Juan R. Reyes, CISSP Kelly Drive, Point Venture, TX

Size: px
Start display at page:

Download "Juan R. Reyes, CISSP Kelly Drive, Point Venture, TX"

Transcription

1 Juan R. Reyes, CISSP Kelly Drive, Point Venture, TX EDUCATION M.S. Computer Information Systems, 3.77 GPA - St. Edward s University, MCIS Intellectual Property & Cyber Law MGMT Managing the Organization MCIS Database Systems MCIS Strategic & IT Management MCIS Internet & Network Technologies MCIS Data Security Management MCIS Modern Methods Software Engineering MCIS Business Intelligence Methods MCIS Project & Change Management MCIS Operating Systems MCIS 6350 Capstone: Proposal for Master of Science in Information Security Degree MCIS Business Continuity & Disaster Recovery B.A. English, 3.14 GPA - University of Maryland University College, PROFESSIONAL CERTIFICATIONS CISSP certified in January ISC 2 Certified Information Systems Security Professional CISM certified in August ISACA Certified Information Systems Manager CISA certified in February ISACA Certified Information Systems Auditor GCIA certified in February GIAC Certified Intrusion Analyst GCIH certified in February GIAC Certified Incident Handler CEH certified in March EC-Council Certified Ethical Hacker CCNA Security certified in March 2010 TippingPoint Certified Security Expert - TCSE certified in June 2010 ARTICLES, PUBLICATIONS, AND PRESENTATIONS Developing Secure Software A Project Manager's Approach A_Project_Mana ger%27s_approach Tuning IPS, A Vendor Platform Agnostic Guide

2 EXPERIENCE AT&T Senior Security Analyst 08/12 - Present Staffed through Genesis Networks. Perform security analysis, security posture assessment, and security policy development consultation as part of the State of Texas Department of Information Resources (DIR) Network Security Operations Center (NSOC) and for more than 120 state government agencies. Analyze events generated by security appliances and alert the appropriate agency with security event information and resolution consultation. Run scans and vulnerability assessments on single hosts and full networks and provide findings in reports and recommendations on how to fix vulnerabilities. Prepare daily and weekly security activity reports for senior management viewing. Consult on internal teams that work to improve administrative and technical security processes. Manage the installation, testing, and evaluation of security technologies as part of proof-ofconcept evaluations. Serve as the NSOC technical liaison for two external MSSP vendors. Create and present security training material to State of Texas government agency Information Security Officers (ISOs). Hewlett-Packard Technical Solutions Consultant IV 07/09-08/12 Provided Tier III support in the HP TippingPoint Technical Assistance Center. Troubleshoot complex configurations on HP TippingPoint Intrusion Prevention Systems (IPS) and give design and configuration recommendations to users improving their posture against application, infrastructure, and performance threats. Identify issues related to IPS hardware, TippingPoint Operating System, and IPS configurations. Analyze packet captures in Wireshark to identify traffic anomalies and potential security threats. Accept escalations from management, customers, and Tier II engineers and drive to resolution effectively and expeditiously. Coordinate troubleshooting activities between HP TippingPoint development engineers and customer users. Document processes on internal wiki and mentor Tier II engineers to improve their troubleshooting skills. Cisco Systems, Inc. Customer Support Engineer II 10/01-07/09 Provide Tier III support for national and international customer enterprise networks as a member of the Quality Engineering Team.

3 Configured and troubleshot PKI, PAP, CHAP, IPSec, GRE, and DMVPN across various Cisco platforms for major customer accounts. Configured and troubleshot router access control lists. Performed security advisory analysis for the ROS business unit as a member of the Cisco Product Security Incident Response Team (PSIRT) by gathering affected hardware and software platforms supported by the business unit using SQL queries. Wrote detailed specifics about the impact of the pending Cisco security advisory public announcement for internal engineering team distribution. Resolved escalated outages and service degradation issues on T1, E1, T3, OC-3, multi-link, IMA, Metro Ethernet, PRI and BRI ISDN, DSL and Cable Modem access services. Resolved outages and service degradation on Frame Relay, ATM, MPLS, and HDLC circuits. Performed troubleshooting and configuration of BGP, EIGRP, RIP and OSPF routing protocols. Worked with inter-exchange carriers, local exchange carriers, Internet service providers, equipment vendors, cabling vendors and customers to resolve connectivity issues. Composed root cause analysis and post-mortem reports. MCI WorldCom, Inc. Telecom Technician III 11/00-10/01 Provided technical support in the Priority Clients Technical Services Center to meet availability SLAs. Performed remote troubleshooting and resolved customer outages and service degradation on Frame Relay circuits and DDS, T1, and T3 transport circuits. Accessed Frame Relay switches, DACs, and local loop test sets to identify network issues. Opened, tracked, and escalated trouble tickets with the LEC and internal support teams. Designed and taught a DSL training course. NorthPoint Communications Broadband Services Support Engineer 04/00-10/00 Staffed through Broadbay Networks. Isolated and resolved outage and degradation conditions on a national Digital Subscriber Line network to meet availability SLAs. Accessed network Frame Relay and ATM switches, DSLAMs, and local loop test sets to identify and resolve faults. Interfaced with the LEC to drive outages and service degradation to resolution. Dispatched technicians to sites for troubleshooting and replacement of equipment and wiring. Accepted escalations from customers and management and followed through to final resolution. Supervised 17 technicians for two Internet Service Provider teams.

4 Lucent Technologies, Inc. Engineering Lab Technician 01/00-04/00 Staffed through Applied Concepts, Inc. Performed fault isolation on Stratus Continuum redundant systems running HP-UX operating system. Identify and replace faulty components and peripherals. Install custom configurations of Ethernet and fiber-optic LAN cabling per specifications of the test engineers. ADAX, Inc Network Hardware Electronics Technician 04/99-01/00 Performed test, verification, and fault isolation to electronic component level on Frame Relay and ATM switching cards and T1/E1 CSU/DSU units using oscilloscope, schematics, and digital voltmeter. Performed solder repair and modification on surface-mount and through-hole electronic components. Acted as IT support for the production department by maintaining and troubleshooting test workstations running Windows NT and Solaris. Wrote equipment test scripts in Korn Shell on Solaris platform. Netscape Communications Information Systems Support Technician 11/96-09/98 Staffed through Endymion Systems, Inc. Performed installation and configuration of Microsoft 95/98/NT operating systems and MS Office suite on PC laptop and desktop systems. Performed custom hardware configuration per customer request. Supervised crews of 5-7 people on Moves, Adds, and Changes projects ranging in size from end users. Performed fault isolation on TCP/IP network identifying DHCP, DNS, routing, LAN cabling, and workstation configuration issues. U.S. Air Force Television and Intrusion Detection Systems Specialist 08/89-02/95 Performed installation, operational checks, inspection, troubleshooting, repair, calibration, modification, testing, and performance analysis of CCTV and physical intrusion detection systems. Provided maintenance support on pan and tilt cameras, coaxial cable, display monitors, infrared motion sensors, Doppler-Effect-based motion sensors, card access readers, buried seismic sensors, door and window balance magnetic switch sensors, hand geometry unit biometric readers, entry-point mantraps, access code keypads, low-voltage wiring, and annunciator consoles.

5 TRAINING Kepner-Tregoe Resolve troubleshooting methodology April 2009 TippingPoint Expert Technical Security Products - June 2010 TippingPoint Advanced Technical Security Products - August 2009 VMware Infrastructure vsphere 4.0 Ultimate Bootcamp - February 2010 H3C Comware v5 Switches Installation and Administration - April 2010 ArcSight Essentials - June 2012 SANS 503 Intrusion Detection In-Depth - January 2013 SANS 504 Hacker Techniques, Exploits & Incident Handling December 2013 SKILLS Packet analysis, TCP/IP, routing, switching, penetration testing, network design, security architecture design, network diagramming in MS Visio, anti-virus administration, system patching, SIEM rule correlation design, NetWitness forensics tool, Cisco IPS, TippingPoint IPS, FireEye MPS, Snort IDS, 21CT Lynxeon Network Analysis, Security Onion, nmap, Nessus, Metasploit, Splunk, BackTrack Linux, ArcSight SIEM, QRadar SIEM, McAfee Nitro SIEM, AlienVault SIEM, Wireshark, tcpdump, VMware vsphere.

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

DIS10.4ADVANCED NETWORK SECURITY

DIS10.4ADVANCED NETWORK SECURITY DIS10.4ADVANCED NETWORK SECURITY ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

CCNA and CCNP (Routing) with 12 years of experience Networking/Security Domain, Currently working with Cognizant as a Infra Ops SpecialistPune.

CCNA and CCNP (Routing) with 12 years of experience Networking/Security Domain, Currently working with Cognizant as a Infra Ops SpecialistPune. Sanjay Kumar Swami Email: Sanjay.swami@hotmail.com Cell +91-8105959777 Pune OBJECTIVE: IT NETWORK Professional Summary OBJECTIVE Intend to build a challenging career in a professionally managed, progressive

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

DIABLO VALLEY COLLEGE CATALOG

DIABLO VALLEY COLLEGE CATALOG COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in

More information

Network Engineering/Cyber Security I & II

Network Engineering/Cyber Security I & II Network Engineering/Cyber Security I & II Program Description: The first year course teaches the basic techniques of computer safety and maintenance. Students learn to assemble/disassemble personal computers

More information

BUILDING AND MAINTAINING SOC

BUILDING AND MAINTAINING SOC BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

Job Specification & Recruiting Profile of Vacancy

Job Specification & Recruiting Profile of Vacancy Job Specification & Recruiting Profile of Vacancy 26 March 2019 The following vacancy exists at NSFAS in Cape Town. Position Information Security Analyst Type & Grade Permanent, Grade 11 Vacancy No 76

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Computer Network Engineering

Computer Network Engineering Computer Network Engineering 221 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

EC-Council - EC-Council Certified Security Analyst (ECSA) v8 EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

Computer Network Engineering

Computer Network Engineering 218 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

REV: 04/04/16 INFORMATION SECURITY ANALYSTS

REV: 04/04/16 INFORMATION SECURITY ANALYSTS REV: 04/04/6 INFORMATION SECURITY ANALYSTS Occupation Overview: Information Security Analyst Foundational Competencies Reading Comprehension: Understanding written sentences and paragraphs in work-related

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

CCNP ROUTING & SWITCHING

CCNP ROUTING & SWITCHING CCNP ROUTING & SWITCHING ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various kinds of products

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

CCNA Cybersecurity Operations. Program Overview

CCNA Cybersecurity Operations. Program Overview Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System

More information

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

WAN Technology & Design. Dr. Nawaporn Wisitpongphan

WAN Technology & Design. Dr. Nawaporn Wisitpongphan WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow

More information

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS Security & Intellectual Property Protection Overview Certified ISO 27001:2013 Meet security requirements from global clients Passed all security

More information

The CEH exam (312-50) is available at the ECC Exam Centre and Pearson Vue testing centers.

The CEH exam (312-50) is available at the ECC Exam Centre and Pearson Vue testing centers. What is an Ethical Hacker? To beat a hacker, you need to think like one! Ethical Hacking is often referred to as the process of penetrating one s own computer/s or computers to which one has official permission

More information

DIS10.4. DIS10.4: In-depth Advanced Networking. Online Training Classroom Training Workshops Seminars. Data and Information security Council of India

DIS10.4. DIS10.4: In-depth Advanced Networking. Online Training Classroom Training Workshops Seminars. Data and Information security Council of India Online Training Classroom Training Workshops Seminars DIS10.4 Data and Information security Council of India DIS10.4: In-depth Advanced Networking Networking is for Networkers!!!!! What is DIS? DIS is

More information

Click to edit Master title style. DIY vs. Managed SIEM

Click to edit Master title style. DIY vs. Managed SIEM DIY vs. Managed SIEM Meet Paul Paul Caiazzo Principal, Chief Security Architect CISSP, CISA, CEH M.S. Information Security and Assurance 15+ years of experience in Information Security Connect with me:

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

Scope and Sequence: CCNA Exploration v4.0

Scope and Sequence: CCNA Exploration v4.0 Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are

More information

CIT 480: Securing Computer Systems. Putting It All Together

CIT 480: Securing Computer Systems. Putting It All Together CIT 480: Securing Computer Systems Putting It All Together Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database.

More information

CCIE ROUTING & SWITCHING V5.0

CCIE ROUTING & SWITCHING V5.0 CCIE ROUTING & SWITCHING V5.0 Overview The CCIE Routing and Switching Lab Exam version 5.0 is an eight-hour, hands-on exam which requires you to configure and troubleshoot a series of complex networks

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

Network & Computer Systems Operators

Network & Computer Systems Operators A COLLECTION OF INTERVIEW QUESTIONS FOR Network & Computer Systems Operators COMMON QUESTIONS What is your favourite technology platform? (Microsoft, Linux, Apple) What brought you to the technology industry?

More information

Scope and Sequence: CCNA Discovery v4.0

Scope and Sequence: CCNA Discovery v4.0 Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and

More information

Skillsoft Pre-Approved for CompTIA CEUs

Skillsoft Pre-Approved for CompTIA CEUs Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

Diploma in Network (LAN/WAN) Administration

Diploma in Network (LAN/WAN) Administration Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a

More information

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify Labs.

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify Labs. Course Outline Networking Essentials, Fifth Edition Pearson ucertify 22 Apr 2019 Contents 1. Course Objective 2. Expert Instructor-Led Training 3. ADA Compliant & JAWS Compatible Platform 4. State of the

More information

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)

CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training

More information

CISCO CERTIFIED INTERNETWORK EXPERT (CCIE)

CISCO CERTIFIED INTERNETWORK EXPERT (CCIE) CISCO CERTIFIED INTERNETWORK EXPERT (CCIE) ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various

More information

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst

More information

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Farzad Diba 333 East Juniper Court Mequon, WI (414)

Farzad Diba 333 East Juniper Court Mequon, WI (414) Farzad Diba 333 East Juniper Court Mequon, WI 53092 farzad@farzaddiba.com (414) 301-3279 PROFESSIONAL SUMMARY Experienced leader motivated by complex problems, strategic initiatives and organizational

More information

CCNA-A Scope and Sequence (March 2007-Draft)

CCNA-A Scope and Sequence (March 2007-Draft) CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level

More information

Building Secure Systems

Building Secure Systems Building Secure Systems Antony Selim, CISSP, P.E. Cyber Security and Enterprise Security Architecture 13 November 2015 Copyright 2015 Raytheon Company. All rights reserved. Customer Success Is Our Mission

More information

Designing and Building a Cybersecurity Program

Designing and Building a Cybersecurity Program Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity

More information

CyberSecurity: Top 20 Controls

CyberSecurity: Top 20 Controls CyberSecurity: Top 20 Controls ISACA Kampala Chapter CPD Event - 30 March 2017 By Bernard Wanyama - CISA, CGEIT, CRISC, CISM Assume breach.. The CIS Top 20 Critical Security Controls CIS, SANS, NSA and

More information

HRSD Position Description: UNIX Systems Administrator

HRSD Position Description: UNIX Systems Administrator HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position

More information

CACI USSOCOM IT EOM REQUIREMENTS

CACI USSOCOM IT EOM REQUIREMENTS Labor Category Certifications Experience Asset Manager ITIL Foundations Five years of experience in an IT and asset management role. Prior experience with Microsoft Enterprise Licensing is highly valued.

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

CPTE: Certified Penetration Testing Engineer

CPTE: Certified Penetration Testing Engineer www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification

More information

Senior Technical Consultant

Senior Technical Consultant Senior Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The company has grown year

More information

Cybersecurity Employment SecureNinja

Cybersecurity Employment SecureNinja Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,

More information

Unlocking Potential Through Learning

Unlocking Potential Through Learning Unlocking Potential Through Learning CORPORATE HEAD OFFICE: 6, Babatola Drive, Off Obafemi Awolowo way, Behind Awolowo Glass house, Ikeja, Lagos. 08 Training Calender @ Newhorizonsnige @ new horizon solution

More information

Cisco 2: Routing Technologies

Cisco 2: Routing Technologies Western Technical College 10150120 Cisco 2: Routing Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 The emphasis

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

Mcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<<

Mcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<< Mcafee Network Intrusion Detection System Project Report Selecting an intrusion detection and prevention system vendor can be a IDS/IPS protection, the current network configuration and the project budget,

More information

Ethical Hacking & Information Security. Justin David G. Pineda Asia Pacific College

Ethical Hacking & Information Security. Justin David G. Pineda Asia Pacific College Ethical Hacking & Information Security Justin David G. Pineda Asia Pacific College Topics for today: Is there such thing as ethical hacking? What is information security? What are issues that need to be

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Network Infrastructures & Service Provisioning

Network Infrastructures & Service Provisioning Network Infrastructures & Service Provisioning About Program Who May Apply? Learning Environment Program Overview Program Architecture Partnership with Industry Index Who is Who? 2 Index Introduction Preface

More information

Cisco Intrusion Detection System User Guide Ace

Cisco Intrusion Detection System User Guide Ace Cisco Intrusion Detection System User Guide Ace attack vector, can be exploited locally on the vulnerable device, require user interaction, Effective use of Cisco Intrusion Prevention System (IPS) event

More information

"Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary

Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary Course Summary Description This course is designed to help network professionals improve the skills and knowledge that they need to maintain their network and to diagnose and resolve network problems quickly

More information

Mohamed Moussad Mohamed Ibrahim Systems Engineer. Preface:

Mohamed Moussad Mohamed Ibrahim Systems Engineer. Preface: Preface: Egyptian 00966507972396 Eng_moh.mosad86@yahoo.com 9 / 9 /1986 Married Holding a bachelor degree in Systems and Control Engineering in 2008 Mansura University - Very Good with honor degree Ratio

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

One Hospital s Cybersecurity Journey

One Hospital s Cybersecurity Journey MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital

More information

A UNIVERSAL SECURITY GATEWAY

A UNIVERSAL SECURITY GATEWAY A UNIVERSAL SECURITY GATEWAY IDS /IPS / HTTP AV/ Web Content Filter / Web Load Balancer / Web Reverse Proxy / Multi-line Internet / Network IP &Protocol Monitor / IP Reputation Blocker / Captive Portal

More information

Information Security Architecture Gap Assessment and Prioritization

Information Security Architecture Gap Assessment and Prioritization FEATURE Information Security Architecture Gap Assessment and Prioritization Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find

More information

Microsoft Certified Professional Transcript

Microsoft Certified Professional Transcript Last Activity Recorded: November 06, 2009 Microsoft Certified Professional PETER MARIAN GORLICKI Holstenstr. 96 Kiel 24103 DE peter.gorlicki@tcp4it.de Microsoft Certification Status Credential Certification

More information

Information Security Specialist. IPS effectiveness

Information Security Specialist. IPS effectiveness Information Security Specialist IPS effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Study and work in a well paid career. TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING CRICOS Provider 02771G

Study and work in a well paid career. TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING  CRICOS Provider 02771G Study and work in a well paid career TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING www.acit.edu.au CRICOS Provider 02771G TELECOMMUNICATIONS AND IT NETWORK ENGINEERING: Advanced Diploma Program OVERVIEW

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

Get the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively.

Get the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively. Cisco CCNP - HD Telepresence TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) 2.0 Get the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively.

More information

Chapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks

Chapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks 0: Review and Preparation for Troubleshooting Complex Enterprise Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Chapter TSHOOT 1v6 0 1 0 Objectives Review key maintenance and troubleshooting

More information

Missoula County Public Schools Job Description

Missoula County Public Schools Job Description Missoula County Public Schools Job Description Job Classification: Network Coordinator Bargaining Unit: Merged Missoula Classified Employees Association Reports to/supervised by: Supervisor of Technology

More information

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,

CCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, , CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment

More information

DIS10.1 Ethical Hacking and Countermeasures

DIS10.1 Ethical Hacking and Countermeasures DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for

More information

(Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile:

(Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile: 1 P a g e Amer J. I. El Hilu (Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile: https://www.linkedin.com/in/amerelhilu/ Personal Details Name: Amer

More information

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify. Networking Essentials, Fifth Edition Pearson ucertify

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify.   Networking Essentials, Fifth Edition Pearson ucertify Course Outline Networking Essentials, Fifth Edition Pearson ucertify 07 Apr 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

Certifications Part Two: Security Certifications By Shawn Conaway

Certifications Part Two: Security Certifications By Shawn Conaway Certifications Part Two: Certifications By Shawn Conaway Information security spans many different roles and responsibilities. Growth in the available number of security certifications now provides enough

More information

Cisco Certified Network Associate ( )

Cisco Certified Network Associate ( ) Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that

More information

Cisco IT Essentials v6 Standards Alignment

Cisco IT Essentials v6 Standards Alignment Cisco IT Essentials v6 Standards Alignment Texas Computer Maintenance TEKS ( 130.273) CompTIA A+ (901 & 902) CompTIA IT Fundamentals (FC0-U51) Microsoft Technology Associate (MTA): Windows Operating System

More information

Account Executive / Account Manager

Account Executive / Account Manager Account Executive / Account Manager Job Descriptions: Maintain and build relationship with both existing and new clients Responsible to both SME and Enterprise customers Identify prospects, develop and

More information

Course Schedule January December 2019

Course Schedule January December 2019 Course Schedule January December 2019 Freewater Technologies Service Disabled Veteran Owned Small Business 816 Greenbrier Circle, Suite 201 Chesapeake, VA 23320 (757) 499-6150 www.freewatertech.com Microsoft

More information

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we

More information

Cybersecurity for Service Providers

Cybersecurity for Service Providers Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:

More information

Information and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012

Information and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012 Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus

More information