VITA: DR. YEN-HUNG HU EXPERIENCE

Size: px
Start display at page:

Download "VITA: DR. YEN-HUNG HU EXPERIENCE"

Transcription

1 VITA: DR. YEN-HUNG HU EXPERIENCE July 2014 Present: Associate Professor of Computer Science at Norfolk State University. January 2013 June 2014: PI of the CyberCorps: SFS Hampton University Graduate Education and Training Scholarships in Information Assurance (HU GETS-IA) Program o Manage/supervise the HU GETS-IA program o Recruit/mentor qualified students o Mentor/advise students research o Conduct cybersecurity/information assurance/trustworthy computing research January 2011 June 2014: Director of the Information Assurance Center at Hampton University (IAC@HU, CAE-IAE) o Manage/supervise National Center of Academic Excellence in Information Assurance Education (CAE-IAE) at Hampton University o Offer a variety of IA courses: The IAC@HU awards the following certificates: Information Systems Security Professionals, NSTISSI No. 4011; Senior System Manager, CNSSI No o Conduct cybersecurity/information assurance/trustworthy computing research o Pursue external cybersecurity/information assurance/trustworthy computing grants May 2014 June 2014: Associate Professor of Computer Science at Hampton University. January 2005 May 2014: Assistant Professor of Computer Science at Hampton University o Teach a wide range of undergraduate/graduate computer science courses: Intro to Computers, Data Structure and Algorithms, Operating Systems, Database Management, Data Communication and Networks, Information Assurance/Security related courses, Gaming Development, and Research Topics CV of Dr. Yen-Hung Hu Page 1

2 o Conduct research on varied security areas: Computer/Network Security, Cybersecurity, Information Assurance, and Trustworthy Networking o Advise and mentor undergraduate/graduate students o Serve on several school and university committees o Serve as reviewer/reader/judge/committee member on a variety of conferences and workshops September 2004 December 2004: Post-doctor Research at GW Center for Networks Research o Conduct research on Wi-Fi and Ad-Hoc networks August 2001 August 2004: Research Assistant at George Washington University o Analyze Internet traffic o Investigate and identify Distributed Denial of Service (DDoS) attack o Design efficient algorithms to defend against Flooding-based DDoS attack July 1999 January 2001: Independent Database Consultant o Database service/management for small organizations o Web transaction service/management for small organizations January 1995 June 1999: Chemical Engineer at TASCO, Taiwan o Project Design and Management July 1993 January 1994: Engineer at BoardTek Electronic Corp., Taiwan o Production Engineer July 1991 May 1993: 2 nd Lieutenant in Taiwan Army o Platoon Leader EDUCATION : Doctor of Science (D.Sc.) in Computer Science, George Washington University, Washington DC : Ms. in computer Science, Southeastern University, Washington DC : Ms. in Applied Chemistry, National Chiao-Tung University, Taiwan : Bs. in Chemistry, National Sun Yat-Sen University, Taiwan MANAGEMENT SKILL Project management cybersecurity/information assurance/trustworthy computing research and teaching projects including 2 NSF funded projects CV of Dr. Yen-Hung Hu Page 2

3 Grant management 2 NSF grants and 2 other grants Facility management 1 dedicated cybersecurity/information Assurance lab including several workstations and 1 servers, various virtual operating systems with applications Personnel management students and faculty members participated in grants and projects Network Management 1 dedicated network located at the Information Assurance Lab including 1 router, several workstations and 1 server. Database Management Oracle Database, IBM DB2, and MySQL DBMS for teaching and research purpose. IT SKILL Hardware Intel-based computer, Sun Ultra and Blade system, Apple Mac Pro, Linksys router, CISCO router Network Systems Installation and Configuration Cat 5/6 cable, Fixed IP Network, DHCP Network, Hub, Gateway, Router, DNS, IPSec, VPN Servers Installation and Configuration Database server, Web server, FTP server, server, Samba Server Virtual Machines Installation and Configuration Oracle VirtualBox, VMWare Database Systems Oracle Database, IBM DB2, MySQL Programming Language Fortran, Pascal, C/C++/C#, Java, JavaScript, HTML/XML, AWK, TK/TCL, Perl, PHP, Unix/Linux/DOS Shell Operating system Windows, Solaris Unix, Linux, Mac OS X Productivity Software Microsoft Office 2010 including Word, Excel, PowerPoint, Access, Publisher, Visio Graphic and Animation MAYA, Microsoft Visio, Photoshop, GIMP Game Programming Microsoft Visual Studio, Microsoft XNA, Unity3D Data Analysis and Visualization Software MatLab Network Analysis and Simulation Network Simulator NS2 Cyber Security Software Wireshark, NetStumbler, NMap, MD5, CRC32, CrypTool, TrueCrypt, Metasploit IA OPERATION CV of Dr. Yen-Hung Hu Page 3

4 Risk Management/Assessment/Mitigation Penetration Test SYSTEM DEVELOPMENT System Development Life Cycle Security System Development Life Cycle SOFTWARE DEVELOPMENT Software Development Life Cycle Secure Software Development Life Cycle CERTIFICATION AND PROFESSIONAL DEVELOPMENT (Selected) Certified ORACLE 8 DBA Information Assurance Capacity Building Program - Information Networking Institute (INI), CyLab, Carnegie Mellon University, Pennsylvania, July 2005 with certificate CISCO Professor Professional Security Development, Carnegie Mellon University, Pennsylvania, July 200 with certificate NSF SFS Workshop: Faculty, Curriculum and Lab Exercise Capacity Building Partnership, Rochester Institute of Technology, New York, Aug Information Assurance Capacity Building Program San Jose State University, CA, June 2007 and June 2008, respectively with certificate ADMI Regional Faculty Workshop Cloud Computing, Elizabeth City State University, North Carolina, June 2011 with certificate NSF SFS: Workshop on Teaching Information Assurance Through Case Studies and Hands-on Experiences, University of Tennessee at Chattanooga, Tennessee, May 2012 with certificate CISSE Cyber Competitions Workshop, Mobile, Alabama, June 2013 with certificate PUBLICATION CV of Dr. Yen-Hung Hu Page 4

5 Yen-Hung Hu, "A Study on the Novel Synthesis and Characterization of High-Tc Bismuth-based Superconductors and Some Superconductor/Polymer Composites," Master Thesis, National Chiao-Tung University, Taiwan, 1991 Teng-Ming Chen and Y. H. Hu, "Preparation and Characterization of Some Superconductor/Polymer Composites," Physica C, (1991), (peerreviewed) Teng-Ming Chen and Yen-Hung Hu, "Polymeric Precursor Derived High-Tc Bismuth Superconductors," Physica C, 190 (1991), (peer-reviewed) Teng-Ming Chen and Y. H. Hu, "Formation and Characterization of a Superconductor/Polymer Composite," Material Research Bulletin, 27, 4, page , 1992 (peer-reviewed) Teng-Ming Chen and Y. H. Hu, "Polymeric Precursors for the Preparation of Bi 1.5 Pb 0.5 Sr 2 Ca 2 Cu 3 O x, " Journal of Solid State Chemistry, 97, , 1992 (peerreviewed) Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi, "Packet Filtering for Congestion Control under DoS Attacks," in Proceeding of IWIA 2004, Page 3-18, 2004 (peerreviewed) Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi, "Packet Filtering to Defend Flooding-Based DDoS Attacks," in Proceeding of IEEE Sarnoff 2004, Page 39 42, 2004 (peer-reviewed) Yen-Hung Hu, "Flooding-Based Distributed Denial-of-Service Attack and Window- Based Packet Filtering," Doctoral Dissertation, Department of Computer Science, the George Washington University, Washington DC, 2004 Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi, "A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows," in Proceeding of ICOMP 05, Page , 2005 (peer-reviewed) Yen-Hung Hu, Mira Yun, Debra Tang, Hyeong-Ah Choi, "A Study of Traffic Survivability Under Malicious Attack," in Proceeding of IEEE Sarnoff 2006, Page 1 4, 2006 (peer-reviewed) Yen-Hung Hu, Robert Willis, Hyeong-Ah Choi, "A Framework For Managing Emergent Transmissions In IP Networks," in Proceeding of ICOMP'06, Page , 2006 (peer-reviewed) CV of Dr. Yen-Hung Hu Page 5

6 Yen-Hung Hu, "Network Attacks and Countermeasures", in Proceedings of IEEE SoutheastCon 2007, Page 181, 2007 (peer-reviewed) Yen-Hung Hu, "A Filtering Algorithm for Controlling High Rate Unresponsive Flows", in Proceeding of ICOMP 07, Page , 2007 (peer-reviewed) Yen-Hung Hu, "Developing a Framework for Defending Against Network Attacks", in Proceeding of CIC 07, Page 9-15, 2007 (peer-reviewed) Yen-Hung Hu, "A Distributed Framework for Defending Against Denial of Service Attacks", in Proceedings of ICOMP 07, page 63-66, 2007 (peer-reviewed) Yen-Hung Hu, "Towards Capturing Representative Attack Patterns", Virginia Journal of Science, Page 86-87, Vol 59, No. 2, 2007 Yen-Hung Hu & Robert Willis, "A Framework for Developing Visualization Tools for Learning Cryptography Algorithm", in Proceeding of ADMI 2008 Yen-Hung Hu and Jean Muhammad, "Towards the Balance of Computer Science Curriculum", in Proceedings of the 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'08), Page , 2008 (peer-reviewed) Yen-Hung Hu, "Self Similarity and Computer Security", Virginia Journal of Science, Vol. 59, No. 2, Page 74, 2008 Yen-Hung Hu and Jean Muhammad, "A Strategy of Integrating Game Programming into Computer Science Curriculum", in Proceedings of Frontiers in Education: Computer Science and Computer Engineering (FECS'9), Page 55 60, 2009 (peerreviewed) Yen-Hung Hu and Chih-Jou Chang, Developing a Network Security Protocol Framework to Enhance Trustworthy Computing, in Proceeding of The 9th Conference on Communication Applications, Taipei, Taiwan Yen-Hung Hu, Trustworthy Computing Model, Virginia Journal of Science, Page 52-53, Vol. 62, No. 2, 2011 Yen-Hung Hu, A Fluid Based Approach For Modeling Network Traffic, Virginia Academy of Science (VAS) 2013, Virginia Tech, Blacksburg, Virginia Yen-Hung Hu, A Fluid-Based Approach for Modeling Network Activities, Journal of Electrical and Electronic Systems, 2013, in press (peer-reviewed) Yen-Hung Hu, Challenges in Building a Trustworthy Network, Journal of Electrical and Electronic Systems, 2013, in press (peer-reviewed) CV of Dr. Yen-Hung Hu Page 6

7 GRANT AWARD PI, Research and Education in Network Security Through Traffic Modeling and Monitoring, 2006 Hampton University Research Funds, $5000 Co-PI, A Cooperative Proposal for Building of Information Security Expertise and Capacity, NSF DUE , ~$250K, Oct. 1, 2007 Sept. 30, 2009, PI: Mr. Robert Willis PI, Education Improvement Program Integrating an Open Source Platform with Computer Science Curriculum, Sun Workstation equipment donation, 2009, PD: Dr. Jean Muhammad PI: NSF CyberCorps: SFS: Hampton University Graduate Education and Training Scholarship in Information Assurance (HU GETS-IA) Program, NSF DUE , ~$2.3M, Jan. 1, 2013 Dec. 31, 2017 TEACHING EXPERIENCE: COURSES THAT I HAVE TAUGHT AT HAMPTON UNIVERSITY INCLUDING UNDEERGRADUATE AND GRADUATE LEVEL CSC120 Introduction to Computers CSC252 Data Structure and Algorithm II CSC291 Basic Research Topics CSC291 Introduction to Cloud/Web Security CSC301 Operating System I CSC391 Intermediate Research Topics in Computer Science CSC395 Special Topics: Information Security CSC395 Special Topics: Cryptography CSC395 Special Topics: Gaming Development CSC395 Special Topics: Secure Software Engineering CSC410 Special Projects CSC411 Research Problems CSC483 Advanced Computer and Network Security CSC570 Database Management Systems CSC571 Concepts of Communication Networks CSC620 Operating System CSC621 Network Systems and Design CV of Dr. Yen-Hung Hu Page 7

8 CSC681 Research Seminar - Information Assurance CSC684 Thesis Research CSC689 Thesis CIA583 Secure Software Engineering CIA610 Cryptography CIA675 Computer Viruses and Malicious Software CIA 683 Advanced Computer and Network Security CIA684 Systems Security Administration, Management, and Certification CIA686 System Security for Senior Management THESIS ADVISORY COMMITTEE Spring 2006, Carol A. Armisted, Online Analytical Processing (OLAP) for More Accurate Predictive Decision Support Fall 2008, Gregory Wilson, "An Adaptive System Administration Decision Support Tool" Fall 2009, Carl Arrington, Improving Software Testing Through Code Parsing Spring 2010, Govindarajan Lalitha, Using Latent Semantic Analysis And Word Matching To Semantically Identify Elaboration Reading Strategy Fall 2010, Philip Donald, An Iterative Cluster Correction Enhancement For The Bisecting K-Means Algorithm Fall 2010, Martha Brhane, Using Latent Semantic Analysis And Word Matching To Enhance Bridging Reading Strategy Identification PROFESSIONAL AFFILIATION Association of Computing Machinery (ACM) Virginia Academic of Science (VAS) Chair of Computer Science Section in the Virginia Academic of Science, May 2013 present. Publication Committee, Virginia Academy of Science The Association of Computer/Information Sciences and Engineering Departments at Minority Institutions (ADMI) International Editorial Review Board of International Journal of Distance Education Technologies. CV of Dr. Yen-Hung Hu Page 8

9 2013 program committee of FLAIRS-26 (26th International Conference of the Florida Artificial Intelligence Research Society) Journal of Electrical & Electronics, member of Editors & Editorial Board CV of Dr. Yen-Hung Hu Page 9

VITA: DR. YEN-HUNG HU

VITA: DR. YEN-HUNG HU VITA: DR. YEN-HUNG HU EXPERIENCE 2011 Present: Director of Information Assurance Center at Hampton University (IAC@HU). http://science.hamptonu.edu/compsci/iac/ Offer a variety of IA courses. Conduct IA

More information

CURRICULUM VITAE Herbert L. Dershem

CURRICULUM VITAE Herbert L. Dershem CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue

More information

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated. Computer Science and Information Systems: Information Technology - Networking CSIT 131 Word (1) (Formerly CSIS 127) Word word processing software. Prepares individuals who are seeking to become a Microsoft

More information

Computer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems

Computer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems The field of computing enables much of the on-going revolution in information technology and communications. Its techniques, tools and problem-solving approaches have proven most powerful and effective.

More information

MH NOROUZI RÉSUMÉ AND CV

MH NOROUZI RÉSUMÉ AND CV MH NOROUZI RÉSUMÉ AND CV PERSONAL INFORMATION Last Name: NorouziMahalli First Name: MohammadHossein Date of Birth: 1988 Marital status: Single Birth Certificate ID: 9850 Languages Spoken: Native Language:

More information

LAL PAUL. To become an expert in Network Administration especially in Unix flavours.

LAL PAUL. To become an expert in Network Administration especially in Unix flavours. LAL PAUL OBJECTIVE To become an expert in Network Administration especially in Unix flavours. EXPERIENCE 1991 till date Cochin University of Science & Technology,Cochin, India System Administrator Presently

More information

CISC Research Report 04-04

CISC Research Report 04-04 Final Report for the Development of a Center for Research and Education in Information Security CISC Research Report 04-04 Fall 2004 IIIA Institute for Infrastructure & Information Assurance James Madison

More information

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

CURRICULUM VITAE. September, 2015

CURRICULUM VITAE. September, 2015 CURRICULUM VITAE September, 2015 C1. Personal Information Asaad AbdulRahman Nayyef Alani Department of Computer Science,, Sultan Qaboos University, P.O. Box 36, Al-Khoudh 123, Muscat, Sultanate of Oman,

More information

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011 ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review

More information

A full time position in software design and development that would enhance my technical skills.

A full time position in software design and development that would enhance my technical skills. SONA MOHAN CHANDRA MOHAN, M.S., B.Sc. 531 Sunset Ave, Apt. 4, Manhattan, KS-66502. E-mail : sonamoha@ksu.edu Phone : 785-539 9983 Website : http://www.cis.ksu.edu/~sonamoha OBJECTIVE: A full time position

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

Terry Ann Morris, Ed.D. http://terrymorris.net terrymorris99@gmail.com

Terry Ann Morris, Ed.D. http://terrymorris.net terrymorris99@gmail.com OBJECTIVE: Adjunct Faculty Online EMPLOYMENT HISTORY 1998 Present Full-Time Faculty Professor, Tenured Web Development Program, Computer Information Systems Department William Rainey, Palatine, IL New

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Course Descriptions. preparation.

Course Descriptions. preparation. Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Muhammad K. Ghanbari, Computer Science dept. Muhammad.ghanbari@aamu.edu

Muhammad K. Ghanbari, Computer Science dept. Muhammad.ghanbari@aamu.edu Name: Email: Muhammad K. Ghanbari, Computer Science dept. Muhammad.ghanbari@aamu.edu Dr. Ghanbari has more than 34 years of programming and teaching experiences in Computer Science. He has taught all courses

More information

Company Background. Table of Contents: Company Background FPDS Services Price Matrix Labor Category Descriptions Services Provided

Company Background. Table of Contents: Company Background FPDS Services Price Matrix Labor Category Descriptions Services Provided Table of Contents: GSA IT Schedule 70 Contract #GS-35F-0666K 11600 Sunrise Valley Dr. Suite 380 Reston, VA 20191 Voice: (703) 766-4301 FAX: (703) 766-4302 info@americanconsultants.com Company Background

More information

2. What are your learning objectives or outcomes associated with each student learning goal?

2. What are your learning objectives or outcomes associated with each student learning goal? Graduate Degree Program Assessment Plan Cover Sheet (rev. 07): UNIVERSITY OF ARKANSAS AT LITTLE ROCK Plan No. Degree Program: Master of Science In Computer Science (CPSM) Department College:Department

More information

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 ) Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: manghui.tu@purduecal.edu

More information

IS Careers. MIS 4133 Software Systems

IS Careers. MIS 4133 Software Systems IS Careers MIS 4133 Software Systems Outline CS and MIS Salaries Core competencies Hot technical skills IS job titles Employment outlook Careers in CS and MIS Computer Science Focuses on the development

More information

New Program Development on Networking Information Technology

New Program Development on Networking Information Technology atmae white paper July 2014 New Program Development on Networking Information Technology Developing the 21st Century Workforce Dr. Xiaobing Hou Dr. Karen Tracey Dr. Shuju Wu Central Connecticut State University

More information

Specialized Training Calendar May August 2015. Training for Professionals by Professionals

Specialized Training Calendar May August 2015. Training for Professionals by Professionals Specialized Training Calendar May August 2015 Training for Professionals by Professionals Course Titles Days Fees Training Dates NETWORKING / OPERATING SYSTEMS / SERVERS Cisco Certified Network Administrator

More information

Information Assurance Curricula and Certifications

Information Assurance Curricula and Certifications Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been

More information

Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION

Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION Ming-Hsing Chiu Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 Mandeville, LA 70471 e-mail: mchiu@selu.edu EDUCATION Ph.D. in Computer Science, University of Central Florida, May 99. Dissertation

More information

GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com

GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com EDUCATION: Ph.D. Computer Science, The George Washington University, Washington, DC, 2011 Research interests include human-computer

More information

SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008

SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008 SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008 HOME ADDRESS: E-MAIL 21 Oak Lane 62707 Home (217) 529-7980 Cell (217) 816-9667 rothac@excite.com and aroth1@uis.edu EMPLOYMENT

More information

Additional Software and Hardware Requirements

Additional Software and Hardware Requirements ONLINE REGISTRAR S OFFICE 550 West Van Buren, 7th Floor Chicago, IL 60607 Tel: 312.777.6333 Additional Software and Hardware Requirements In the Kaplan University online learning environment, computer

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Computer Information Systems Degrees and Certificates

Computer Information Systems Degrees and Certificates Computer Infmation Systems Degrees and s Degrees: Associate of Applied Science Cisco Netwk Associate Computer Suppt Technician Game Arts and Development Microsoft Database Administrat (MCITP) Microsoft

More information

Cyber Innovation and Research Consortium

Cyber Innovation and Research Consortium Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

ADDITIONAL SOFTWARE AND HARDWARE REQUIREMENTS

ADDITIONAL SOFTWARE AND HARDWARE REQUIREMENTS ONLINE REGISTRAR S OFFICE 550 West Van Buren, 7th Floor Chicago, IL 60607 Tel: 312.777.6333 ADDITIONAL SOFTWARE AND HARDWARE REQUIREMENTS In the Kaplan University online learning environment, computer

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013 Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University

More information

DATA SUPPORT SPECIALIST CERTIFICATE PRODUCTIVITY SOFTWARE CERTIFICATE

DATA SUPPORT SPECIALIST CERTIFICATE PRODUCTIVITY SOFTWARE CERTIFICATE Requirements DATA SUPPORT SPECIALIST CERTIFICATE Required s (C25500A) 18 BAS 120 3 Business Analytics I CTI 110 3 Web, Programming and DB Foundations DBA 110 3 Database Concepts DBA 120 3 Database Programming

More information

Cyber Security at NSU

Cyber Security at NSU Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began

More information

OMICS Group. Contact us at: contact.omics@omicsonline.org

OMICS Group. Contact us at: contact.omics@omicsonline.org OMICS Group OMICS Group International through its Open Access Initiative is committed to make genuine and reliable contributions to the scientific community. OMICS Group hosts over 400 leading-edge peer

More information

DATA SUPPORT SPECIALIST CERTIFICATE

DATA SUPPORT SPECIALIST CERTIFICATE Requirements DATA SUPPORT SPECIALIST CERTIFICATE Required s (C25500A) 18 BAS 110 3 Business Analytics I CTI 110 3 Web, Programming and DB Foundations DBA 110 3 Database Concepts DBA 120 3 Database Programming

More information

2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION 2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

IT professionals. The skills. need to succeed. Technical IT Training. At a glance

IT professionals. The skills. need to succeed. Technical IT Training. At a glance The skills IT professionals need to succeed Technical IT Training Technology is only as effective as the expertise of the people installing, operating and using it. Developing the right skills is vital

More information

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective.

CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective. CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective Methodology: The Computer Science Teachers Association (CSTA), in

More information

Information Security Attack Tree Modeling for Enhancing Student Learning

Information Security Attack Tree Modeling for Enhancing Student Learning Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008 Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit

More information

27 Prescott Street #2 Somerville, ma 02143. Massachusetts College of Art and Design Boston, ma 2014

27 Prescott Street #2 Somerville, ma 02143. Massachusetts College of Art and Design Boston, ma 2014 EDUCATION DEGREES mfa, Design Massachusetts College of Art and Design Boston, ma 2014 ba, English and American Literature Brandeis University Waltham, ma 2000 CERTIFICATES Postbaccalaureate, Design Massachusetts

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western

More information

Computer and Information Sciences

Computer and Information Sciences Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,

More information

A Model of Undergraduate Computer Networking Education

A Model of Undergraduate Computer Networking Education Session 3248 A Model of Undergraduate Computer Networking Education Paul I-Hai Lin, Hal Broberg Electrical and Computer Engineering Technology Department Indiana University-Purdue University Fort Wayne

More information

M.S. in Computer Science 2009-2011

M.S. in Computer Science 2009-2011 Karim O. Elish Assistant Professor Department of Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 kelish@purdue.edu http://people.cs.vt.edu/~kelish/ RESEARCH INTERESTS Software

More information

Cybersecurity High School and Beyond

Cybersecurity High School and Beyond Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics

More information

Diploma in Computer Science

Diploma in Computer Science SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer

More information

A full time position in database design and application/web development that would enhance my technical skills.

A full time position in database design and application/web development that would enhance my technical skills. JEYENDRA BALASUBRAMANIAN, M.S., M.B.A., B-Tech., HDSE. 531 Sunset Ave, Apt 4, Manhattan, KS 66502. E-mail : jeyendra@ksu.edu Website : http://www.cis.ksu.edu/~jeyendra/resume OBJECTIVE: A full time position

More information

Course Descriptions. CS 101 Intro to Computer Science

Course Descriptions. CS 101 Intro to Computer Science Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

Finding A malicious Network Traffic

Finding A malicious Network Traffic qwertyuiopasdfghjklzxcvbnmqw ertyuiopasdfghjklzxcvbnmqwert yuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopa Network Discovery sdfghjklzxcvbnmqwertyuiopasdf ARST 5100 Archives and Technology

More information

Curriculum Vitae. Zhenchang Xing

Curriculum Vitae. Zhenchang Xing Curriculum Vitae Zhenchang Xing Computing Science Department University of Alberta, Edmonton, Alberta T6G 2E8 Phone: (780) 433 0808 E-mail: xing@cs.ualberta.ca http://www.cs.ualberta.ca/~xing EDUCATION

More information

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.

Someone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee. New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone

More information

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus

http://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education

More information

Clinton Daniel Office: CIS 2008 Phone: 813-974-6765 Email: cedanie2@usf.edu

Clinton Daniel Office: CIS 2008 Phone: 813-974-6765 Email: cedanie2@usf.edu 1 Clinton Daniel Office: CIS 2008 Phone: 813-974-6765 Email: cedanie2@usf.edu WORK EXPERIENCE University Of South Florida Tampa, Florida US 8/2014 Present Full Time Instructor Information Systems Decision

More information

Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015

Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015 Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015 Tripwire Evolution 18+ Years of Innovation 1997 Tripwire File System Monitoring from open source

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

Dynamic Honeypot Construction

Dynamic Honeypot Construction Dynamic Honeypot Construction 2nd Annual Alaska Information Assurance Workshop Christopher Hecker U. of Alaska, Fairbanks 9-5-2006 Presentation l Brief Introduction l Project Overview l Future Work l References

More information

Dr. Rob Donald - Curriculum Vitae. Email: rob@statsresearch.co.uk, Web: http://www.statsresearch.co.uk Mob: 07780 650 910

Dr. Rob Donald - Curriculum Vitae. Email: rob@statsresearch.co.uk, Web: http://www.statsresearch.co.uk Mob: 07780 650 910 Dr. Rob Donald - Curriculum Vitae Email: rob@statsresearch.co.uk, Web: http://www.statsresearch.co.uk Mob: 07780 650 910 Profile Data Scientist, Systems and Data Analyst In my current role I am a senior

More information

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS

Montgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS TECHNOLOGY PROGRAMS PROGRAM PAGE A+... 4 CISCO NETWORKING ACADEMY... 2 CITRIX IT ACADEMY... 3 COMPUTER AIDED DRAFTING... 8 COMPUTERIZED ACCOUNTING... 6 COMPUTERS... 5 CYBER SECURITY... 3 MICROSOFT ADMINISTRATION...

More information

DESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION

DESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION DESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION Vikram Anantapadmanabhan, Nasir Memon, Phyllis Frankl and Gleb Naumovich Polytechnic University Brooklyn, NY 11201. vikram@isis.poly.edu, memon,frank,gleb@poly.edu

More information

Michigan Technological University. Development of System Administration & Network Security Curriculum

Michigan Technological University. Development of System Administration & Network Security Curriculum Michigan Technological University Development of System Administration & Network Security Curriculum Prof. Yu Cai Prof. Guy Hembroff March 24, 2006 Computer Network & System Administration Program The

More information

CAROL KRAKER STOCKMAN, Ph.D. 5033 Castleman Street, Pittsburgh, Pennsylvania 15232-2106 412.980.2800 / ckstockman@gmail.com

CAROL KRAKER STOCKMAN, Ph.D. 5033 Castleman Street, Pittsburgh, Pennsylvania 15232-2106 412.980.2800 / ckstockman@gmail.com CAROL KRAKER STOCKMAN, Ph.D. 5033 Castleman Street, Pittsburgh, Pennsylvania 15232-2106 412.980.2800 / ckstockman@gmail.com CONSULTANT and APPLIED BEHAVIORAL HEALTH ECONOMIST, providing sound and well-crafted

More information

Computer Network Engineering

Computer Network Engineering 208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of

More information

David Dischiave Curriculum Vita

David Dischiave Curriculum Vita Professional Experience David Dischiave Curriculum Vita 2001 - Present Syracuse University, Syracuse, New York Associate Professor, School of Information Studies Director, Global Enterprise Technology

More information

CAREER OPPORTUNITIES

CAREER OPPORTUNITIES CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the

More information

Connecting PTE to Careers in Idaho

Connecting PTE to Careers in Idaho 1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University

More information

Degree and Certificate Programs Computer Science &

Degree and Certificate Programs Computer Science & Computer Science & Information Systems A.S. Degrees and Certificates of Achievement Business Computer Applications Computer Networking Computer Programming Programming for the Internet Scientific Programming

More information

More than 6 years of experience in IT Projects/Networking /Systems

More than 6 years of experience in IT Projects/Networking /Systems Mohammed Riyas. V.P Email: riyas101@yahoo.com riyas101@live.com Abu Dhabi Mobile: 055 6693840 U.A.E Passport No: G9871465 Career Objective CURRICULUM VITAE Highly motivated IT Engineer with sound professional

More information

Carl Burch. 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911. cburch@cburch.com http://www.cburch.com/ Education May 00

Carl Burch. 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911. cburch@cburch.com http://www.cburch.com/ Education May 00 Carl Burch 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911 cburch@cburch.com http://www.cburch.com/ Education May 00 May 98 May 95 Teaching Fall 04 present Fall 00 Spring 04 Summers 97 02 Spring

More information

CURRICULUM VITAE EDUCATION AND TRAINING

CURRICULUM VITAE EDUCATION AND TRAINING Last Revised: February 21, 2013 CURRICULUM VITAE NAME: CITIZENSHIP: BUSINESS ADDRESS: Robert Richard Calabrisi United States of America Veteran Health Affairs University Drive Pittsburgh, PA 15240 Work

More information

Call us today to help you (888) 534-0245 LAWSON CERTIFIED CONSULTANTS

Call us today to help you (888) 534-0245 LAWSON CERTIFIED CONSULTANTS Call us today to help you (888) 534-0245 LAWSON CERTIFIED CONSULTANTS Senior Lawson Financial Consultant Professional Summary: Experienced business application consultant and Project Manager with large-scale

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

Las Vegas, NV ~ Phone: 702-205-7713 ~ E-mail: GVIPlimo@gmail.com

Las Vegas, NV ~ Phone: 702-205-7713 ~ E-mail: GVIPlimo@gmail.com George Busegeano Las Vegas, NV ~ Phone: 702-205-7713 ~ E-mail: GVIPlimo@gmail.com Professional Profile and Areas of Expertise; Offering the following: Chief Executive Officer/CEO - General Management/GM.

More information

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications

PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications : CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive

More information

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate

More information

VITA W. Weyman Whitlock, Jr. Instructor Information Systems and Decision Sciences College of Business University of South Florida

VITA W. Weyman Whitlock, Jr. Instructor Information Systems and Decision Sciences College of Business University of South Florida EDUCATION: A.B.D. VITA W. Weyman Whitlock, Jr. Instructor Information Systems and Decision Sciences College of Business University of South Florida University of South Florida College of Business Administration

More information

CV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3.

CV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3. CV: AGGELOS HANOU Software Developer (desktop & web app.) Personal information 2 Work experience 3 Education and training 3 Languages 3 Knowledge 4 Additional information 7 Driving license 7 Personal information

More information

Virtualization Journey Stages

Virtualization Journey Stages Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey

More information

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs

SOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:

More information

Computer Security & Information Assurance MS Program

Computer Security & Information Assurance MS Program Computer Security & Information Assurance MS Program in a Nutshell 2005-2006 Graduate Security and Information Assurance Program in a Nutshell Department of Computer Science Rochester Institute of Technology

More information

CURRICULUM VITAE. TEL: 0244994067 EMAIL: vsoft09@gmail.com ABOROGU, FOLI VITUS

CURRICULUM VITAE. TEL: 0244994067 EMAIL: vsoft09@gmail.com ABOROGU, FOLI VITUS CURRICULUM VITAE TEL: 0244994067 EMAIL: vsoft09@gmail.com ABOROGU, FOLI VITUS PERSONAL DETAILS Profile: Gender : Male Nationality : Ghanaian Marital Status : Married DOB : 1981 Vitus Foli Aborogu is the

More information

Security Intelligence Services. Cybersecurity training. www.kaspersky.com

Security Intelligence Services. Cybersecurity training. www.kaspersky.com Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative

More information

YUN-CHIA (ANDERSON) YAN, PH.D. Assistant Professor of Accounting EDUCATION

YUN-CHIA (ANDERSON) YAN, PH.D. Assistant Professor of Accounting EDUCATION YUN-CHIA (ANDERSON) YAN, PH.D. Assistant Professor of Accounting Department of Accounting & Management Information Systems University of Texas at Brownsville CURRICULUM VITAE EDUCATION Doctor of Philosophy

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

Computer Science Course Descriptions Page 1

Computer Science Course Descriptions Page 1 CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,

More information

Analysis of IP Spoofed DDoS Attack by Cryptography

Analysis of IP Spoofed DDoS Attack by Cryptography www..org 13 Analysis of IP Spoofed DDoS Attack by Cryptography Dalip Kumar Research Scholar, Deptt. of Computer Science Engineering, Institute of Engineering and Technology, Alwar, India. Abstract Today,

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

COMPUTER SCIENCE & INFORMATION TECHNOLOGY

COMPUTER SCIENCE & INFORMATION TECHNOLOGY ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer

More information