VITA: DR. YEN-HUNG HU EXPERIENCE
|
|
- Theodore Strickland
- 8 years ago
- Views:
Transcription
1 VITA: DR. YEN-HUNG HU EXPERIENCE July 2014 Present: Associate Professor of Computer Science at Norfolk State University. January 2013 June 2014: PI of the CyberCorps: SFS Hampton University Graduate Education and Training Scholarships in Information Assurance (HU GETS-IA) Program o Manage/supervise the HU GETS-IA program o Recruit/mentor qualified students o Mentor/advise students research o Conduct cybersecurity/information assurance/trustworthy computing research January 2011 June 2014: Director of the Information Assurance Center at Hampton University (IAC@HU, CAE-IAE) o Manage/supervise National Center of Academic Excellence in Information Assurance Education (CAE-IAE) at Hampton University o Offer a variety of IA courses: The IAC@HU awards the following certificates: Information Systems Security Professionals, NSTISSI No. 4011; Senior System Manager, CNSSI No o Conduct cybersecurity/information assurance/trustworthy computing research o Pursue external cybersecurity/information assurance/trustworthy computing grants May 2014 June 2014: Associate Professor of Computer Science at Hampton University. January 2005 May 2014: Assistant Professor of Computer Science at Hampton University o Teach a wide range of undergraduate/graduate computer science courses: Intro to Computers, Data Structure and Algorithms, Operating Systems, Database Management, Data Communication and Networks, Information Assurance/Security related courses, Gaming Development, and Research Topics CV of Dr. Yen-Hung Hu Page 1
2 o Conduct research on varied security areas: Computer/Network Security, Cybersecurity, Information Assurance, and Trustworthy Networking o Advise and mentor undergraduate/graduate students o Serve on several school and university committees o Serve as reviewer/reader/judge/committee member on a variety of conferences and workshops September 2004 December 2004: Post-doctor Research at GW Center for Networks Research o Conduct research on Wi-Fi and Ad-Hoc networks August 2001 August 2004: Research Assistant at George Washington University o Analyze Internet traffic o Investigate and identify Distributed Denial of Service (DDoS) attack o Design efficient algorithms to defend against Flooding-based DDoS attack July 1999 January 2001: Independent Database Consultant o Database service/management for small organizations o Web transaction service/management for small organizations January 1995 June 1999: Chemical Engineer at TASCO, Taiwan o Project Design and Management July 1993 January 1994: Engineer at BoardTek Electronic Corp., Taiwan o Production Engineer July 1991 May 1993: 2 nd Lieutenant in Taiwan Army o Platoon Leader EDUCATION : Doctor of Science (D.Sc.) in Computer Science, George Washington University, Washington DC : Ms. in computer Science, Southeastern University, Washington DC : Ms. in Applied Chemistry, National Chiao-Tung University, Taiwan : Bs. in Chemistry, National Sun Yat-Sen University, Taiwan MANAGEMENT SKILL Project management cybersecurity/information assurance/trustworthy computing research and teaching projects including 2 NSF funded projects CV of Dr. Yen-Hung Hu Page 2
3 Grant management 2 NSF grants and 2 other grants Facility management 1 dedicated cybersecurity/information Assurance lab including several workstations and 1 servers, various virtual operating systems with applications Personnel management students and faculty members participated in grants and projects Network Management 1 dedicated network located at the Information Assurance Lab including 1 router, several workstations and 1 server. Database Management Oracle Database, IBM DB2, and MySQL DBMS for teaching and research purpose. IT SKILL Hardware Intel-based computer, Sun Ultra and Blade system, Apple Mac Pro, Linksys router, CISCO router Network Systems Installation and Configuration Cat 5/6 cable, Fixed IP Network, DHCP Network, Hub, Gateway, Router, DNS, IPSec, VPN Servers Installation and Configuration Database server, Web server, FTP server, server, Samba Server Virtual Machines Installation and Configuration Oracle VirtualBox, VMWare Database Systems Oracle Database, IBM DB2, MySQL Programming Language Fortran, Pascal, C/C++/C#, Java, JavaScript, HTML/XML, AWK, TK/TCL, Perl, PHP, Unix/Linux/DOS Shell Operating system Windows, Solaris Unix, Linux, Mac OS X Productivity Software Microsoft Office 2010 including Word, Excel, PowerPoint, Access, Publisher, Visio Graphic and Animation MAYA, Microsoft Visio, Photoshop, GIMP Game Programming Microsoft Visual Studio, Microsoft XNA, Unity3D Data Analysis and Visualization Software MatLab Network Analysis and Simulation Network Simulator NS2 Cyber Security Software Wireshark, NetStumbler, NMap, MD5, CRC32, CrypTool, TrueCrypt, Metasploit IA OPERATION CV of Dr. Yen-Hung Hu Page 3
4 Risk Management/Assessment/Mitigation Penetration Test SYSTEM DEVELOPMENT System Development Life Cycle Security System Development Life Cycle SOFTWARE DEVELOPMENT Software Development Life Cycle Secure Software Development Life Cycle CERTIFICATION AND PROFESSIONAL DEVELOPMENT (Selected) Certified ORACLE 8 DBA Information Assurance Capacity Building Program - Information Networking Institute (INI), CyLab, Carnegie Mellon University, Pennsylvania, July 2005 with certificate CISCO Professor Professional Security Development, Carnegie Mellon University, Pennsylvania, July 200 with certificate NSF SFS Workshop: Faculty, Curriculum and Lab Exercise Capacity Building Partnership, Rochester Institute of Technology, New York, Aug Information Assurance Capacity Building Program San Jose State University, CA, June 2007 and June 2008, respectively with certificate ADMI Regional Faculty Workshop Cloud Computing, Elizabeth City State University, North Carolina, June 2011 with certificate NSF SFS: Workshop on Teaching Information Assurance Through Case Studies and Hands-on Experiences, University of Tennessee at Chattanooga, Tennessee, May 2012 with certificate CISSE Cyber Competitions Workshop, Mobile, Alabama, June 2013 with certificate PUBLICATION CV of Dr. Yen-Hung Hu Page 4
5 Yen-Hung Hu, "A Study on the Novel Synthesis and Characterization of High-Tc Bismuth-based Superconductors and Some Superconductor/Polymer Composites," Master Thesis, National Chiao-Tung University, Taiwan, 1991 Teng-Ming Chen and Y. H. Hu, "Preparation and Characterization of Some Superconductor/Polymer Composites," Physica C, (1991), (peerreviewed) Teng-Ming Chen and Yen-Hung Hu, "Polymeric Precursor Derived High-Tc Bismuth Superconductors," Physica C, 190 (1991), (peer-reviewed) Teng-Ming Chen and Y. H. Hu, "Formation and Characterization of a Superconductor/Polymer Composite," Material Research Bulletin, 27, 4, page , 1992 (peer-reviewed) Teng-Ming Chen and Y. H. Hu, "Polymeric Precursors for the Preparation of Bi 1.5 Pb 0.5 Sr 2 Ca 2 Cu 3 O x, " Journal of Solid State Chemistry, 97, , 1992 (peerreviewed) Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi, "Packet Filtering for Congestion Control under DoS Attacks," in Proceeding of IWIA 2004, Page 3-18, 2004 (peerreviewed) Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi, "Packet Filtering to Defend Flooding-Based DDoS Attacks," in Proceeding of IEEE Sarnoff 2004, Page 39 42, 2004 (peer-reviewed) Yen-Hung Hu, "Flooding-Based Distributed Denial-of-Service Attack and Window- Based Packet Filtering," Doctoral Dissertation, Department of Computer Science, the George Washington University, Washington DC, 2004 Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi, "A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows," in Proceeding of ICOMP 05, Page , 2005 (peer-reviewed) Yen-Hung Hu, Mira Yun, Debra Tang, Hyeong-Ah Choi, "A Study of Traffic Survivability Under Malicious Attack," in Proceeding of IEEE Sarnoff 2006, Page 1 4, 2006 (peer-reviewed) Yen-Hung Hu, Robert Willis, Hyeong-Ah Choi, "A Framework For Managing Emergent Transmissions In IP Networks," in Proceeding of ICOMP'06, Page , 2006 (peer-reviewed) CV of Dr. Yen-Hung Hu Page 5
6 Yen-Hung Hu, "Network Attacks and Countermeasures", in Proceedings of IEEE SoutheastCon 2007, Page 181, 2007 (peer-reviewed) Yen-Hung Hu, "A Filtering Algorithm for Controlling High Rate Unresponsive Flows", in Proceeding of ICOMP 07, Page , 2007 (peer-reviewed) Yen-Hung Hu, "Developing a Framework for Defending Against Network Attacks", in Proceeding of CIC 07, Page 9-15, 2007 (peer-reviewed) Yen-Hung Hu, "A Distributed Framework for Defending Against Denial of Service Attacks", in Proceedings of ICOMP 07, page 63-66, 2007 (peer-reviewed) Yen-Hung Hu, "Towards Capturing Representative Attack Patterns", Virginia Journal of Science, Page 86-87, Vol 59, No. 2, 2007 Yen-Hung Hu & Robert Willis, "A Framework for Developing Visualization Tools for Learning Cryptography Algorithm", in Proceeding of ADMI 2008 Yen-Hung Hu and Jean Muhammad, "Towards the Balance of Computer Science Curriculum", in Proceedings of the 2008 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'08), Page , 2008 (peer-reviewed) Yen-Hung Hu, "Self Similarity and Computer Security", Virginia Journal of Science, Vol. 59, No. 2, Page 74, 2008 Yen-Hung Hu and Jean Muhammad, "A Strategy of Integrating Game Programming into Computer Science Curriculum", in Proceedings of Frontiers in Education: Computer Science and Computer Engineering (FECS'9), Page 55 60, 2009 (peerreviewed) Yen-Hung Hu and Chih-Jou Chang, Developing a Network Security Protocol Framework to Enhance Trustworthy Computing, in Proceeding of The 9th Conference on Communication Applications, Taipei, Taiwan Yen-Hung Hu, Trustworthy Computing Model, Virginia Journal of Science, Page 52-53, Vol. 62, No. 2, 2011 Yen-Hung Hu, A Fluid Based Approach For Modeling Network Traffic, Virginia Academy of Science (VAS) 2013, Virginia Tech, Blacksburg, Virginia Yen-Hung Hu, A Fluid-Based Approach for Modeling Network Activities, Journal of Electrical and Electronic Systems, 2013, in press (peer-reviewed) Yen-Hung Hu, Challenges in Building a Trustworthy Network, Journal of Electrical and Electronic Systems, 2013, in press (peer-reviewed) CV of Dr. Yen-Hung Hu Page 6
7 GRANT AWARD PI, Research and Education in Network Security Through Traffic Modeling and Monitoring, 2006 Hampton University Research Funds, $5000 Co-PI, A Cooperative Proposal for Building of Information Security Expertise and Capacity, NSF DUE , ~$250K, Oct. 1, 2007 Sept. 30, 2009, PI: Mr. Robert Willis PI, Education Improvement Program Integrating an Open Source Platform with Computer Science Curriculum, Sun Workstation equipment donation, 2009, PD: Dr. Jean Muhammad PI: NSF CyberCorps: SFS: Hampton University Graduate Education and Training Scholarship in Information Assurance (HU GETS-IA) Program, NSF DUE , ~$2.3M, Jan. 1, 2013 Dec. 31, 2017 TEACHING EXPERIENCE: COURSES THAT I HAVE TAUGHT AT HAMPTON UNIVERSITY INCLUDING UNDEERGRADUATE AND GRADUATE LEVEL CSC120 Introduction to Computers CSC252 Data Structure and Algorithm II CSC291 Basic Research Topics CSC291 Introduction to Cloud/Web Security CSC301 Operating System I CSC391 Intermediate Research Topics in Computer Science CSC395 Special Topics: Information Security CSC395 Special Topics: Cryptography CSC395 Special Topics: Gaming Development CSC395 Special Topics: Secure Software Engineering CSC410 Special Projects CSC411 Research Problems CSC483 Advanced Computer and Network Security CSC570 Database Management Systems CSC571 Concepts of Communication Networks CSC620 Operating System CSC621 Network Systems and Design CV of Dr. Yen-Hung Hu Page 7
8 CSC681 Research Seminar - Information Assurance CSC684 Thesis Research CSC689 Thesis CIA583 Secure Software Engineering CIA610 Cryptography CIA675 Computer Viruses and Malicious Software CIA 683 Advanced Computer and Network Security CIA684 Systems Security Administration, Management, and Certification CIA686 System Security for Senior Management THESIS ADVISORY COMMITTEE Spring 2006, Carol A. Armisted, Online Analytical Processing (OLAP) for More Accurate Predictive Decision Support Fall 2008, Gregory Wilson, "An Adaptive System Administration Decision Support Tool" Fall 2009, Carl Arrington, Improving Software Testing Through Code Parsing Spring 2010, Govindarajan Lalitha, Using Latent Semantic Analysis And Word Matching To Semantically Identify Elaboration Reading Strategy Fall 2010, Philip Donald, An Iterative Cluster Correction Enhancement For The Bisecting K-Means Algorithm Fall 2010, Martha Brhane, Using Latent Semantic Analysis And Word Matching To Enhance Bridging Reading Strategy Identification PROFESSIONAL AFFILIATION Association of Computing Machinery (ACM) Virginia Academic of Science (VAS) Chair of Computer Science Section in the Virginia Academic of Science, May 2013 present. Publication Committee, Virginia Academy of Science The Association of Computer/Information Sciences and Engineering Departments at Minority Institutions (ADMI) International Editorial Review Board of International Journal of Distance Education Technologies. CV of Dr. Yen-Hung Hu Page 8
9 2013 program committee of FLAIRS-26 (26th International Conference of the Florida Artificial Intelligence Research Society) Journal of Electrical & Electronics, member of Editors & Editorial Board CV of Dr. Yen-Hung Hu Page 9
VITA: DR. YEN-HUNG HU
VITA: DR. YEN-HUNG HU EXPERIENCE 2011 Present: Director of Information Assurance Center at Hampton University (IAC@HU). http://science.hamptonu.edu/compsci/iac/ Offer a variety of IA courses. Conduct IA
More informationCURRICULUM VITAE Herbert L. Dershem
CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue
More information138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.
Computer Science and Information Systems: Information Technology - Networking CSIT 131 Word (1) (Formerly CSIS 127) Word word processing software. Prepares individuals who are seeking to become a Microsoft
More informationComputer Science. B.S. in Computer & Information Science. B.S. in Computer Information Systems
The field of computing enables much of the on-going revolution in information technology and communications. Its techniques, tools and problem-solving approaches have proven most powerful and effective.
More informationMH NOROUZI RÉSUMÉ AND CV
MH NOROUZI RÉSUMÉ AND CV PERSONAL INFORMATION Last Name: NorouziMahalli First Name: MohammadHossein Date of Birth: 1988 Marital status: Single Birth Certificate ID: 9850 Languages Spoken: Native Language:
More informationLAL PAUL. To become an expert in Network Administration especially in Unix flavours.
LAL PAUL OBJECTIVE To become an expert in Network Administration especially in Unix flavours. EXPERIENCE 1991 till date Cochin University of Science & Technology,Cochin, India System Administrator Presently
More informationCISC Research Report 04-04
Final Report for the Development of a Center for Research and Education in Information Security CISC Research Report 04-04 Fall 2004 IIIA Institute for Infrastructure & Information Assurance James Madison
More informationRESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics
FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center
More informationFBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
More informationCURRICULUM VITAE. September, 2015
CURRICULUM VITAE September, 2015 C1. Personal Information Asaad AbdulRahman Nayyef Alani Department of Computer Science,, Sultan Qaboos University, P.O. Box 36, Al-Khoudh 123, Muscat, Sultanate of Oman,
More informationACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
More informationA full time position in software design and development that would enhance my technical skills.
SONA MOHAN CHANDRA MOHAN, M.S., B.Sc. 531 Sunset Ave, Apt. 4, Manhattan, KS-66502. E-mail : sonamoha@ksu.edu Phone : 785-539 9983 Website : http://www.cis.ksu.edu/~sonamoha OBJECTIVE: A full time position
More informationTrack 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
More informationTerry Ann Morris, Ed.D. http://terrymorris.net terrymorris99@gmail.com
OBJECTIVE: Adjunct Faculty Online EMPLOYMENT HISTORY 1998 Present Full-Time Faculty Professor, Tenured Web Development Program, Computer Information Systems Department William Rainey, Palatine, IL New
More informationCisco Network Specialist CCNA
Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationCourse Descriptions. preparation.
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
More informationMuhammad K. Ghanbari, Computer Science dept. Muhammad.ghanbari@aamu.edu
Name: Email: Muhammad K. Ghanbari, Computer Science dept. Muhammad.ghanbari@aamu.edu Dr. Ghanbari has more than 34 years of programming and teaching experiences in Computer Science. He has taught all courses
More informationCompany Background. Table of Contents: Company Background FPDS Services Price Matrix Labor Category Descriptions Services Provided
Table of Contents: GSA IT Schedule 70 Contract #GS-35F-0666K 11600 Sunrise Valley Dr. Suite 380 Reston, VA 20191 Voice: (703) 766-4301 FAX: (703) 766-4302 info@americanconsultants.com Company Background
More information2. What are your learning objectives or outcomes associated with each student learning goal?
Graduate Degree Program Assessment Plan Cover Sheet (rev. 07): UNIVERSITY OF ARKANSAS AT LITTLE ROCK Plan No. Degree Program: Master of Science In Computer Science (CPSM) Department College:Department
More informationAPPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c
APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationCurriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: manghui.tu@purduecal.edu
More informationIS Careers. MIS 4133 Software Systems
IS Careers MIS 4133 Software Systems Outline CS and MIS Salaries Core competencies Hot technical skills IS job titles Employment outlook Careers in CS and MIS Computer Science Focuses on the development
More informationNew Program Development on Networking Information Technology
atmae white paper July 2014 New Program Development on Networking Information Technology Developing the 21st Century Workforce Dr. Xiaobing Hou Dr. Karen Tracey Dr. Shuju Wu Central Connecticut State University
More informationSpecialized Training Calendar May August 2015. Training for Professionals by Professionals
Specialized Training Calendar May August 2015 Training for Professionals by Professionals Course Titles Days Fees Training Dates NETWORKING / OPERATING SYSTEMS / SERVERS Cisco Certified Network Administrator
More informationInformation Assurance Curricula and Certifications
Information Assurance Curricula and Certifications Abstract Victor Piotrowski Department of Mathematics and Computer Science University of Wisconsin-Superior vpiotrow@uwsuper.edu Although there have been
More informationMing-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION
Ming-Hsing Chiu Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 Mandeville, LA 70471 e-mail: mchiu@selu.edu EDUCATION Ph.D. in Computer Science, University of Central Florida, May 99. Dissertation
More informationGLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com
GLORIA WASHINGTON, Ph.D. CONTACT: 202-640-3630 Email: gjwashi@gmail.com EDUCATION: Ph.D. Computer Science, The George Washington University, Washington, DC, 2011 Research interests include human-computer
More informationSECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008
SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008 HOME ADDRESS: E-MAIL 21 Oak Lane 62707 Home (217) 529-7980 Cell (217) 816-9667 rothac@excite.com and aroth1@uis.edu EMPLOYMENT
More informationAdditional Software and Hardware Requirements
ONLINE REGISTRAR S OFFICE 550 West Van Buren, 7th Floor Chicago, IL 60607 Tel: 312.777.6333 Additional Software and Hardware Requirements In the Kaplan University online learning environment, computer
More informationIf you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you
More informationComputer Information Systems Degrees and Certificates
Computer Infmation Systems Degrees and s Degrees: Associate of Applied Science Cisco Netwk Associate Computer Suppt Technician Game Arts and Development Microsoft Database Administrat (MCITP) Microsoft
More informationCyber Innovation and Research Consortium
Cyber Innovation and Research Consortium Mission Conduct, coordinate and promote cyber and cyber security innovation, research, and policy 2 Focus Basic and Applied Research Education and Curriculum Outreach
More informationCertifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute
Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers
More informationADDITIONAL SOFTWARE AND HARDWARE REQUIREMENTS
ONLINE REGISTRAR S OFFICE 550 West Van Buren, 7th Floor Chicago, IL 60607 Tel: 312.777.6333 ADDITIONAL SOFTWARE AND HARDWARE REQUIREMENTS In the Kaplan University online learning environment, computer
More informationMinnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
More informationCurriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 lagesse@uw.edu Summary Curriculum Vitae Employment I am a professor at the University
More informationDATA SUPPORT SPECIALIST CERTIFICATE PRODUCTIVITY SOFTWARE CERTIFICATE
Requirements DATA SUPPORT SPECIALIST CERTIFICATE Required s (C25500A) 18 BAS 120 3 Business Analytics I CTI 110 3 Web, Programming and DB Foundations DBA 110 3 Database Concepts DBA 120 3 Database Programming
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationOMICS Group. Contact us at: contact.omics@omicsonline.org
OMICS Group OMICS Group International through its Open Access Initiative is committed to make genuine and reliable contributions to the scientific community. OMICS Group hosts over 400 leading-edge peer
More informationDATA SUPPORT SPECIALIST CERTIFICATE
Requirements DATA SUPPORT SPECIALIST CERTIFICATE Required s (C25500A) 18 BAS 110 3 Business Analytics I CTI 110 3 Web, Programming and DB Foundations DBA 110 3 Database Concepts DBA 120 3 Database Programming
More information2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological
More informationAdditional Offeror Qualifications: Not applicable.
Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software
More informationIT professionals. The skills. need to succeed. Technical IT Training. At a glance
The skills IT professionals need to succeed Technical IT Training Technology is only as effective as the expertise of the people installing, operating and using it. Developing the right skills is vital
More informationCSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective.
CSTA- Oracle Academy 2014 U.S. High School CS Survey: The State of Computer Science in U.S. High Schools: an Administrator s Perspective Methodology: The Computer Science Teachers Association (CSTA), in
More informationInformation Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
More informationINFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
More informationJohn Smith Prattville, AL career@hashbangsecurity.com
John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position
More informationAutomated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
More information27 Prescott Street #2 Somerville, ma 02143. Massachusetts College of Art and Design Boston, ma 2014
EDUCATION DEGREES mfa, Design Massachusetts College of Art and Design Boston, ma 2014 ba, English and American Literature Brandeis University Waltham, ma 2000 CERTIFICATES Postbaccalaureate, Design Massachusetts
More informationInformation Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
More informationTime: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists
Panel: Key Issues in Big Data Panelists: 1) Dr. Roger R. Schell, USC 2) Dr. Amr Awadallah, Cloudera, Inc. 3) Dr. Peter G. Neumann, RSl 4) Dr.Tomoyuki Higuchi 5) Dr. Sylvia Osborn, University of Western
More informationComputer and Information Sciences
Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,
More informationA Model of Undergraduate Computer Networking Education
Session 3248 A Model of Undergraduate Computer Networking Education Paul I-Hai Lin, Hal Broberg Electrical and Computer Engineering Technology Department Indiana University-Purdue University Fort Wayne
More informationM.S. in Computer Science 2009-2011
Karim O. Elish Assistant Professor Department of Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 kelish@purdue.edu http://people.cs.vt.edu/~kelish/ RESEARCH INTERESTS Software
More informationCybersecurity High School and Beyond
Cybersecurity High School and Beyond High School Career Fair and Expo March 29, 2014 Diane G. Miller, CCP Director, Operations Northrop Grumman Information Security Program Director, CyberPatriot Topics
More informationDiploma in Computer Science
SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer
More informationA full time position in database design and application/web development that would enhance my technical skills.
JEYENDRA BALASUBRAMANIAN, M.S., M.B.A., B-Tech., HDSE. 531 Sunset Ave, Apt 4, Manhattan, KS 66502. E-mail : jeyendra@ksu.edu Website : http://www.cis.ksu.edu/~jeyendra/resume OBJECTIVE: A full time position
More informationCourse Descriptions. CS 101 Intro to Computer Science
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
More informationFinding A malicious Network Traffic
qwertyuiopasdfghjklzxcvbnmqw ertyuiopasdfghjklzxcvbnmqwert yuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopa Network Discovery sdfghjklzxcvbnmqwertyuiopasdf ARST 5100 Archives and Technology
More informationCurriculum Vitae. Zhenchang Xing
Curriculum Vitae Zhenchang Xing Computing Science Department University of Alberta, Edmonton, Alberta T6G 2E8 Phone: (780) 433 0808 E-mail: xing@cs.ualberta.ca http://www.cs.ualberta.ca/~xing EDUCATION
More informationSomeone s sitting in the shade today because someone planted a tree a long time ago. Warren Buffett. Ed Skoudis Mike Qaissaunee.
New Jersey Cyber Aces Academy at Brookdale: A Collaborative Public/Private Model to Secure the Nation A project funded through NSF SFS Grant DUE#1331170 Ed Skoudis Mike Qaissaunee April 30, 2014 Someone
More informationhttp://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus
Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education
More informationClinton Daniel Office: CIS 2008 Phone: 813-974-6765 Email: cedanie2@usf.edu
1 Clinton Daniel Office: CIS 2008 Phone: 813-974-6765 Email: cedanie2@usf.edu WORK EXPERIENCE University Of South Florida Tampa, Florida US 8/2014 Present Full Time Instructor Information Systems Decision
More informationOverview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015
Overview Commitment to Energy and Utilities Robert Held Sr. Systems Engineer Strategic Energy August 2015 Tripwire Evolution 18+ Years of Innovation 1997 Tripwire File System Monitoring from open source
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationDynamic Honeypot Construction
Dynamic Honeypot Construction 2nd Annual Alaska Information Assurance Workshop Christopher Hecker U. of Alaska, Fairbanks 9-5-2006 Presentation l Brief Introduction l Project Overview l Future Work l References
More informationDr. Rob Donald - Curriculum Vitae. Email: rob@statsresearch.co.uk, Web: http://www.statsresearch.co.uk Mob: 07780 650 910
Dr. Rob Donald - Curriculum Vitae Email: rob@statsresearch.co.uk, Web: http://www.statsresearch.co.uk Mob: 07780 650 910 Profile Data Scientist, Systems and Data Analyst In my current role I am a senior
More informationMontgomery County Community College Non-Credit Programs Winter/Spring 2016 TECHNOLOGY PROGRAMS
TECHNOLOGY PROGRAMS PROGRAM PAGE A+... 4 CISCO NETWORKING ACADEMY... 2 CITRIX IT ACADEMY... 3 COMPUTER AIDED DRAFTING... 8 COMPUTERIZED ACCOUNTING... 6 COMPUTERS... 5 CYBER SECURITY... 3 MICROSOFT ADMINISTRATION...
More informationDESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION
DESIGN OF A LABORATORY FOR INFORMATION SECURITY EDUCATION Vikram Anantapadmanabhan, Nasir Memon, Phyllis Frankl and Gleb Naumovich Polytechnic University Brooklyn, NY 11201. vikram@isis.poly.edu, memon,frank,gleb@poly.edu
More informationMichigan Technological University. Development of System Administration & Network Security Curriculum
Michigan Technological University Development of System Administration & Network Security Curriculum Prof. Yu Cai Prof. Guy Hembroff March 24, 2006 Computer Network & System Administration Program The
More informationCAROL KRAKER STOCKMAN, Ph.D. 5033 Castleman Street, Pittsburgh, Pennsylvania 15232-2106 412.980.2800 / ckstockman@gmail.com
CAROL KRAKER STOCKMAN, Ph.D. 5033 Castleman Street, Pittsburgh, Pennsylvania 15232-2106 412.980.2800 / ckstockman@gmail.com CONSULTANT and APPLIED BEHAVIORAL HEALTH ECONOMIST, providing sound and well-crafted
More informationComputer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
More informationDavid Dischiave Curriculum Vita
Professional Experience David Dischiave Curriculum Vita 2001 - Present Syracuse University, Syracuse, New York Associate Professor, School of Information Studies Director, Global Enterprise Technology
More informationCAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
More informationConnecting PTE to Careers in Idaho
1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University
More informationDegree and Certificate Programs Computer Science &
Computer Science & Information Systems A.S. Degrees and Certificates of Achievement Business Computer Applications Computer Networking Computer Programming Programming for the Internet Scientific Programming
More informationMore than 6 years of experience in IT Projects/Networking /Systems
Mohammed Riyas. V.P Email: riyas101@yahoo.com riyas101@live.com Abu Dhabi Mobile: 055 6693840 U.A.E Passport No: G9871465 Career Objective CURRICULUM VITAE Highly motivated IT Engineer with sound professional
More informationCarl Burch. 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911. cburch@cburch.com http://www.cburch.com/ Education May 00
Carl Burch 1124 Clifton St mobile 501 499 9892 Conway AR 72034 3911 cburch@cburch.com http://www.cburch.com/ Education May 00 May 98 May 95 Teaching Fall 04 present Fall 00 Spring 04 Summers 97 02 Spring
More informationCURRICULUM VITAE EDUCATION AND TRAINING
Last Revised: February 21, 2013 CURRICULUM VITAE NAME: CITIZENSHIP: BUSINESS ADDRESS: Robert Richard Calabrisi United States of America Veteran Health Affairs University Drive Pittsburgh, PA 15240 Work
More informationCall us today to help you (888) 534-0245 LAWSON CERTIFIED CONSULTANTS
Call us today to help you (888) 534-0245 LAWSON CERTIFIED CONSULTANTS Senior Lawson Financial Consultant Professional Summary: Experienced business application consultant and Project Manager with large-scale
More informationCYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
More informationProven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia
Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab
More informationLas Vegas, NV ~ Phone: 702-205-7713 ~ E-mail: GVIPlimo@gmail.com
George Busegeano Las Vegas, NV ~ Phone: 702-205-7713 ~ E-mail: GVIPlimo@gmail.com Professional Profile and Areas of Expertise; Offering the following: Chief Executive Officer/CEO - General Management/GM.
More informationPC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications
: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive
More informationDIR Contract Number DIR-TSO-2621 Appendix C Pricing Index
DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate
More informationVITA W. Weyman Whitlock, Jr. Instructor Information Systems and Decision Sciences College of Business University of South Florida
EDUCATION: A.B.D. VITA W. Weyman Whitlock, Jr. Instructor Information Systems and Decision Sciences College of Business University of South Florida University of South Florida College of Business Administration
More informationCV: AGGELOS HANOU. Software Developer (desktop & web app.) Personal information 2. Work experience 3. Education and training 3.
CV: AGGELOS HANOU Software Developer (desktop & web app.) Personal information 2 Work experience 3 Education and training 3 Languages 3 Knowledge 4 Additional information 7 Driving license 7 Personal information
More informationVirtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
More informationSOUTH DAKOTA BOARD OF REGENTS. Committee on Academic and Student Affairs
SOUTH DAKOTA BOARD OF REGENTS Committee on Academic and Student Affairs AGENDA ITEM: III A(3) DATE: April 3-4, 2013 ****************************************************************************** SUBJECT:
More informationComputer Security & Information Assurance MS Program
Computer Security & Information Assurance MS Program in a Nutshell 2005-2006 Graduate Security and Information Assurance Program in a Nutshell Department of Computer Science Rochester Institute of Technology
More informationCURRICULUM VITAE. TEL: 0244994067 EMAIL: vsoft09@gmail.com ABOROGU, FOLI VITUS
CURRICULUM VITAE TEL: 0244994067 EMAIL: vsoft09@gmail.com ABOROGU, FOLI VITUS PERSONAL DETAILS Profile: Gender : Male Nationality : Ghanaian Marital Status : Married DOB : 1981 Vitus Foli Aborogu is the
More informationSecurity Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
More informationYUN-CHIA (ANDERSON) YAN, PH.D. Assistant Professor of Accounting EDUCATION
YUN-CHIA (ANDERSON) YAN, PH.D. Assistant Professor of Accounting Department of Accounting & Management Information Systems University of Texas at Brownsville CURRICULUM VITAE EDUCATION Doctor of Philosophy
More informationCS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
More informationComputer Science Course Descriptions Page 1
CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,
More informationAnalysis of IP Spoofed DDoS Attack by Cryptography
www..org 13 Analysis of IP Spoofed DDoS Attack by Cryptography Dalip Kumar Research Scholar, Deptt. of Computer Science Engineering, Institute of Engineering and Technology, Alwar, India. Abstract Today,
More informationCourse Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
More informationCOMPUTER SCIENCE & INFORMATION TECHNOLOGY
ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer
More information