Izmir University of Economics. Navigator Business & Information Management Services S.A.

Size: px
Start display at page:

Download "Izmir University of Economics. Navigator Business & Information Management Services S.A."

Transcription

1 Dr. Mete Eminağaoğlu Information security management, machine learning, data mining, cryptography, IT governance, information security risk analysis, information systems audit and control, assistant professor, manager, lecturer, consultant, project manager. 1. PERSONAL DETAILS 1.1. Personal Information Nationality Turkish Driving license Turkish, type B Date of Birth 1973 Military Service Fulfilled 1.2. Contact Information Work phone: ( ) Mobile phone: ( ) Educational Background 2011 PhD in Computer Engineering Trakya University Edirne, Turkey 1999 M.Sc. in Computer Engineering Izmir Institute of Technology Izmir, Turkey 1996 B.Sc. in Computer Engineering Ege University Izmir, Turkey 1.4. Employment 2012-present Yaşar University Assistant Professor Dept. of Software Engineering Yaşar University Izmir University of Economics Navigator Business & Information Management Services S.A. Lecturer Dept. of Computer Programming Part-time Lecturer Vice General Manager Arkas Holding S.A. Information Systems Security Manager Inf. Security Consultancy & Audit Dept. 1

2 Digiturk, Digital Platform Iletisim Hizmetleri A.S. T.C. Kara Kuvvetleri Komutanligi, Elazig 8. Kolordu Komutanligi, Elazig, TURKEY Izmir Institute of Technology IT Security Specialist - IT Dept, Sys & Network Group Network Security & Information Systems Support Officer - OBIM. (military service, second lieutenant) Research Assistant - Dept. of computer engineering 05/ /1996 Chronicle 02/ /1995 New Holland Trakmak A.S. Software Engineer - Software R&D Software Engineer IT Department 1.5. Other Information Languages: Turkish (native), English (proficient), German (elementary) UDS (English language proficiency exam by Turkish Council of Higher Education) Score: (out of 100) 2. ACADEMIC ACTIVITIES 2.1. PhD Thesis Eminağaoğlu, M, A Qualitative Information Security Risk Assessment Model using Machine Learning Techniques, Computer Engineering, Supervisor: Prof. Dr. Şaban EREN, Trakya University, Edirne, TURKEY, M.Sc. Thesis Eminağaoğlu, M, Genetic Algorithmic Approach to the Differential & Linear Cryptanalysis of Symmetric Cryptosystems, Computer Engineering, Supervisor: Assoc. Prof. Dr. Ahmet KOLTUKSUZ, Izmir Institute of Technology, Izmir, TURKEY, B.Sc. Thesis Eminağaoğlu, M, Transportation Simplex Method Modeling & Its Application in Office Automation Systems using a Relational Database, Computer Engineering, Ege University, Izmir, TURKEY, Publications 1. Eminağaoğlu M., Çini E., Sert G., Zor D., A Two-Factor Authentication System with QR codes for Web and Mobile Applications, EST-2014, Proceedings of Fifth International Conference on Emerging Security Technologies, September 10-12, 2014, Alcalá de Henares, SPAIN, DOI: /EST , pp: , (2014). (proceedings journal indexed in IEEE Xplore) 2. Gökşen Y., Doğan O., Eminağaoğlu M., A Proposed Model for Candidate Selection Process in Political Parties Based On Fuzzy Logic Methodology, Mathematical and Computational Applications, ISSN: X, Vol.17 (2), pp: , (2012). (Indexed in SCOPUS) 3. Eminağaoğlu M., A Qualitative Information Security Risk Assessment Model using Machine Learning Techniques, ICT 2012, Proceedings of Second International Conference on Advances in Information and Communication Technologies, November 22-23, 2012, Amsterdam, NETHERLANDS, DOI: 03.CSS , pp:92-98, (2012). 4. Çevik E., Eminağaoğlu M., Gökşen Y., Arama Motorları Optimizasyonunda Bilginin Stratejik Rolü, Güvenliği ve Yasal Sorunlar, TBD Bilişim 2012, 29. Ulusal Bilişim Kurultayı Bildiriler Kitabı, Ankara, TURKEY, pp , November, (2012). 5. Eminağaoğlu M. & Eren Ş., Implementation and Comparison of Machine Learning Classifiers for Information Security Risk Analysis of a Human Resources Department (extended version of IEEE symp.), International Journal of Computer Information Systems and Industrial Management, ISSN: , Vol.3, pp: , (2011). (Indexed in INSPEC) 2

3 6. Gökşen Y., Eminağaoğlu M., Doğan O., Data Mining in Medical Records for The Enhancement of Strategic Decisions: A Case Study, Scientific Bulletin: Economic Sciences, University of Pitesti, ISSN: , Vol.11 (1), pp: , (2011). (Indexed in DOAJ, RePEc) 7. Eminağaoğlu M., Eren Ş., Uçar E., Using Binary Classifiers for Information Security Risk Analysis: A Case Study, ISCSE 2011 The 2nd International Symposium on Computing in Science & Engineering - Proceedings, 1-4 June 2011, Kuşadası, TURKEY, pp: , (2011). 8. Eminağaoğlu M. & Eren Ş., Implementation and Comparison of Machine Learning Classifiers for Information Security Risk Analysis of a Human Resources Department, Proceedings of the IEEE 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), 8-10 October, Kraków, POLAND, pp: , (2010). (proceedings journal indexed in IEEE Xplore) 9. Eminağaoğlu M., Uçar E., Eren Ş., The positive outcomes of information security awareness training in companies; a case study, Elsevier, Information Security Technical Journal, ISSN: , Vol. 14 No.4, pp: , (2009). (Indexed in SCOPUS) 10. Eminağaoğlu M. & Gökşen Y. "Information Security; what is and what is not, Information Security Problems in Turkey and Some Related Solutions", Dokuz Eylül University Social Sciences Institute Journal, ISSN: , Vol.11, No.4, pp: 1-15, (2009). (Indexed in DOAJ) 11. Eminağaoğlu M., Position paper: Analysis and assessment of information security risks using machine learning techniques, Proceedings of the 1st JRC-Turkey Workshop on ICT Security, JRC- IPSC EU Commission, ISBN: , ISSN: , DOI: /84998, pp: 14-15, 1-2 December 2009, Izmir, TURKEY. 12. Kurtel K., Eminağaoğlu M., Eren Ş., Modeling Business Process Exceptions in UML 2 Notation Proceedings of the XXIII. microcad International Scientific Conference, pp: 67-74, March 2009, University of Miskolc, HUNGARY Teaching Experience / Courses Given KH Leuven University, Dept. of Health & Technology, BELGIUM, Undergraduate Track 1: Data Mining Track 2: Risk Management in Information Security (LLP Erasmus Teaching Staff Mobility Program; 19 th March nd March 2012) St. Pölten University of Applied Sciences, AUSTRIA, Graduate & Undergraduate Track 1: CISSP domains; IT Operations Security & Application Development Security Track 2: Information Security Risk Management & Software Risk Management (LLP Erasmus Teaching Staff Mobility Program; 3 rd May th May 2010) Yasar University, Graduate CENG 690 PhD Seminar CENG 648 CENG 539 CENG 533 INOV 515 Machine Learning Information Security Risk Management Data Mining Management of Information Systems Yasar University, Undergraduate CENG 410 Senior Project I CENG 420 STAT 480 SENG 462 CENG 474 Senior Project II Statistical Methods in Data Mining Secure Software Design & Programming Computer Security MATH 461 Computational Mathematics I MATH 462 Computational Mathematics II SENG 368 SENG 307 Soft Computing Software Systems Analysis 3

4 SENG 302 STAT 380 STAT 360 CENG 141 CENG 142 Software Design & Architecture Information Security Management Audit of Information Systems Programming & Problem Solving I Programming & Problem Solving II Izmir University of Economics, Undergraduate CS304 Operating Systems Security LOG464 Information Security Management 2.6. Supervised Theses Gökçer Peynirci, PhD, Malware Detection Using Machine Learning and Data Mining Approaches, 2013 present. Mert Yıldız, MSc, An Information Security Risk Assessment Model Based on Heuristic Approaches, 2014 present Awards & Honors Best Paper runner-up, Eminağaoğlu M., Çini E., Sert G., Zor D., A Two-Factor Authentication System with QR codes for Web and Mobile Applications, EST-2014, Fifth International Conference on Emerging Security Technologies, IEEE, September 10-12, 2014, Alcalá de Henares A academic research funding program award by TÜBİTAK (The Scientific and Technological Research Council of Turkey), project title: A Two-Factor Authentication System with QR codes for Web and Mobile Applications, project schedule: November July Referee & Reviewer Behaviour and Information Technology, Taylor & Francis Group, ISSN: , UNITED KINGDOM, (SCI-indexed journal). Connection Science, Taylor & Francis Group, ISSN: , UNITED KINGDOM, (SCI-indexed journal). JOY, E-Journal of Yaşar University, Yaşar University, ISSN: X, TURKEY, (journal indexed in EBSCO, DOAJ). IEEE 4 th World Congress on Information and Communication Technologies (WICT 2014), December 8-10, 2014, MALAYSIA Memberships MIR Labs (Machine Intelligence Research Labs) 3. PROFESSIONAL ACTIVITIES 3.1. Business Experience June 2007 January 2009 NAVIGATOR Business & Information Management Services SA, Konak, Izmir, TURKEY Vice General Manager Management of all the executive tasks in Navigator that gives service to 3 rd parties; 4

5 Information Security and IT Quality Assurance, Business Applications consultancy, Process and Performance Improvement consultancy, IT Recruitment consultancy Taking part or managing in some of Navigator s Information Security & IT Governance audit & training projects including (some of the clients: Türk Ekonomi Bankası, Societe Generale Krediver, Türkiye Finans Katılım Bankası, Bristol-Myers Squibb, Bosphorus Shipping Agency, Brightwell BV); ISO27001 & CobiT training & consultancy Business Continuity Planning Internet & web application security Secure software development May 2002 June 2007 Arkas Holding SA, Alsancak, Izmir, TURKEY Information Systems Security Manager Development, consultancy and management of Information Security within Arkas Group of Companies, including; Corporate Information Security Strategies Internal Security Audits, Education & training (Information Security Awareness), Education & training (Information Security Technical Concepts), Technical & administrative consultancy, Development & publishing of Information Security policies, procedures & technical standards, Computer forensics & forensic analysis, Contingency planning, emergency & incident response, Tiger Team - penetration tests & vulnerability assessments, Risk Analysis Planning & Implementation of Corporate IT Security Systems Infrastructure & related projects; Network Firewalls, Network & host based IDS / IPS, Content Filtering, Network & desktop Anti-Virus, Personal Firewalls, PKI ( & data encryption, digital signatures, SSL CA) Spyware & malware protection, Wireless network security, VPN gateways, Patch management. Professional Services to 3 rd Party Companies; Education (Information Security Awareness) Training (Information Security - Technical & Administrative) Information Security Audits Information Security Consultancy - Administration & Solution Provider Part-time Instructor at Izmir University of Economics, Department of Computer Programming; Computer Security Course February 2001 May 2002 Digiturk, Digital Platform Iletisim Hizmetleri A.S Besiktas, Istanbul, TURKEY IT Security Specialist LAN, Intranet & Internet security management Checkpoint FW & Nokia IP650 administration ISS Real Secure IDS administration Test & management of several security-based systems (VPN devices, Radius RAS Servers, SSL accelerators, e-tokens, sniffers, security scanners) Win 2K & Win NT4.0 local security management MS IIS 4.0 & 5.0 system / security management & maintenance MS Exchange 5.5, 2000 system / security management & maintenance System & network administration on Win2K, WinNT 4.0 Servers & MS AD architecture 5

6 Design & programming of data security, system management, network security & networking applications using C, VB 6.0 December 1999 October 2000 T.C. Kara Kuvvetleri Komutanligi, Elazig 8. Kolordu Komutanligi, Elazig, TURKEY Network Security & Information Systems Support Officer (military service as the second lieutenant) LAN, Intranet & Internetworking security management Network administration, MS Exchange Server 5.5 management, IIS 4.0 management on Win NT Server 4.0 platform Web site design & development for the 8 th Army Corps Intranet Design & development of several Client / Server applications on the 8 th Army Corps Intranet using VBScript & JavaScript Design & development of several application programs using VB4.0,C November 1996 June 1999 Izmir Institute of Technology Urla, Izmir, TURKEY Research Assistant Several research projects related with software security, information security, network & Internet security, database security, cryptanalysis, secure , symmetric data encryption Lecturer (C programming lab CENG -1.mid term students) Given OS security, software security, cryptology seminars Several optimization case-studies using Genetic Algorithms Operating system security benchmark tests and researches on Linux, AIX, Windows NT platforms Simulation applications using SimDL Web Page Design using Web Browse objects for Visual Basic 4.0, VBScript, HTML Design & development of Internet Client/Server applications with VBScript, Visual Basic 4.0 and Active X May 1996 November 1996 CHRONICLE Ltd., Cankaya, Izmir, TURKEY Software Engineer System Analysis & Project Design Application and on-demand programs with MS VB 3.0 & 4.0, MS Access 7.0 Design & development of Kronik Ofis - Accounting System Software Package Administration & application development on Microsoft SQL Server 6.0 & 6.5 platforms: Account Tracking System with Transact SQL on MS SQL Server Office Automation Programs with MS SQL Server 6.5 Database using Visual Basic SQL Server Library, ODBC API, RDO and DAO Integration, redesign and transportation of Kronik Ofis database from MS Access 7.0 to MS SQL Server 6.5 platform SQL Application Programs using Client-Server Architecture February 1995 November 1995 New Holland Trakmak A.S. Izmir, TURKEY Software Engineer Unisys - BTOS System Administration Systems Analysis & Design Design & development of application programs with MS Access 2.0 Design & development of application programs using Cobol and VSAM file system on BTOS platform 3.2. Professional Certifications March 2006 ISO 27001:2005 Lead Auditor BSI-Global, TURKEY October 2005 CISA (Certified Information Systems Auditor) 6

7 Information Systems Audit & Control Association December 2004 CISSP (Certified Information Systems Security Professional) International Information Systems Security Certification Consortium July 2004 BSI BS7799: Lead Auditor BSI-Global Programing Languages MS Visual C++, MS Visual C#, MS Visual Basic, MS SQL, VBScript, JavaScript, ANSI C, 8086 Assembly, Cobol, UML, SimDL 3.4. Operating Systems Win. 2003, Win. XP, Vista, Win. 7.0, Win. 2K Server & Pro, Win. NT 4.0, Win. 95 / 98, Unix (IBM AIX, Linux RedHat), IBM i-series (OS/400), BTOS, MS DOS, Nokia IPSO Series 3.5. Hardware Platforms IBM (Workstation 6000 Series, AS/400), Unisys (CTOS), Intel PC, Nokia Appliance IP 530 & IP Database Microsoft SQL Server, MS Access 3.7. Other Technologies and Systems WEKA, MATLAB, Acunetix, OWASP ZAP, Checkpoint (FW-4.1, NG, NGX), MS CA Server, MS Active Directory, MS EFS, MS IPSEC, Cisco IOS, Cisco AiroNet Series, PGP, Symantec (Enterprise A/V, Norton Internet Security), Computer Associates (Unicenter TNG, Innoculan), TrendMicro for Unix, Sybari for MS Exchange, ZoneAlarm Personal Firewall, Kerio Personal Firewall, ISS Proventia Desktop Security, RSA (SecurID, Ace Server), Squid, WebSense, SuperScout, Snort, ISS (Real Secure, Internet Scanner, DB Scanner, System Scanner), GFI LanGuard, Eeye Retina, Nmap, Nessus, SPI Dynamics WebInspect, SolarWinds, MS Office, MS Project, Microsoft Exchange, Kerio Mail Server, MS IIS, SAP (R/3, SRM, SEM). 7

Mete Eminağaoğlu, PhD

Mete Eminağaoğlu, PhD Mete Eminağaoğlu, PhD Information security, IT governance, risk analysis, cryptography, machine learning, academic, information systems audit and control manager / consultant, project manager, general

More information

Mete Eminağaoğlu, PhD

Mete Eminağaoğlu, PhD Mete Eminağaoğlu, PhD Information security, IT governance, risk analysis, cryptography, machine learning, data mining, academic, information systems audit and control manager / consultant, project manager,

More information

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: Availability: BT2691 UNIX Security Specialist British and Danish 13 years Masters Degree

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

MH NOROUZI RÉSUMÉ AND CV

MH NOROUZI RÉSUMÉ AND CV MH NOROUZI RÉSUMÉ AND CV PERSONAL INFORMATION Last Name: NorouziMahalli First Name: MohammadHossein Date of Birth: 1988 Marital status: Single Birth Certificate ID: 9850 Languages Spoken: Native Language:

More information

Res. Asst. Mümine KAYA

Res. Asst. Mümine KAYA Res. Asst. Mümine KAYA PERSONAL INFORMATION E-Mail : mkaya@adanabtu.edu.tr Phone : 0 322 455 00 00 Extension: 2042 Date of Birth : 08.11.1986 Place of Birth : Adana Nationality : T.C. ACADEMIC CAREER Adana

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

Ram B. Basnet, Ph.D.

Ram B. Basnet, Ph.D. Ram B. Basnet, Ph.D. EDUCATION New Mexico Tech, Socorro, New Mexico Ph.D. in Computer Science, 5/2010 1/2012, Area of Specialization: Phishing Detection M.S. in Computer Science, 8/2005 12/2007 Colorado

More information

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro

Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that

More information

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012

Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake

More information

Computer and Information Sciences

Computer and Information Sciences Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,

More information

The positive outcomes of information security awareness training in companies e A case study

The positive outcomes of information security awareness training in companies e A case study information security technical report 14 (2009) 223e229 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm The positive outcomes of information security awareness training

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

Websense Certified Engineer Web Security Professional Examination Specification

Websense Certified Engineer Web Security Professional Examination Specification Websense Certified Engineer Web Security Professional Examination Specification Introduction This is an exam specification for the Websense Certified Engineer - Web Security Professional examination. The

More information

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Intro to QualysGuard IT Compliance SaaS Services Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe QualysGuard ICT Security Management Integrated Suite of ICT Security

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400)

Curriculum Vitae. Personal information. Chamara Suseema Withanachchi. Desired employment / Occupational field. IBM i RPG Programmer (AS/400) Curriculum Vitae Personal information First name(s) / Surname(s) Address Flat No 503, S. S. Lootha Building, King Fizal Road Sharjah (United Arab Emirates) Telephone(s) + 971 6 5730339 Mobile + 971 50

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...

More information

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011 ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review

More information

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com

CRYPTOGEDDON: HEALTH CARE COMPROMISE. Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com CRYPTOGEDDON: HEALTH CARE COMPROMISE Todd Dow, CISA, PMP Founder, cryptogeddon.com @toddhdow, toddhdow@gmail.com WHAT IS CRYPTOGEDDON? An online scavenger hunt using hacker tools Use infosec tools to solve

More information

Course Description for Operating Systems Hands-On (S&R Technology Lab)

Course Description for Operating Systems Hands-On (S&R Technology Lab) Federal Reserve Board of Governors Course Description for Operating Systems Hands-On (S&R Technology Lab) Last Revised: November 2009 Supervision Technology Risks Educate, Analyze and Manage Federal Reserve

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc. SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification

More information

MICROS Customer Support

MICROS Customer Support MICROS Customer Support Remote Access Policy MICROSCustomerSupport RemoteSupportAccessPolicy Adescriptionofthepoliciesandproceduresrelatingtoremoteaccesstocustomersystemsby MICROSCustomerSupportpersonnel.ThisdocumentalsoincludesMICROS

More information

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

CURRICULUM VITAE Herbert L. Dershem

CURRICULUM VITAE Herbert L. Dershem CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue

More information

Course Descriptions. preparation.

Course Descriptions. preparation. Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Lecturer in the School of Computer Applications

Lecturer in the School of Computer Applications Lecturer in the School of Computer Applications Job Description The School of Computer Applications is responsible for the disciplines of computing and quantitative methods within the University and has

More information

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)

COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

COMPANY PRESENTATION SOLUTIONS

COMPANY PRESENTATION SOLUTIONS 2MN LTD COMPANY PRESENTATION SOLUTIONS 2MN LTD www.2mn.co.uk I A PROPOS DE 2MN Telephone: +44(0)8709192892 Email: info@2mn.co.uk Dear Sir/Madam, Support: support@2mn.co.uk Dear Sir, Madame, 1 Dear Sir/Madame,

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Christian Wangel. Experience

Christian Wangel. Experience Christian Wangel Experience February 2014 Arrow ECS Sweden AB Stockholm Senior Sales Engineer Sales and Technical guidance to partners and colleagues in most IT fields focusing on security and data management.

More information

LITOSTROJ STEEL LTD., SLOVENIA

LITOSTROJ STEEL LTD., SLOVENIA PERSONAL INFORMATION Zoran Barać Vinterca 53, 1000 Ljubljana (Slovenia) +38651267516 zoran.barac.zof@gmail.com Skype: zoran.barac2 https://si.linkedin.com/pub/zoran-barac/21/8ab/a72 www.sqlserveronline.com

More information

13 Courses Quick Guide

13 Courses Quick Guide 13 Courses Quick Guide Microsoft Network Infrastructure 2008 Microsoft Certified Solution Associate (MCSA 2012) MCSE 2012 (Private Cloud) MCSE Server infrastructure 2012 Administering & Configuring Microsoft

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014 Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: ginesdt@um.es Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

eeye Digital Security Product Training

eeye Digital Security Product Training eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary

More information

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name

Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:

More information

JOB DESCRIPTION. *-- Assist with the administration of the Exchange Email Servers and Client Installations, including smart phones.

JOB DESCRIPTION. *-- Assist with the administration of the Exchange Email Servers and Client Installations, including smart phones. JOB DESCRIPTION Title: SENIOR I.T. TECHNICIAN Department: Administrative and Development Services Class Code: 3170 FLSA Status: Non-Exempt Effective Date: July 1, 1998 (Rev 12/2012) Grade Number: 20 GENERAL

More information

Response to Questions CML 15-018 Managed Information Security

Response to Questions CML 15-018 Managed Information Security Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?

More information

+90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis

+90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis TOLGA SEÇİLMİŞ Phone: E-mail: Date of Birth: Web +90 (532) 275 37 70 tolgasecilmis@gmail.com 21.07.1973 http://about.me/tolga.secilmis 2011- present SDL International Istanbul - General About: SDL is a

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Annex 10 Standard Profile Specification and Request Form for Services

Annex 10 Standard Profile Specification and Request Form for Services Annex 10 Standard Profile Specification and Request Form for Services London, Request number: Framework Contract No.: To: Company : Contact: Telephone: e-mail address: Description of the required service:

More information

LAL PAUL. To become an expert in Network Administration especially in Unix flavours.

LAL PAUL. To become an expert in Network Administration especially in Unix flavours. LAL PAUL OBJECTIVE To become an expert in Network Administration especially in Unix flavours. EXPERIENCE 1991 till date Cochin University of Science & Technology,Cochin, India System Administrator Presently

More information

Research, recommend, and assist in implementing identity automation solution.

Research, recommend, and assist in implementing identity automation solution. Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,

More information

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Introduction p. 2. Introduction to Information Security p. 1. Introduction Introduction p. xvii Introduction to Information Security p. 1 Introduction p. 2 What Is Information Security? p. 3 Critical Characteristics of Information p. 4 CNSS Security Model p. 5 Securing Components

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with

More information

Tom VAN DEN EYNDE CISSP, CISA, CISM

Tom VAN DEN EYNDE CISSP, CISA, CISM Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: tom@vandeneynde.net Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May

More information

S-Terra CSP: the future champion of the Russian network security market

S-Terra CSP: the future champion of the Russian network security market S-Terra CSP: the future champion of the Russian network security market CONTENT Who do we are? Why are we better? Why we must win? 2003, 2004 S-Terra CSP 2 Origin of the «S-Terra CSP» NPO ELAS legendary

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li 60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop

More information

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP. RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,

More information

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23

Diversen Interactief Centrum voor gerichte Training en Studie Edisonweg 14c, 1821 BN Alkmaar T: 072 511 12 23 642-812 642-812 Building Converged Cisco Multilayer Switched Networks BCMSN 642-845 642-845 Optimizing Converged Cisco Networks ONT 642-901 642-901 Building Scalable Cisco Internetworks BSCI Building COM+

More information

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com

Technical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning

More information

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT

AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT AC 2009-1316: INNOVATIVE NETWORK SECURITY COURSE DEVELOPMENT Hetal Jasani, Northern Kentucky University Dr. Hetal Jasani is an assistant professor in the Department of Computer Science at Northern Kentucky

More information

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink rvandenbrink@metafore.ca Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

CV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3.

CV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3. CV: AGGELOS HANOU Software Developer (desktop & web app.) Personal information 2 Work experience 3 Education and training 3 Languages 3 Knowledge 4 Additional information 7 Driving license 7 Personal information

More information

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T: 01224 262787 h.ahriz@rgu.ac.uk A TOP-RATED UNIVERSITY FOR EMPLOYABILITY MSc Information and Network Security T: 01224 262787 h.ahriz@rgu.ac.uk PROGRAMME OVERVIEW Most modern organisations face security risks that threaten their valuable

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1 Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called

More information

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr. INFORMATION SCIENCE INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. Introduction to the concepts, principles, and skills of information science for students with no programming experience. Topics

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

ددم یلع اي PROFILE Name: Date of Birth: Marriage: Job experience: WORKING EXPERIENCE December 2014 Present MCI and April 2013 December 2014

ددم یلع اي PROFILE Name: Date of Birth: Marriage: Job experience: WORKING EXPERIENCE December 2014 Present MCI and April 2013 December 2014 يا علی مدد PROFILE Name: Meghdad Shamsaei Date of Birth: 3 th July 1981 Marriage: Married and 1 Child Job experience: 13 Years (1st Oct 2015 ) WORKING EXPERIENCE December 2014 Present :SOC Director at

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Ahmed Al-Haffar. Objectives. Experience

Ahmed Al-Haffar. Objectives. Experience Ahmed Al-Haffar Kuwait - Salmiya (+965) 9724-9062 E-mail: ahmed.haffar@hotmail.com Objectives A Microsoft techie & B.E Computer Science Engineer, with MCSA, MCTS, MCITP, Network+ and CCNA with 6 years

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

CURRICULUM VITAE. Degree Branch University Graduation Year BSc. Industrial Engineering Çankaya University 2004

CURRICULUM VITAE. Degree Branch University Graduation Year BSc. Industrial Engineering Çankaya University 2004 ÇİĞDEM DİNÇKAL (PhD) CURRICULUM VITAE Academic Title: Assistant Professor. Work Address: Çankaya University, Department of Civil Engineering, N-A09, Yukarıyurtcu Mahallesi Mimar Sinan Caddesi No:4, 06790,

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Academic Curriculum Vitæ Yeşim Üçdoğruk Gürel

Academic Curriculum Vitæ Yeşim Üçdoğruk Gürel 2014 Academic Curriculum Vitæ Yeşim Üçdoğruk Gürel Address: Dokuz Eylül University, Faculty of Business, Department of Economics Tınaztepe Campus, No: 233, 35160, Buca, İzmir, TURKEY E-mail: yesim.ucdogruk@deu.edu.tr

More information

Reality Check: Practical Limitations of Technical Privacy Protection

Reality Check: Practical Limitations of Technical Privacy Protection Munich IT Security Research Group Reality Check: Practical Limitations of Technical Privacy Protection Hans-Joachim Hof MuSe - Munich IT Security Research Group Munich University of Applied Sciences hof@hm.edu

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Aslı Seda (Kurt) Bilman

Aslı Seda (Kurt) Bilman CURRICULUM VITAE Aslı Seda (Kurt) Bilman Office Address Department of Economics, Faculty of Economics and Administrative Sciences, Dokuz Eylül University, Dokuzçeşmeler Campus, 35390, Buca, Đzmir Turkey

More information

Junos Pulse Supported Platforms Guide

Junos Pulse Supported Platforms Guide Junos Pulse Platforms Guide 5.0R1 November 2013 Contents Introduction........................................................ 2 Documentation...................................................... 2 Hardware

More information

More than 6 years of experience in IT Projects/Networking /Systems

More than 6 years of experience in IT Projects/Networking /Systems Mohammed Riyas. V.P Email: riyas101@yahoo.com riyas101@live.com Abu Dhabi Mobile: 055 6693840 U.A.E Passport No: G9871465 Career Objective CURRICULUM VITAE Highly motivated IT Engineer with sound professional

More information

CRYPTOCard. Strong Two Factor Authentication

CRYPTOCard. Strong Two Factor Authentication CRYPTOCard Strong Two Factor Authentication CRYPTOCard Solutions Overview Cybercrime is a serious, real, and all-to-prevalent threat to networked assests. With the abundance of deployed workers requiring

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education

More information

MS 20687 Configuring Windows 8.1

MS 20687 Configuring Windows 8.1 P a g e 1 of 12 MS 20687 Configuring Windows 8.1 About this Course Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Unit 3 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D. Running head: UNIT 3 RESEARCH PROJECT 1 Unit 3 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/07/2014 UNIT 3 RESEARCH PROJECT 2

More information

2. Related Works. 3. Experimental Setup. 2.1 Vulnerability Detection Tools. 2.3 Previous work. 2.2 Literature Review. 3.1 Rangsit University Network

2. Related Works. 3. Experimental Setup. 2.1 Vulnerability Detection Tools. 2.3 Previous work. 2.2 Literature Review. 3.1 Rangsit University Network 34 IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March 2014 A Performance Evaluation of Vulnerability Detection: NetClarity Audito, Nessus, and Retina Sanon Chimmanee,

More information

Information Security Attack Tree Modeling for Enhancing Student Learning

Information Security Attack Tree Modeling for Enhancing Student Learning Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department

More information