROS Customer Support Remote Access Policy MICROSCustomerSupport RemoteSupportAccessPolicy Adescriptionofthepoliciesandproceduresrelatingtoremoteaccesstocustomersystemsby MICROSCustomerSupportpersonnel.ThisdocumentalsoincludesMICROS
More informationSSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
More informationAnnex 10 Standard Profile Specification and Request Form for Services
Annex 10 Standard Profile Specification and Request Form for Services London, Request number: Framework Contract No.: To: Company : Contact: Telephone: e-mail address: Description of the required service:
More informationSymantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
More informationSCOPE: Role Descriptions/Job Profiles
SCOPE: Role Descriptions/Job Profiles a) Computing Infrastructure 1. Exchange Administrator Assists with ensuring the availability of email servers and applications, configuring new implementations, and
More information13 Courses Quick Guide
13 Courses Quick Guide Microsoft Network Infrastructure 2008 Microsoft Certified Solution Associate (MCSA 2012) MCSE 2012 (Private Cloud) MCSE Server infrastructure 2012 Administering & Configuring Microsoft
More informationProven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia
Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab
More informationCourse overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
More informationCV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3.
CV: AGGELOS HANOU Software Developer (desktop & web app.) Personal information 2 Work experience 3 Education and training 3 Languages 3 Knowledge 4 Additional information 7 Driving license 7 Personal information
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
More informationCOURSE TITLE COURSE DESCRIPTION
COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.
More informationLAL PAUL. To become an expert in Network Administration especially in Unix flavours.
LAL PAUL OBJECTIVE To become an expert in Network Administration especially in Unix flavours. EXPERIENCE 1991 till date Cochin University of Science & Technology,Cochin, India System Administrator Presently
More informationNETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
More informationMore than 6 years of experience in IT Projects/Networking /Systems
Mohammed Riyas. V.P Email: riyas101@yahoo.com riyas101@live.com Abu Dhabi Mobile: 055 6693840 U.A.E Passport No: G9871465 Career Objective CURRICULUM VITAE Highly motivated IT Engineer with sound professional
More informationImplementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
More informationMicrosoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
More informationJuniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy
Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network
More informationGFI Product Comparison. GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1
GFI Product Comparison GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1 General features GFI LanGuard 2011 Retina 5.12.1 Scheduled scans Agent-less Agent-based Integration with Active Directory
More informationIntroduction p. 2. Introduction to Information Security p. 1. Introduction
Introduction p. xvii Introduction to Information Security p. 1 Introduction p. 2 What Is Information Security? p. 3 Critical Characteristics of Information p. 4 CNSS Security Model p. 5 Securing Components
More information60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
More informationCH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
More informationINFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
More informationIT Certification Programs Certification Programs Microsoft MCDST MCSA / MCSE MCAD / MCSD MCDBA Microsoft Office Specialist Cisco CCNA CCNP CCSP Citrix CCA CCEA CompTIA A+ Network+ Security+ IT Project+
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationBilgeAdam IT Services
IT SERVICES BilgeAdam IT Services BilgeAdam, founded in 1997, is the leading IT services company, headquartered in Istanbul-Turkey with an international span since 2007. IT services are: Consulting Training
More informationIT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
More informationTechnical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com
Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning
More informationModule 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
More informatione-code Academy Information Security Diploma Training Discerption
e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER
More informationEC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationAslı Seda (Kurt) Bilman
CURRICULUM VITAE Aslı Seda (Kurt) Bilman Office Address Department of Economics, Faculty of Economics and Administrative Sciences, Dokuz Eylül University, Dokuzçeşmeler Campus, 35390, Buca, Đzmir Turkey
More informationEnglish Requirement: You must be able to understand and be understood in English.
MICHAEL R. BLOOMBERG Mayor MARTHA K. HIRST Commissioner THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATIONS CENTER 18 WASHINGTON STREET NEW YORK, NY 10004 N O T I C E O F E
More informationConstructing a new language from a marxist perspective for social sciences in the 21 st century: a proposal
Constructing a new language from a marxist perspective for social sciences in the 21 st century: a proposal Fuat Ercan Güven Selçuk Senem Sönmez Selçuk Abstract As it has been widely argued, 20 th century
More information70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
More informationIndustrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
More informationSecurity + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
More informationPrincipal IT Consultant. Michael Buth IT Consultant Werner Str. 29 44388 Dortmund (Germany) +49 231 330 378 76. michael.buth@mbuth.
Michael Buth Principal IT Consultant Personal details Name, Surname Address Phone E-Mail Web Year of birth Education Foreign languages Buth, Michael Michael Buth IT Consultant Werner Str. 29 44388 Dortmund
More informationRam B. Basnet, Ph.D.
Ram B. Basnet, Ph.D. EDUCATION New Mexico Tech, Socorro, New Mexico Ph.D. in Computer Science, 5/2010 1/2012, Area of Specialization: Phishing Detection M.S. in Computer Science, 8/2005 12/2007 Colorado
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007
More informationA TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk
A TOP-RATED UNIVERSITY FOR EMPLOYABILITY MSc Information and Network Security T: 01224 262787 h.ahriz@rgu.ac.uk PROGRAMME OVERVIEW Most modern organisations face security risks that threaten their valuable
More informationSecurity Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those
More informationCertificate and Diplomas in ICT Professional Competence (4520-01/02/03/04)
Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04) Levels 1-4 unit handbook for centres www.cityandguilds.com July 2011 Version 1.2 (May 2012) About City & Guilds As the UK s leading
More informationAhmed Al-Haffar. Objectives. Experience
Ahmed Al-Haffar Kuwait - Salmiya (+965) 9724-9062 E-mail: ahmed.haffar@hotmail.com Objectives A Microsoft techie & B.E Computer Science Engineer, with MCSA, MCTS, MCITP, Network+ and CCNA with 6 years
More informationhttps://mcp.microsoft.com/authenticate/mcpcredentials.aspx
M r ic o o s f t e C t r if ic t a io n D I : 1 0 0 5 8 3 6 Seite 1 von 12 Microsoft Certified Professional Transcript Last Activity Recorded : March 15, 2011 UDO HEUSCHMANN ACTIVE MICROSOFT CERTIFICATIONS:
More informationMEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
More informationChristian Wangel. Experience
Christian Wangel Experience February 2014 Arrow ECS Sweden AB Stockholm Senior Sales Engineer Sales and Technical guidance to partners and colleagues in most IT fields focusing on security and data management.
More informationVirtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationRSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
More informationE-mail: st@alskens.dk Homepage: www.alskens.dk Mobil: +45 299 399 08 Linkedin : http://www.linkedin.com/in/sorenthomsen
-------------------------- Name: Søren Thomsen E-mail: st@alskens.dk Homepage: www.alskens.dk Mobil: +45 299 399 08 Linkedin : http://www.linkedin.com/in/sorenthomsen Title: IT Security Consultant, Architect,
More informationChristchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
More informationMEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
More informationSecurity+ Certification Course
Your Course Information Security+ Certification Course Swaledale 4 Coaley Lane Houghton-le-Spring Tyne & Wear DH4 4SQ The CompTIA Security+ Certification Course covers the Latest CompTIA Certification
More informationInformation Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
More informationDiploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK
Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with
More informationRESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.
RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,
More informationInformation Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationhttp://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus
Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education
More informationAcademic Curriculum Vitæ Yeşim Üçdoğruk Gürel
2014 Academic Curriculum Vitæ Yeşim Üçdoğruk Gürel Address: Dokuz Eylül University, Faculty of Business, Department of Economics Tınaztepe Campus, No: 233, 35160, Buca, İzmir, TURKEY E-mail: yesim.ucdogruk@deu.edu.tr
More informationIntroduction to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Introduction to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More information