Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS
|
|
- Dorthy Howard
- 8 years ago
- Views:
Transcription
1 Reynaldo Anzaldua EDUCATION University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS University of Texas Pan American, Edinburg, TX MBA/MIS GPA: North Central University Prescott Valley, AZ PhD Information Security GPA 3.72 ABD: Expected graduation date of: 2014 WORK EXPERIENCE University of Texas at Brownsville Brownsville, TX Lecturer 09/ Present My primary responsibilities entail mentoring and guiding students within the MIS core area of the Business School. I also instruct on the business management courses as needed. My course load consists of both in person classes and on-line classes as required by the University. Within the MIS domain, I am currently searching and contacting research funding entities to begin the process of creating an information security research center located within the School of Business. The purpose of this endeavor is to establish the Brownsville branch of the University of Texas system as a place where students can do research into information security topics with the twin goals of either pursuing a higher degree or working in the field of information security at advanced levels. CSC/DC3/United States Air Force Baltimore, MD/Washington D.C. Technical Trainer 06/ /2013 Training members of the Department of Defense in computer network intrusions, computer forensics, counter intelligence computer techniques, and log analysis. Part of the team working on course content, training manual creation, and online course design for the online direction that the schoolhouse is taking. Team lead on new on-line course that includes content development, course design, and delivery as well as team member on other on-line course creation initiatives. Using project management skills and guidance from management, the initial project was successfully completed and the other initiatives are creating high quality course material. Due to this quality of work, also part of the team that increased the government award satisfaction percentage to 95% in the span of less than a year. As an on-line instructor, I am tasked with providing feedback, grading, and mentoring students on a regular basis. Student survey data indicates this approach is popular and appreciated by our student
2 body. Additionally, our student body consists of worldwide (all 24 time zones) students with varying degrees of ability that makes the on-line mentoring process a challenge that we successfully meet. I am well versed and familiar with Microsoft Windows, Linux, AS/400, and Apple platforms as well as Plateau, LifeRay, and various LMS applications. Specific tools used and familiar with are: Wireshark, Snort, EnCase, FTK, Backtrack 5 v3 suite, Nmap, Nessus, Metasploit framework, and various other security/forensic tools. United States Navy Reserve Washington, D.C. Commissioned Officer (LTJG) 10/2009 Present Information Warfare Officer working at NIOC Maryland/National Security Administration Learning/Working cyber warfare, electronic warfare, signals intelligence, space warfare, military deception, and a wide range of Information Dominance categories. Learning the various security protocols within the US Navy and DoD such as: DoD Instruction (Information Assurance). South Texas College McAllen, TX Assistant Professor As the only Assistant Professor in the department, I was tasked with creating and teaching all the computer security courses for the College. In addition to handling all the computer security classes, I also taught all the CISCO networking classes, network troubleshooting classes, operating system classes, and application classes. As part of my professor duties, I organized symposiums and events around computer forensic topics and computer security topics in addition to helping local governmental organizations with computer forensic and network security issues. The following is a list of classes taught: Introduction to Forensics Fundamentals of Networking (CISCO I) Networking with TCP/IP (CISCO II) Network Troubleshooting and Support Network Security Administering Windows/Linux Servers Fundamentals of Information Security Information Technology Security French Ellison Truck Center Pharr, TX IT Director Managed the entire IT infrastructure for an 80 million dollar per year multi-location trucking business. Managed all aspects of IT project management, telecommunications, networking, and maintenance. The infrastructure managed consisted of international operations that entailed travel outside the USA as well as direct interaction with technicians from international organizations. Managed large IT projects such as construction of a new facility where all aspects of the IT infrastructure from desktop computers to frame relay were planned and tracked via project planning tools such as Microsoft Project.
3 Managed an international IT project that connected a facility outside the USA to the corporate headquarters via frame relay and satellite networks. Managed all aspects of this project with various tools, milestones, and intense collaboration with foreign authorities. Managed the relational database infrastructure based on an AS/400 platform with multiple clients ranging from Windows desktop emulators to dedicated dumb terminals. Computer Security International Weslaco, TX Owner Owned and operated a consulting firm tasked with doing computer security audits involving penetration testing and physical security assessments. Conducted audits for private entities, local government entities, and corporate organizations. Created teams as needed that included experts in locksmithing, security alarm systems, computer network security specialists, and host based security experts. Anzaldua Consulting Weslaco, TX Owner/Operator Owned and operated a computer-consulting firm tasked with projects ranging from building custom computers to networking small business operations. The operation started off as a store front catering to the University students located across the street and grew into a consulting business servicing local hospitals and private colleges. At the height of the operation, I was in charge of five employees and various sub-contractors. The range of technical operations was component level hardware to wireless wide area networks using microwave technology. The operational component of the business spanned internationally to include northern Mexico including the large industrial city of Monterrey, Mexico. Electronic Data Systems Reynosa, Mexico Systems Analyst Hired as a system analyst for several General Motors factories supported by Electronic Data Services handling all LAN/WAN and telecommunications links to the United States. Collateral duties included translating for upper management, local procurement manager, and cultural awareness manager for new employees from the United States.
4 Security Clearances, Training, Certifications, Licenses, and Publications Security Clearances Upon Request 2013 Undercover Online Techniques 2012 Windows Forensic Investigations 2012 Advanced Log Analysis 2012 Network Exploitation Techniques 2012 AuthorIt Training 2012 Certified Technical Trainer + (CTT +) 2012 DCITA ISD/LMS Training 2012 Licensed Private Pilot 2012 Mobile Forensic Workshop 2010 Licensed Texas Private Investigator (Licensed under A15290) 2009 CHFI (Certified Hacking Forensic Investigator) 2008 AccessData FTK 2 Basic Boot Camp 2008 EnCase Internet/ Investigations 2006 CISCO Certified Instructor 2005 EnCase NTFS Artifacts and File Systems 2005 EnCase Advanced Computer Forensics 2004 EnCase Intermediate Analysis and Reporting 2003 CISSP (Certified Information Systems Security Professional)(Expired) 2003 EnCE (EnCase Certified Examiner) 2003 IBM I-Series / AS400 Certified 2002 EnCase Introduction to Computer Forensics 2002
5 Security Clearances, Training, Certifications, Licenses, and Publications (cont'd) Computer Forensics for Dummies, Co-Author, Wiley Computer Forensics: Principles and Practices, Co-Author, Prentice Hall Protocols/Services: Active Directory, TCP/IP, UDP, and routed/routing protocols Software: EnCase, FTK, Helix, Knoppix, Sleuthkit, Backtrack 3, Paraben, Cellebrite, Nmap, Snort, Wireshark, Nessus, Linux, Unix, Apple, and Windows file systems. Programming Languages: C, C++, COBOL, RPG, and BASIC. PUBLICATIONS and RADIO SHOW Weekly Radio Show Segment on KURV Tech Corner 2008 The Computer Guy, Weekly columnist for Freedom Newspapers, Computer Forensics: Principles and Practices, Co-Author, Prentice Hall Computer Forensics for Dummies, Co-Author, Wiley COMMUNITY INVOLVEMENT Guest Speaker Rotary Clubs Topics include identity theft, computer forensics, and computer security. Guest Speaker Lions Clubs Topics include identity theft, computer forensics, and computer security. Seminar Speaker Various audiences from IT directors to Law Enforcement Sample List below: South Texas College Symposium 12/2007 Lions Club Mixer Seminar 5/2006 Rotary Club Mixer Seminar 7/2006 National Hispanic Professional Organization Identity Theft Seminar 9/2005 National Hispanic Professional Organization Networking Security Seminar 6/2005 South Texas College Forensic Seminar 11/2004 Topics include computer forensics and computer security LANGUAGES Spanish speak fluently and read/write with high proficiency Miscellaneous Technical (paid and non paid) consultant for local and Federal law enforcement agencies on matters relating to retrieving data from all digital devices.
Information Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
More informationEC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
More informationCase 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1
Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 1 of 5 EXHIBIT 1 Case 2:14-cv-00987-GMN-GWF Document 5-5 Filed 06/19/14 Page 2 of 5 Jason B. Lyons 13829 233 rd CT NE Woodinville WA, 98077 SUMMARY
More informationCyber Security at NSU
Cyber Security at NSU Aurelia T. Williams, Ph.D. Chair, Department of Computer Science Associate Professor of Computer Science June 9, 2015 Background Undergraduate computer science degree program began
More informationMCSA Security + Certification Program
MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.
More informationHow To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) rich@realforensicanalysis.com EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
More informationCURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC
CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal
More informationHow To Get A Computer Hacking Program
CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator
More informationMinnesota State Community and Technical College Detroit Lakes Campus
Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future
More informationDoctor of Philosophy in Business Administration - Computer & Information Security, 2014 North Central University, Prescott Valley, Arizona
Dr. Scott P. Paetzold University of Wisconsin Stout College of Science, Technology, Engineering and Math Menomonie, Wisconsin 54751 715-232-5498 paetzolds@uwstout.edu EDUCATION: Doctor of Philosophy in
More informationADDENDUM #1 Courses and Pricing
TECHNICAL SUPPORT SPECIALIST TRAINING PROGRAM A+ Certification hardware and OS A+ Certification hardware A+ Certification OS Network + Certification Security + Microsoft Certified Desktop Technician (MCDT)
More informationAuthority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy
Corporal John Roche Pennsylvania State Police Bureau of Criminal Investigation Special Investigation Service Computer Crime Unit Southwest Computer Crime Task Force Coordinator 4221 Route 288 Highway West
More informationINTEGRITY FORENSICS. Where the Evidence Tells the Truth. Terrance Maguire Chief Scientist. Digital Forensics Academy, LLC
Digital Forensics Academy, LLC Chief Scientist, April 2012 Present Williamsburg, VA Terrance Maguire Chief Scientist Digital Forensics Academy, LLC PO Box 5033 Williamsburg, VA 23188 202-630-7094 terrance.maguire@gmail.com
More informationPh.D. Nova Southeastern University, Ft Lauderdale, FL, Information Systems, completed 24 credit hours, expected ABD in Spring 2012
Kevin Barton, M.S., CISSP Assistant Professor Computer Info Systems and Security School of Business and Leadership kabarton@ollusa.edu Mobile Phone: 210-317-5703 Academic Background Ph.D. Nova Southeastern
More informationCOMPUTER SCIENCE & INFORMATION TECHNOLOGY
ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer
More informationHow to profit from the growing shortage of IT professionals jobs
How to profit from the growing shortage of IT professionals jobs It s no secret that IT is one of the fastest growing fields in the U.S. What s less well known is that there are so many career opportunities
More informationAdditional Offeror Qualifications: Not applicable.
Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software
More informationLearning Tree Training Pre-approved Training for Continuing Education Units (CEUs)
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
More informationHosted by Lunarline: School of Cyber Security
Hosted by Lunarline: School of Cyber Security Please Fax Government Purchase Orders and SF 182s To (22) 315-33 Cybersecurity is one of the hottest issues for today s Federal and DOD Agencies and commercial
More informationJohn Smith Prattville, AL career@hashbangsecurity.com
John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position
More informationINFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
More informationTechnical Manager / Fortinet Product Owner at Space Data Systems - Jordan (SDS) alzard_m@hotmail.com
Mohammad Al-Zard alzard_m@hotmail.com Summary Hands-on experience in security consultation, measuring possible security vulnerabilities, implementing and customizing distributed IDPS systems. Planning
More informationAPPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c
APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:
More informationWILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM
WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,
More informationCourse Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationNetwork Engineering Technology
Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science
More informationIf you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you
More informationmin exp years min educ
labor_type_name Applications Systems Analyst/Programmer - Entry Applications Systems Analyst/Programmer - Mid Applications Systems Analyst/Programmer - Sr Business Analyst min exp years description 1.
More informationPC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications
: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive
More informationn2grate Open Positions March 2015
n2grate Open Positions March 2015 Table of Contents 1. CMS Centers for Medicare & Medicaid Services Roles... 1 1.1 Role 012 Computer System Analysts II...1 1.1.1 Location: Dallas, Texas... 1 1.3 Role 013
More informationCourse Outline. Configuring, Managing & Maintaining Windows 2008 Server. Course Description: Pre-requisites:
Configuring, Managing & Maintaining Windows 2008 Server Course Description: This five-day instructor-led course combines five days worth of instructor-led training content from the Network Infrastructure
More informationResearch, recommend, and assist in implementing identity automation solution.
Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,
More informationCSI Crime Scene Investigations
CSI Crime Scene Investigations Did Jack do it? Speaker Introductions Amber Schroader Paraben Corporation Oodles of forensic experience Tyler Cohen Federal Government (Still Cool Person) IPod Obsession
More informationTrack 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
More informationNetwork Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
More information167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationIDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
More informationInformation Technology Resource Services
Information Technology Resource Services RTI specializes in resource solutions ranging from Help Desk, Workstation, Network Infrastructure and Telecommunications services to Software and Web Site Developers.
More informationFedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
More informationLINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
More informationLinux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
More informationFedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
More informationP.O. Box 691593 San Antonio, Texas 78269. Summation
P.O. Box 691593 San Antonio, Texas 78269 Phone (210) 392-6993 E-mail dteneyuca@msn.com Dr. David Teneyuca, CISSP Summation Research Interest Project Leadership For Software Development Value-added Communication
More informationNETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
More informationConnections II Award #: GS00Q12NSD0019
J.1 Labor Categories The following labor categories are included on the Connections II contract. Additional categories may be requested for inclusion by the contractor. Fields are taken from Table -5 Labor_Table;
More informationhttps://agency.governmentjobs.com/dakota/job_bulletin.cfm?jobid=1017820
Page 1 of 5 DAKOTA COUNTY Employee Relations Administration Center, 1590 Highway 55 Hastings, MN 55033-2372 651.438.4435 http://www.dakotacounty.us INVITES APPLICATIONS FOR THE POSITION OF: Electronic
More informationExhibit 16.1-4a Non Applications Services Labor Categories
Exhibit 16.1-4a Non Applications Services Labor Categories PAGE 1 1. Infrastructure System Administrator Description: The Infrastructure Systems Administrator s role is to: (1) deliver support to internal
More informationDefense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs)
Defense Cyber Investigations Training Academy (DCITA) Pre-Approved Training for CompTIA Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without
More informationDistributed Systems Security
Distributed Systems Security Tutorial Dennis Pfisterer Institute of Telematics, University of Lübeck http://www.itm.uni-luebeck.de/users/pfisterer Non Sequitur by Wiley Security - 08 Firewalls Assessing
More informationAccess FedVTE online at: fedvte.usalearning.gov
FALL 2015 Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk her e or email the Help Desk at support@usalearning.net. To speak with a Help Desk
More informationComputer Information Technology Program Course history matrices by award (a.k.a. Course Cross Walks)
Computer Information Technology Program Course history matrices by award (a.k.a. Course Cross Walks) Information Technology Administrator AAS ITNW 11.0901 Course Cross Walk for Computer Information Technology
More informationJibran Ilyas DIRECTOR
PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response
More informationPlease Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
More informationZubair Alexander's Training History (History of classes taught from June 28, 1996 through today)
Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today) Course # SP-1000 SP-3005 SP-1001 SP-3003 SP-3004 SP-2004 SP-3001 SP-3002 PR-1005 MS-20412 MS-50321 MS-7005
More informationRichard A. Livingood, Ph.D., MCSE, CISSP, CSSLP
April 20, 2010 Mr. Roger Randolph, City Clerk City of Tucson, Arizona Re: Open City Council Seat Ward 2 Dear Mr. Randolph, I am requesting to be considered for the open seat on the City Council in Ward
More informationINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor
More informationRecommended Programs Per School
Recommended Programs Per School Note: Some courses are appropriate for teaching students at various ages, therefore some courses may be listed below as recommended offerings at multiple school age levels.
More informationSenior Information Security Engineer/Analyst
OBJECTIVE Senior Information Security Engineer/Analyst SUMMARY OF QUALIFICATIONS TOP SECRET/SCI clearance with CI Polygraph/DOE Q cleared Masters Degree in Information Systems Certified Information Systems
More information167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
More informationCAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
More informationComputer Support & Network Administration
Computer Support & Network Administration What You Will Learn MCTC s Information Technology program has two A.A.S. awards: Computer Support and Network Administration and Software Development, as well
More informationCURRICULUM VITAE Russell Adams 956-882-7654 radams@utb.edu Brownsville TX 78520. Current Position: Associate Professor of Marketing SCOB UTB-TSC
CURRICULUM VITAE Russell Adams 956-882-7654 radams@utb.edu Brownsville TX 78520 Current Position: Associate Professor of Marketing SCOB UTB-TSC Ph.D. Business Administration EDUCATION University of Texas
More informationSENIOR SYSTEMS ANALYST
CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationForensic Certifications
Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice
More informationBuild Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
More informationCOMPUTER SCIENCE DEGREE CAREER PATH
1. Lead applications developer What they do: Manage software development teams in the design, development, coding, testing and debugging of applications. ** What you need: Bachelor's degree in computer
More informationCybersecurity AAS Program
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
More informationBoost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE
2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides
More informationPEER REVIEWED PUBLICATIONS
Curriculum Vitae of Kevin Williams Kevin Williams Assistant Professor Instructional Technology Department Chair Graduate Education, BAAS, BGS Texas A&M University-Texarkana Phone: (903) 223-3028 Email:
More informationKevin Williams Assistant Professor Instructional Technology Texas A&M University-Texarkana Phone: (903) 223-3028 Email: kevin.williams@tamut.
Curriculum Vitae of Kevin Williams Kevin Williams Assistant Professor Instructional Technology Texas A&M University-Texarkana Phone: (903) 223-3028 Email: kevin.williams@tamut.edu EDUCATION -D.Sc., Information
More informationRobotics Core School 1
Robotics Core School 1 Robotics Core School 2 Cyber Forensics & Crime Investigation This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific
More informationMARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech - Cloud Technology & Information Security (4 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective B. Tech - Cloud Technology & Information Security
More informationdata & voice communications electrical & lighting
data & voice communications electrical & lighting company philosophy Comletric is a nationally recognized desktop, data, cable, voice and electrical company headquartered in Northern California. The company
More informationREMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM
On a Mission to Transform Talent REMOTE INFRASTRUCTURE MANAGEMENT COURSE CURRICULUM Table of Contents Module 1: Introduction to Hardware and Networking (Duration: 1.5 Weeks)...1 Module 2: Windows XP Professional
More informationAcademic Programs INFORMATION TECHNOLOGY
Academic Programs INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY The Information Systems programs at Tidewater Community College cover the essential areas of study in information systems technology. The
More informationAustralian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012
Australian Computer Society ANZSCO ICT Code descriptions v1.0 01.07.2011 Further updates will be issued in 2011-2012 The Australian Computer Society is the gazetted authority within Australia to undertake
More informationRequest for Resume (RFR) CATS II Master Contract. Section 1 General Information R00B4400024
RFR Number: (Reference BPO Number) Functional Area (Enter One Only) Section 1 General Information R00B4400024 Functional Area 10 - IT Management Consulting Services Position Title/s or Service Type/s (Short
More informationCurriculum Vitae -Joel H. Bush
Curriculum Vitae -Joel H. Bush Joel H. Bush Email: jbush@rmcc.edu Home: 360 Polk 75 Mena, AR 71953 Cell: 479-216-4553 Rich Mountain Community College 1100 College Drive Mena, AR 71953 479-394-7622 X1356
More informationJAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: jswauger@binaryintel.com CERTIFICATIONS
More informationThe Leading IT & Telecom Solutions Provider
The Leading IT & Telecom Solutions Provider Address 4th Floor Ros han Pla za Sha hr -e -Now Kabul Afghansitan. Tel: +93(0 )77-28 4 1 41 10 +93 (0)77-28 41 41 20 +93(0)77-28 41 41 30 +93(0)77-28 41 41 40
More informationCHAPTER 2: Staffing ROLES OF STAFF. Roles Required to Provide Tech Support
Roles Required to Provide Tech Support The type and number of staff required to meet a district s technical support needs will vary widely based on the size of the district and the quality and quantity
More informationDiploma in Network (LAN/WAN) Administration
Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a
More informationEC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
More information30 Independent Study. 60 (e.g. lectures, seminars and supervised group activity)
1. Programme Title BSc Digital & Technology Solutions 2. Unit Title Data and Security 3. HE Level UG1 FHEQ Level 4 4. Unit Code DTS16104 5. Credit Value of Unit 30 6. Unit Type Mandatory 7. Unit Tutor
More informationSecurity Forensics Training
Security Forensics Training Vision, Mission, and Values 3 Vision: To be the brand of choice for computer forensics, cyber security, and training solutions Mission: To provide digital forensics, cyber
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationEducation & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship
University of Texas at El Paso Professional and Public Programs 500 W. University Kelly Hall Ste. 212 & 214 El Paso, TX 79968 http://www.ppp.utep.edu/ Contact: Sylvia Monsisvais 915-747-7578 samonsisvais@utep.edu
More informationCurriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner
Curriculum Vitae Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner Background and Summary of Qualifications Mr. Odenthal has 35 years experience as an Information
More informationBUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES. Band 4 ICT Technician JOB DESCRIPTION
BUSINESS SERVICES ORGANISATION - INFORMATION TECHNOLOGY SERVICES BAND 4 ICT Technician JOB DESCRIPTION POSTS: REPORTS TO: ACCOUNTABLE TO: LOCATION: BAND: Band 4 ICT Technician (a waiting list may also
More informationTeam Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.
Cyber Security 2014 Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr. Joel Dubow Hacking Incidents Reported to the Cyber
More informationINFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES
INFORMATION and COMMUNICATION TECHNOLOGIES AUTHORITY NOTICE OF VACANCIES Doc REF: ICTA/VAC/Feb09/01 Applications are invited from suitably qualified candidates for the following positions: A. Director
More informationCOMPU TECH CONSULTANTS (Professional Technical Training)
COMPU TECH CONSULTANTS (Professional Technical ) Mission Statement: Compu Tech Consultants offers career-oriented, state of the industry programs to meet diverse needs of population. Promotes excellence
More information2015-2016 Information & Telecommunication Technology
PROGRAM GUIDE 2015-2016 Information & Telecommunication Technology Information and Telecommunications Technology Associate in Applied Science Degree 60 credits Information and Telecommunication Technology
More informationCYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *
CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 yanb@u.washington.edu Kyle Gwinnup and Carol
More informationISSA SOUTH TEXAS CHAPTER NEWSLETTER
Page 1 of 5 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For May 2013 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests to improve
More informationSCADA/ICS Security in an. RobertMichael.Lee@Gmail.com Twitter: @RobertMLee
SCADA/ICS Security in an Insecure Domain RobertMichael.Lee@Gmail.com Twitter: @RobertMLee Introduction CYA The opinions held and expressed by Robert M. Lee do not constitute or represent an opinion or
More informationSECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008
SECURITY CENTRIC AND DATE LIMITED CURRICULUM VITAE Allan C. Roth, PhD, CISSP 2008 HOME ADDRESS: E-MAIL 21 Oak Lane 62707 Home (217) 529-7980 Cell (217) 816-9667 rothac@excite.com and aroth1@uis.edu EMPLOYMENT
More informationAssessment of Learning Report. Computer Science Networking CPC. Fall 2008 Spring 2010
Assessment of Learning Report Computer Science Networking CPC Fall 2008 Spring 2010 Report prepared by: Michael Fuszner, Professor Computer Networking Program Coordinator John Phillips, Associate Professor
More information