Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS

Size: px
Start display at page:

Download "Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS"

Transcription

1 Reynaldo Anzaldua EDUCATION University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS University of Texas Pan American, Edinburg, TX MBA/MIS GPA: North Central University Prescott Valley, AZ PhD Information Security GPA 3.72 ABD: Expected graduation date of: 2014 WORK EXPERIENCE University of Texas at Brownsville Brownsville, TX Lecturer 09/ Present My primary responsibilities entail mentoring and guiding students within the MIS core area of the Business School. I also instruct on the business management courses as needed. My course load consists of both in person classes and on-line classes as required by the University. Within the MIS domain, I am currently searching and contacting research funding entities to begin the process of creating an information security research center located within the School of Business. The purpose of this endeavor is to establish the Brownsville branch of the University of Texas system as a place where students can do research into information security topics with the twin goals of either pursuing a higher degree or working in the field of information security at advanced levels. CSC/DC3/United States Air Force Baltimore, MD/Washington D.C. Technical Trainer 06/ /2013 Training members of the Department of Defense in computer network intrusions, computer forensics, counter intelligence computer techniques, and log analysis. Part of the team working on course content, training manual creation, and online course design for the online direction that the schoolhouse is taking. Team lead on new on-line course that includes content development, course design, and delivery as well as team member on other on-line course creation initiatives. Using project management skills and guidance from management, the initial project was successfully completed and the other initiatives are creating high quality course material. Due to this quality of work, also part of the team that increased the government award satisfaction percentage to 95% in the span of less than a year. As an on-line instructor, I am tasked with providing feedback, grading, and mentoring students on a regular basis. Student survey data indicates this approach is popular and appreciated by our student

2 body. Additionally, our student body consists of worldwide (all 24 time zones) students with varying degrees of ability that makes the on-line mentoring process a challenge that we successfully meet. I am well versed and familiar with Microsoft Windows, Linux, AS/400, and Apple platforms as well as Plateau, LifeRay, and various LMS applications. Specific tools used and familiar with are: Wireshark, Snort, EnCase, FTK, Backtrack 5 v3 suite, Nmap, Nessus, Metasploit framework, and various other security/forensic tools. United States Navy Reserve Washington, D.C. Commissioned Officer (LTJG) 10/2009 Present Information Warfare Officer working at NIOC Maryland/National Security Administration Learning/Working cyber warfare, electronic warfare, signals intelligence, space warfare, military deception, and a wide range of Information Dominance categories. Learning the various security protocols within the US Navy and DoD such as: DoD Instruction (Information Assurance). South Texas College McAllen, TX Assistant Professor As the only Assistant Professor in the department, I was tasked with creating and teaching all the computer security courses for the College. In addition to handling all the computer security classes, I also taught all the CISCO networking classes, network troubleshooting classes, operating system classes, and application classes. As part of my professor duties, I organized symposiums and events around computer forensic topics and computer security topics in addition to helping local governmental organizations with computer forensic and network security issues. The following is a list of classes taught: Introduction to Forensics Fundamentals of Networking (CISCO I) Networking with TCP/IP (CISCO II) Network Troubleshooting and Support Network Security Administering Windows/Linux Servers Fundamentals of Information Security Information Technology Security French Ellison Truck Center Pharr, TX IT Director Managed the entire IT infrastructure for an 80 million dollar per year multi-location trucking business. Managed all aspects of IT project management, telecommunications, networking, and maintenance. The infrastructure managed consisted of international operations that entailed travel outside the USA as well as direct interaction with technicians from international organizations. Managed large IT projects such as construction of a new facility where all aspects of the IT infrastructure from desktop computers to frame relay were planned and tracked via project planning tools such as Microsoft Project.

3 Managed an international IT project that connected a facility outside the USA to the corporate headquarters via frame relay and satellite networks. Managed all aspects of this project with various tools, milestones, and intense collaboration with foreign authorities. Managed the relational database infrastructure based on an AS/400 platform with multiple clients ranging from Windows desktop emulators to dedicated dumb terminals. Computer Security International Weslaco, TX Owner Owned and operated a consulting firm tasked with doing computer security audits involving penetration testing and physical security assessments. Conducted audits for private entities, local government entities, and corporate organizations. Created teams as needed that included experts in locksmithing, security alarm systems, computer network security specialists, and host based security experts. Anzaldua Consulting Weslaco, TX Owner/Operator Owned and operated a computer-consulting firm tasked with projects ranging from building custom computers to networking small business operations. The operation started off as a store front catering to the University students located across the street and grew into a consulting business servicing local hospitals and private colleges. At the height of the operation, I was in charge of five employees and various sub-contractors. The range of technical operations was component level hardware to wireless wide area networks using microwave technology. The operational component of the business spanned internationally to include northern Mexico including the large industrial city of Monterrey, Mexico. Electronic Data Systems Reynosa, Mexico Systems Analyst Hired as a system analyst for several General Motors factories supported by Electronic Data Services handling all LAN/WAN and telecommunications links to the United States. Collateral duties included translating for upper management, local procurement manager, and cultural awareness manager for new employees from the United States.

4 Security Clearances, Training, Certifications, Licenses, and Publications Security Clearances Upon Request 2013 Undercover Online Techniques 2012 Windows Forensic Investigations 2012 Advanced Log Analysis 2012 Network Exploitation Techniques 2012 AuthorIt Training 2012 Certified Technical Trainer + (CTT +) 2012 DCITA ISD/LMS Training 2012 Licensed Private Pilot 2012 Mobile Forensic Workshop 2010 Licensed Texas Private Investigator (Licensed under A15290) 2009 CHFI (Certified Hacking Forensic Investigator) 2008 AccessData FTK 2 Basic Boot Camp 2008 EnCase Internet/ Investigations 2006 CISCO Certified Instructor 2005 EnCase NTFS Artifacts and File Systems 2005 EnCase Advanced Computer Forensics 2004 EnCase Intermediate Analysis and Reporting 2003 CISSP (Certified Information Systems Security Professional)(Expired) 2003 EnCE (EnCase Certified Examiner) 2003 IBM I-Series / AS400 Certified 2002 EnCase Introduction to Computer Forensics 2002

5 Security Clearances, Training, Certifications, Licenses, and Publications (cont'd) Computer Forensics for Dummies, Co-Author, Wiley Computer Forensics: Principles and Practices, Co-Author, Prentice Hall Protocols/Services: Active Directory, TCP/IP, UDP, and routed/routing protocols Software: EnCase, FTK, Helix, Knoppix, Sleuthkit, Backtrack 3, Paraben, Cellebrite, Nmap, Snort, Wireshark, Nessus, Linux, Unix, Apple, and Windows file systems. Programming Languages: C, C++, COBOL, RPG, and BASIC. PUBLICATIONS and RADIO SHOW Weekly Radio Show Segment on KURV Tech Corner 2008 The Computer Guy, Weekly columnist for Freedom Newspapers, Computer Forensics: Principles and Practices, Co-Author, Prentice Hall Computer Forensics for Dummies, Co-Author, Wiley COMMUNITY INVOLVEMENT Guest Speaker Rotary Clubs Topics include identity theft, computer forensics, and computer security. Guest Speaker Lions Clubs Topics include identity theft, computer forensics, and computer security. Seminar Speaker Various audiences from IT directors to Law Enforcement Sample List below: South Texas College Symposium 12/2007 Lions Club Mixer Seminar 5/2006 Rotary Club Mixer Seminar 7/2006 National Hispanic Professional Organization Identity Theft Seminar 9/2005 National Hispanic Professional Organization Networking Security Seminar 6/2005 South Texas College Forensic Seminar 11/2004 Topics include computer forensics and computer security LANGUAGES Spanish speak fluently and read/write with high proficiency Miscellaneous Technical (paid and non paid) consultant for local and Federal law enforcement agencies on matters relating to retrieving data from all digital devices.

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1

Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1 Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1 Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 2 of 5 Jason B. Lyons 13829 233 rd CT NE Woodinville WA, 98077 SUMMARY

More information

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth

More information

Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com

Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

MCSA Security + Certification Program

MCSA Security + Certification Program MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.

More information

Doctor of Philosophy in Business Administration - Computer & Information Security, 2014 North Central University, Prescott Valley, Arizona

Doctor of Philosophy in Business Administration - Computer & Information Security, 2014 North Central University, Prescott Valley, Arizona Dr. Scott P. Paetzold University of Wisconsin Stout College of Science, Technology, Engineering and Math Menomonie, Wisconsin 54751 715-232-5498 paetzolds@uwstout.edu EDUCATION: Doctor of Philosophy in

More information

CHFI v8(computer Hacking Forensics Investigator)

CHFI v8(computer Hacking Forensics Investigator) CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal

More information

ADDENDUM #1 Courses and Pricing

ADDENDUM #1 Courses and Pricing TECHNICAL SUPPORT SPECIALIST TRAINING PROGRAM A+ Certification hardware and OS A+ Certification hardware A+ Certification OS Network + Certification Security + Microsoft Certified Desktop Technician (MCDT)

More information

Information Technology Resource Services

Information Technology Resource Services Information Technology Resource Services RTI specializes in resource solutions ranging from Help Desk, Workstation, Network Infrastructure and Telecommunications services to Software and Web Site Developers.

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above. ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that

More information

How to profit from the growing shortage of IT professionals jobs

How to profit from the growing shortage of IT professionals jobs How to profit from the growing shortage of IT professionals jobs It s no secret that IT is one of the fastest growing fields in the U.S. What s less well known is that there are so many career opportunities

More information

n2grate Open Positions March 2015

n2grate Open Positions March 2015 n2grate Open Positions March 2015 Table of Contents 1. CMS Centers for Medicare & Medicaid Services Roles... 1 1.1 Role 012 Computer System Analysts II...1 1.1.1 Location: Dallas, Texas... 1 1.3 Role 013

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

Access FedVTE online at: fedvte.usalearning.gov

Access FedVTE online at: fedvte.usalearning.gov FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

Exhibit 16.1-4a Non Applications Services Labor Categories

Exhibit 16.1-4a Non Applications Services Labor Categories Exhibit 16.1-4a Non Applications Services Labor Categories PAGE 1 1. Infrastructure System Administrator Description: The Infrastructure Systems Administrator s role is to: (1) deliver support to internal

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)

Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications : CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive

More information

min exp years min educ

min exp years min educ labor_type_name Applications Systems Analyst/Programmer - Entry Applications Systems Analyst/Programmer - Mid Applications Systems Analyst/Programmer - Sr Business Analyst min exp years description 1.

More information

Hosted by Lunarline: School of Cyber Security

Hosted by Lunarline: School of Cyber Security Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

Research, recommend, and assist in implementing identity automation solution.

Research, recommend, and assist in implementing identity automation solution. Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,

More information

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Terrance Maguire Chief Scientist. Digital Forensics Academy, LLC

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Terrance Maguire Chief Scientist. Digital Forensics Academy, LLC Digital Forensics Academy, LLC Chief Scientist, April 2012 Present Williamsburg, VA Terrance Maguire Chief Scientist Digital Forensics Academy, LLC PO Box 5033 Williamsburg, VA 23188 202-630-7094 terrance.maguire@gmail.com

More information

Computer Information Technology Program Course history matrices by award (a.k.a. Course Cross Walks)

Computer Information Technology Program Course history matrices by award (a.k.a. Course Cross Walks) Computer Information Technology Program Course history matrices by award (a.k.a. Course Cross Walks) Information Technology Administrator AAS ITNW 11.0901 Course Cross Walk for Computer Information Technology

More information

REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM

REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM On a Mission to Transform Talent REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM Table of Contents Module 1: Introduction to Hardware and Networking (Duration: 1.5 Weeks)...1 Module 2: Windows XP Professional

More information

Cybersecurity AAS Program

Cybersecurity AAS Program Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of

More information

Course Outline. Configuring, Managing & Maintaining Windows 2008 Server. Course Description: Pre-requisites:

Course Outline. Configuring, Managing & Maintaining Windows 2008 Server. Course Description: Pre-requisites: Configuring, Managing & Maintaining Windows 2008 Server Course Description: This five-day instructor-led course combines five days worth of instructor-led training content from the Network Infrastructure

More information

Network Engineering Technology

Network Engineering Technology Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science

More information

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

IDS and Penetration Testing Lab ISA656 (Attacker)

IDS and Penetration Testing Lab ISA656 (Attacker) IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible

More information

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA Server Administration, CWTS Wireless Certifications

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA Server Administration, CWTS Wireless Certifications : CompTIA A+, Microsoft MTA Server Administration, CWTS Wireless Certifications ZAPL- 007-164 hours CompTIA A+, Microsoft MTA: Windows Server Administration, CWTS Wireless Certifications Fee: $3,175 -

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Academic Programs INFORMATION TECHNOLOGY

Academic Programs INFORMATION TECHNOLOGY Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Computer Support & Network Administration

Computer Support & Network Administration Computer Support & Network Administration What You Will Learn MCTC s Information Technology program has two A.A.S. awards: Computer Support and Network Administration and Software Development, as well

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

Connections II Award #: GS00Q12NSD0019

Connections II Award #: GS00Q12NSD0019 J.1 Labor Categories The following labor categories are included on the Connections II contract. Additional categories may be requested for inclusion by the contractor. Fields are taken from Table -5 Labor_Table;

More information

Richard A. Livingood, Ph.D., MCSE, CISSP, CSSLP

Richard A. Livingood, Ph.D., MCSE, CISSP, CSSLP April 20, 2010 Mr. Roger Randolph, City Clerk City of Tucson, Arizona Re: Open City Council Seat Ward 2 Dear Mr. Randolph, I am requesting to be considered for the open seat on the City Council in Ward

More information

JOB OPENING. Please see attached Job Description: Last day to apply: February 27, 2013

JOB OPENING. Please see attached Job Description: Last day to apply: February 27, 2013 JOB OPENING Position: Reports To: Manager of Technology Operations Location: Aledo Position Requirements: Associate s degree in computer science or electronics and/or certification such as MCSE, CNE, A+,

More information

Curriculum Vitae -Joel H. Bush

Curriculum Vitae -Joel H. Bush Curriculum Vitae -Joel H. Bush Joel H. Bush Email: jbush@rmcc.edu Home: 360 Polk 75 Mena, AR 71953 Cell: 479-216-4553 Rich Mountain Community College 1100 College Drive Mena, AR 71953 479-394-7622 X1356

More information

Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today)

Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today) Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today) Course # SP-1000 SP-3005 SP-1001 SP-3003 SP-3004 SP-2004 SP-3001 SP-3002 PR-1005 MS-20412 MS-50321 MS-7005

More information

Master of Science in Information Assurance

Master of Science in Information Assurance 2004-2005 Catalog Addendum New Program Master of Science in Information Assurance This Walsh College Master of Science in Information Assurance degree combines theory with applied learning enabling security

More information

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012

Ph.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012 Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership kabarton@ollusa.edu Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern

More information

NETWORK SYSTEMS ENGINEER II

NETWORK SYSTEMS ENGINEER II NETWORK SYSTEMS ENGINEER II DEFINITION Under direction, provides technical support for the County s infrastructure of Local Area Networks (LANs), Wide Area Network (WAN) and other related data network

More information

Distributed Systems Security

Distributed Systems Security Distributed Systems Security Tutorial Dennis Pfisterer Institute of Telematics, University of Lübeck http://www.itm.uni-luebeck.de/users/pfisterer Non Sequitur by Wiley Security - 08 Firewalls Assessing

More information

Appendix A-2 Generic Job Titles for respective categories

Appendix A-2 Generic Job Titles for respective categories Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide

More information

CURRICULUM VITAE Russell Adams 956-882-7654 radams@utb.edu Brownsville TX 78520. Current Position: Associate Professor of Marketing SCOB UTB-TSC

CURRICULUM VITAE Russell Adams 956-882-7654 radams@utb.edu Brownsville TX 78520. Current Position: Associate Professor of Marketing SCOB UTB-TSC CURRICULUM VITAE Russell Adams 956-882-7654 radams@utb.edu Brownsville TX 78520 Current Position: Associate Professor of Marketing SCOB UTB-TSC Ph.D. Business Administration EDUCATION University of Texas

More information

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program

Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program A. College: Laramie County Community College B. Date submitted to WCCC: C. Program 1. Request for: X

More information

Click here to submit your resume

Click here to submit your resume To be considered for positions with SE Solutions candidates must be clearable to a Top Secret level. A current Secret clearance or higher is preferred. US citizenship is required. All positions are full

More information

P.O. Box 691593 San Antonio, Texas 78269. Summation

P.O. Box 691593 San Antonio, Texas 78269. Summation P.O. Box 691593 San Antonio, Texas 78269 Phone (210) 392-6993 E-mail dteneyuca@msn.com Dr. David Teneyuca, CISSP Summation Research Interest Project Leadership For Software Development Value-added Communication

More information

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820

https://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820 Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic

More information

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)

Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without

More information

Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024

Request for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024 RFR Number: (Reference BPO Number) Functional Area (Enter One Only) Section 1 General Information R00B4400024 Functional Area 10 - IT Management Consulting Services Position Title/s or Service Type/s (Short

More information

The Leading IT & Telecom Solutions Provider

The Leading IT & Telecom Solutions Provider The Leading IT & Telecom Solutions Provider Address 4th Floor Ros han Pla za Sha hr -e -Now Kabul Afghansitan. Tel: +93(0 )77-28 4 1 41 10 +93 (0)77-28 41 41 20 +93(0)77-28 41 41 30 +93(0)77-28 41 41 40

More information

INTRUSION DETECTION SYSTEM

INTRUSION DETECTION SYSTEM INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor

More information

Principal Lecturer in Cyber Security. 9 47,328-54,841 per annum. School of Computing & Technology. 1.0 FTE (part-time or Job share will be considered)

Principal Lecturer in Cyber Security. 9 47,328-54,841 per annum. School of Computing & Technology. 1.0 FTE (part-time or Job share will be considered) JOB DESCRIPTION Post Title Post No: Salary Grade Department Base Location FTE Principal Lecturer in Cyber Security A885 9 47,328-54,841 per annum School of Computing & Technology Park Campus 1.0 FTE (part-time

More information

INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES

INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES Doc REF: ICTA/VAC/Feb09/01 Applications are invited from suitably qualified candidates for the following positions: A. Director

More information

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC vico@504ensics.com

Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC vico@504ensics.com Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC vico@504ensics.com Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

Security Forensics Training

Security Forensics Training Security Forensics Training Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber

More information

Recommended Programs Per School

Recommended Programs Per School Recommended Programs Per School Note: Some courses are appropriate for teaching students at various ages, therefore some courses may be listed below as recommended offerings at multiple school age levels.

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.

Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr. Cyber Security 2014 Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr. Joel Dubow Hacking Incidents Reported to the Cyber

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES. Band 4 ICT Technician JOB DESCRIPTION

BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES. Band 4 ICT Technician JOB DESCRIPTION BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES BAND 4 ICT Technician JOB DESCRIPTION POSTS: REPORTS TO: ACCOUNTABLE TO: LOCATION: BAND: Band 4 ICT Technician (a waiting list may also

More information

2015-2016 Information & Telecommunication Technology

2015-2016 Information & Telecommunication Technology PROGRAM GUIDE 2015-2016 Information & Telecommunication Technology Information and Telecommunications Technology Associate in Applied Science Degree 60 credits Information and Telecommunication Technology

More information

CSI Crime Scene Investigations

CSI Crime Scene Investigations CSI Crime Scene Investigations Did Jack do it? Speaker Introductions Amber Schroader Paraben Corporation Oodles of forensic experience Tyler Cohen Federal Government (Still Cool Person) IPod Obsession

More information

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE

Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE 2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides

More information

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 yanb@u.washington.edu Kyle Gwinnup and Carol

More information

SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008

SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008 SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008 HOME ADDRESS: E-MAIL 21 Oak Lane 62707 Home (217) 529-7980 Cell (217) 816-9667 rothac@excite.com and aroth1@uis.edu EMPLOYMENT

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

Robotics Core School 1

Robotics Core School 1 Robotics Core School 1 Robotics Core School 2 Cyber Forensics & Crime Investigation This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific

More information

Build Your Own Security Lab

Build Your Own Security Lab Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

CHAPTER 2: Staffing ROLES OF STAFF. Roles Required to Provide Tech Support

CHAPTER 2: Staffing ROLES OF STAFF. Roles Required to Provide Tech Support Roles Required to Provide Tech Support The type and number of staff required to meet a district s technical support needs will vary widely based on the size of the district and the quality and quantity

More information

PEER REVIEWED PUBLICATIONS

PEER REVIEWED PUBLICATIONS Curriculum Vitae of Kevin Williams Kevin Williams Assistant Professor Instructional Technology Department Chair Graduate Education, BAAS, BGS Texas A&M University-Texarkana Phone: (903) 223-3028 Email:

More information

Kevin Williams Assistant Professor Instructional Technology Texas A&M University-Texarkana Phone: (903) 223-3028 Email: kevin.williams@tamut.

Kevin Williams Assistant Professor Instructional Technology Texas A&M University-Texarkana Phone: (903) 223-3028 Email: kevin.williams@tamut. Curriculum Vitae of Kevin Williams Kevin Williams Assistant Professor Instructional Technology Texas A&M University-Texarkana Phone: (903) 223-3028 Email: kevin.williams@tamut.edu EDUCATION -D.Sc., Information

More information

Diploma in Network (LAN/WAN) Administration

Diploma in Network (LAN/WAN) Administration Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a

More information

30 Independent Study. 60 (e.g. lectures, seminars and supervised group activity)

30 Independent Study. 60 (e.g. lectures, seminars and supervised group activity) 1. Programme Title BSc Digital & Technology Solutions 2. Unit Title Data and Security 3. HE Level UG1 FHEQ Level 4 4. Unit Code DTS16104 5. Credit Value of Unit 30 6. Unit Type Mandatory 7. Unit Tutor

More information

Jibran Ilyas DIRECTOR

Jibran Ilyas DIRECTOR PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response

More information

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in

More information

TOM DAVIDSON CNC CONSULTANT

TOM DAVIDSON CNC CONSULTANT TOM DAVIDSON CNC CONSULTANT SUMMARY An IT Global Systems Architect with a majority of experience involved in large scale ERP design, implementation, and system administration on a global level. I bring

More information