Juan R. Reyes, CISSP Kelly Drive, Point Venture, TX
|
|
- Godwin Garrison
- 5 years ago
- Views:
Transcription
1 Juan R. Reyes, CISSP Kelly Drive, Point Venture, TX EDUCATION M.S. Computer Information Systems, 3.77 GPA - St. Edward s University, MCIS Intellectual Property & Cyber Law MGMT Managing the Organization MCIS Database Systems MCIS Strategic & IT Management MCIS Internet & Network Technologies MCIS Data Security Management MCIS Modern Methods Software Engineering MCIS Business Intelligence Methods MCIS Project & Change Management MCIS Operating Systems MCIS 6350 Capstone: Proposal for Master of Science in Information Security Degree MCIS Business Continuity & Disaster Recovery B.A. English, 3.14 GPA - University of Maryland University College, PROFESSIONAL CERTIFICATIONS CISSP certified in January ISC 2 Certified Information Systems Security Professional CISM certified in August ISACA Certified Information Systems Manager CISA certified in February ISACA Certified Information Systems Auditor GCIA certified in February GIAC Certified Intrusion Analyst GCIH certified in February GIAC Certified Incident Handler CEH certified in March EC-Council Certified Ethical Hacker CCNA Security certified in March 2010 TippingPoint Certified Security Expert - TCSE certified in June 2010 ARTICLES, PUBLICATIONS, AND PRESENTATIONS Developing Secure Software A Project Manager's Approach A_Project_Mana ger%27s_approach Tuning IPS, A Vendor Platform Agnostic Guide
2 EXPERIENCE AT&T Senior Security Analyst 08/12 - Present Staffed through Genesis Networks. Perform security analysis, security posture assessment, and security policy development consultation as part of the State of Texas Department of Information Resources (DIR) Network Security Operations Center (NSOC) and for more than 120 state government agencies. Analyze events generated by security appliances and alert the appropriate agency with security event information and resolution consultation. Run scans and vulnerability assessments on single hosts and full networks and provide findings in reports and recommendations on how to fix vulnerabilities. Prepare daily and weekly security activity reports for senior management viewing. Consult on internal teams that work to improve administrative and technical security processes. Manage the installation, testing, and evaluation of security technologies as part of proof-ofconcept evaluations. Serve as the NSOC technical liaison for two external MSSP vendors. Create and present security training material to State of Texas government agency Information Security Officers (ISOs). Hewlett-Packard Technical Solutions Consultant IV 07/09-08/12 Provided Tier III support in the HP TippingPoint Technical Assistance Center. Troubleshoot complex configurations on HP TippingPoint Intrusion Prevention Systems (IPS) and give design and configuration recommendations to users improving their posture against application, infrastructure, and performance threats. Identify issues related to IPS hardware, TippingPoint Operating System, and IPS configurations. Analyze packet captures in Wireshark to identify traffic anomalies and potential security threats. Accept escalations from management, customers, and Tier II engineers and drive to resolution effectively and expeditiously. Coordinate troubleshooting activities between HP TippingPoint development engineers and customer users. Document processes on internal wiki and mentor Tier II engineers to improve their troubleshooting skills. Cisco Systems, Inc. Customer Support Engineer II 10/01-07/09 Provide Tier III support for national and international customer enterprise networks as a member of the Quality Engineering Team.
3 Configured and troubleshot PKI, PAP, CHAP, IPSec, GRE, and DMVPN across various Cisco platforms for major customer accounts. Configured and troubleshot router access control lists. Performed security advisory analysis for the ROS business unit as a member of the Cisco Product Security Incident Response Team (PSIRT) by gathering affected hardware and software platforms supported by the business unit using SQL queries. Wrote detailed specifics about the impact of the pending Cisco security advisory public announcement for internal engineering team distribution. Resolved escalated outages and service degradation issues on T1, E1, T3, OC-3, multi-link, IMA, Metro Ethernet, PRI and BRI ISDN, DSL and Cable Modem access services. Resolved outages and service degradation on Frame Relay, ATM, MPLS, and HDLC circuits. Performed troubleshooting and configuration of BGP, EIGRP, RIP and OSPF routing protocols. Worked with inter-exchange carriers, local exchange carriers, Internet service providers, equipment vendors, cabling vendors and customers to resolve connectivity issues. Composed root cause analysis and post-mortem reports. MCI WorldCom, Inc. Telecom Technician III 11/00-10/01 Provided technical support in the Priority Clients Technical Services Center to meet availability SLAs. Performed remote troubleshooting and resolved customer outages and service degradation on Frame Relay circuits and DDS, T1, and T3 transport circuits. Accessed Frame Relay switches, DACs, and local loop test sets to identify network issues. Opened, tracked, and escalated trouble tickets with the LEC and internal support teams. Designed and taught a DSL training course. NorthPoint Communications Broadband Services Support Engineer 04/00-10/00 Staffed through Broadbay Networks. Isolated and resolved outage and degradation conditions on a national Digital Subscriber Line network to meet availability SLAs. Accessed network Frame Relay and ATM switches, DSLAMs, and local loop test sets to identify and resolve faults. Interfaced with the LEC to drive outages and service degradation to resolution. Dispatched technicians to sites for troubleshooting and replacement of equipment and wiring. Accepted escalations from customers and management and followed through to final resolution. Supervised 17 technicians for two Internet Service Provider teams.
4 Lucent Technologies, Inc. Engineering Lab Technician 01/00-04/00 Staffed through Applied Concepts, Inc. Performed fault isolation on Stratus Continuum redundant systems running HP-UX operating system. Identify and replace faulty components and peripherals. Install custom configurations of Ethernet and fiber-optic LAN cabling per specifications of the test engineers. ADAX, Inc Network Hardware Electronics Technician 04/99-01/00 Performed test, verification, and fault isolation to electronic component level on Frame Relay and ATM switching cards and T1/E1 CSU/DSU units using oscilloscope, schematics, and digital voltmeter. Performed solder repair and modification on surface-mount and through-hole electronic components. Acted as IT support for the production department by maintaining and troubleshooting test workstations running Windows NT and Solaris. Wrote equipment test scripts in Korn Shell on Solaris platform. Netscape Communications Information Systems Support Technician 11/96-09/98 Staffed through Endymion Systems, Inc. Performed installation and configuration of Microsoft 95/98/NT operating systems and MS Office suite on PC laptop and desktop systems. Performed custom hardware configuration per customer request. Supervised crews of 5-7 people on Moves, Adds, and Changes projects ranging in size from end users. Performed fault isolation on TCP/IP network identifying DHCP, DNS, routing, LAN cabling, and workstation configuration issues. U.S. Air Force Television and Intrusion Detection Systems Specialist 08/89-02/95 Performed installation, operational checks, inspection, troubleshooting, repair, calibration, modification, testing, and performance analysis of CCTV and physical intrusion detection systems. Provided maintenance support on pan and tilt cameras, coaxial cable, display monitors, infrared motion sensors, Doppler-Effect-based motion sensors, card access readers, buried seismic sensors, door and window balance magnetic switch sensors, hand geometry unit biometric readers, entry-point mantraps, access code keypads, low-voltage wiring, and annunciator consoles.
5 TRAINING Kepner-Tregoe Resolve troubleshooting methodology April 2009 TippingPoint Expert Technical Security Products - June 2010 TippingPoint Advanced Technical Security Products - August 2009 VMware Infrastructure vsphere 4.0 Ultimate Bootcamp - February 2010 H3C Comware v5 Switches Installation and Administration - April 2010 ArcSight Essentials - June 2012 SANS 503 Intrusion Detection In-Depth - January 2013 SANS 504 Hacker Techniques, Exploits & Incident Handling December 2013 SKILLS Packet analysis, TCP/IP, routing, switching, penetration testing, network design, security architecture design, network diagramming in MS Visio, anti-virus administration, system patching, SIEM rule correlation design, NetWitness forensics tool, Cisco IPS, TippingPoint IPS, FireEye MPS, Snort IDS, 21CT Lynxeon Network Analysis, Security Onion, nmap, Nessus, Metasploit, Splunk, BackTrack Linux, ArcSight SIEM, QRadar SIEM, McAfee Nitro SIEM, AlienVault SIEM, Wireshark, tcpdump, VMware vsphere.
Mohammad Shahadat Hossain
Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network
More informationDIS10.4ADVANCED NETWORK SECURITY
DIS10.4ADVANCED NETWORK SECURITY ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information
More informationCCNA and CCNP (Routing) with 12 years of experience Networking/Security Domain, Currently working with Cognizant as a Infra Ops SpecialistPune.
Sanjay Kumar Swami Email: Sanjay.swami@hotmail.com Cell +91-8105959777 Pune OBJECTIVE: IT NETWORK Professional Summary OBJECTIVE Intend to build a challenging career in a professionally managed, progressive
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationDIABLO VALLEY COLLEGE CATALOG
COMPUTER NETWORK TECHNOLOGY CNT Despina Prapavessi, Dean Math and Computer Sciences Division Math Building, Room 267 Possible career opportunities These CNT-courses prepare students for a career path in
More informationNetwork Engineering/Cyber Security I & II
Network Engineering/Cyber Security I & II Program Description: The first year course teaches the basic techniques of computer safety and maintenance. Students learn to assemble/disassemble personal computers
More informationBUILDING AND MAINTAINING SOC
BUILDING AND MAINTAINING SOC Digit Oktavianto KOMINFO 7 December 2016 digit dot oktavianto at gmail dot com 1 Digit Oktavianto Profile in 1 Page Currently working as a Security Architect Professional Certifications:
More informationCCNA Cybersecurity Operations 1.1 Scope and Sequence
CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding
More informationJob Specification & Recruiting Profile of Vacancy
Job Specification & Recruiting Profile of Vacancy 26 March 2019 The following vacancy exists at NSFAS in Cape Town. Position Information Security Analyst Type & Grade Permanent, Grade 11 Vacancy No 76
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationComputer Network Engineering
Computer Network Engineering 221 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
More informationEC-Council - EC-Council Certified Security Analyst (ECSA) v8
EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals
More informationSecurity Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:
Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security
More informationComputer Network Engineering
218 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
More informationREV: 04/04/16 INFORMATION SECURITY ANALYSTS
REV: 04/04/6 INFORMATION SECURITY ANALYSTS Occupation Overview: Information Security Analyst Foundational Competencies Reading Comprehension: Understanding written sentences and paragraphs in work-related
More informationIngram Micro Cyber Security Portfolio
Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training
More informationCCNP ROUTING & SWITCHING
CCNP ROUTING & SWITCHING ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various kinds of products
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationCCNA Cybersecurity Operations. Program Overview
Table of Contents 1. Introduction 2. Target Audience 3. Prerequisites 4. Target Certification 5. Curriculum Description 6. Curriculum Objectives 7. Virtual Machine Requirements 8. Course Outline 9. System
More informationSECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH
SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationWAN Technology & Design. Dr. Nawaporn Wisitpongphan
WAN Technology & Design Dr. Nawaporn Wisitpongphan 1 WAN Connection Modules 2 WAN Comparison 3 Integrated Services Digital Network (ISDN) All-digital phone line connection Technology since 1980s Allow
More informationYOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS
YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS Security & Intellectual Property Protection Overview Certified ISO 27001:2013 Meet security requirements from global clients Passed all security
More informationThe CEH exam (312-50) is available at the ECC Exam Centre and Pearson Vue testing centers.
What is an Ethical Hacker? To beat a hacker, you need to think like one! Ethical Hacking is often referred to as the process of penetrating one s own computer/s or computers to which one has official permission
More informationDIS10.4. DIS10.4: In-depth Advanced Networking. Online Training Classroom Training Workshops Seminars. Data and Information security Council of India
Online Training Classroom Training Workshops Seminars DIS10.4 Data and Information security Council of India DIS10.4: In-depth Advanced Networking Networking is for Networkers!!!!! What is DIS? DIS is
More informationClick to edit Master title style. DIY vs. Managed SIEM
DIY vs. Managed SIEM Meet Paul Paul Caiazzo Principal, Chief Security Architect CISSP, CISA, CEH M.S. Information Security and Assurance 15+ years of experience in Information Security Connect with me:
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationIT Technician Pathways Course Guide
IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100
More informationScope and Sequence: CCNA Exploration v4.0
Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are
More informationCIT 480: Securing Computer Systems. Putting It All Together
CIT 480: Securing Computer Systems Putting It All Together Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database.
More informationCCIE ROUTING & SWITCHING V5.0
CCIE ROUTING & SWITCHING V5.0 Overview The CCIE Routing and Switching Lab Exam version 5.0 is an eight-hour, hands-on exam which requires you to configure and troubleshoot a series of complex networks
More informationDIS10.3:CYBER FORENSICS AND INVESTIGATION
DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information
More informationCareer Paths In Cybersecurity
Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double
More informationNetwork & Computer Systems Operators
A COLLECTION OF INTERVIEW QUESTIONS FOR Network & Computer Systems Operators COMMON QUESTIONS What is your favourite technology platform? (Microsoft, Linux, Apple) What brought you to the technology industry?
More informationScope and Sequence: CCNA Discovery v4.0
Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and
More informationSkillsoft Pre-Approved for CompTIA CEUs
Skillsoft Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based on prior approval will remain valid.
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationDiploma in Network (LAN/WAN) Administration
Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a
More informationCourse Outline. Networking Essentials, Fifth Edition Pearson ucertify Labs.
Course Outline Networking Essentials, Fifth Edition Pearson ucertify 22 Apr 2019 Contents 1. Course Objective 2. Expert Instructor-Led Training 3. ADA Compliant & JAWS Compatible Platform 4. State of the
More informationCompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs)
CompTIA Security+ Pre-approved Training for CompTIA Security+ Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training
More informationCISCO CERTIFIED INTERNETWORK EXPERT (CCIE)
CISCO CERTIFIED INTERNETWORK EXPERT (CCIE) ABOUT US WHO WE ARE CRAW Security is a Training and Consulting Company with high industry training and consulting Standards. CRAW Security Deals with various
More informationINFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II
Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst
More informationFederal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs
Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least
More informationCITY OF MONTEBELLO SYSTEMS MANAGER
CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationFarzad Diba 333 East Juniper Court Mequon, WI (414)
Farzad Diba 333 East Juniper Court Mequon, WI 53092 farzad@farzaddiba.com (414) 301-3279 PROFESSIONAL SUMMARY Experienced leader motivated by complex problems, strategic initiatives and organizational
More informationCCNA-A Scope and Sequence (March 2007-Draft)
CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions
More informationScope and Sequence: CCNA Discovery
Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationScope and Sequence: CCNA Discovery
Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level
More informationBuilding Secure Systems
Building Secure Systems Antony Selim, CISSP, P.E. Cyber Security and Enterprise Security Architecture 13 November 2015 Copyright 2015 Raytheon Company. All rights reserved. Customer Success Is Our Mission
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationCyberSecurity: Top 20 Controls
CyberSecurity: Top 20 Controls ISACA Kampala Chapter CPD Event - 30 March 2017 By Bernard Wanyama - CISA, CGEIT, CRISC, CISM Assume breach.. The CIS Top 20 Critical Security Controls CIS, SANS, NSA and
More informationHRSD Position Description: UNIX Systems Administrator
HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position
More informationCACI USSOCOM IT EOM REQUIREMENTS
Labor Category Certifications Experience Asset Manager ITIL Foundations Five years of experience in an IT and asset management role. Prior experience with Microsoft Enterprise Licensing is highly valued.
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationCISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)
Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours
More informationCCNA Exploration Network Fundamentals
CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing
More informationCPTE: Certified Penetration Testing Engineer
www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification
More informationSenior Technical Consultant
Senior Technical Consultant Department Service Department Reporting to Service Manager Our Company Wanstor is an IT Solutions Company celebrating their 16 th year in business. The company has grown year
More informationCybersecurity Employment SecureNinja
Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,
More informationUnlocking Potential Through Learning
Unlocking Potential Through Learning CORPORATE HEAD OFFICE: 6, Babatola Drive, Off Obafemi Awolowo way, Behind Awolowo Glass house, Ikeja, Lagos. 08 Training Calender @ Newhorizonsnige @ new horizon solution
More informationCisco 2: Routing Technologies
Western Technical College 10150120 Cisco 2: Routing Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 The emphasis
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationMcafee Network Intrusion Detection System. Project Report >>>CLICK HERE<<<
Mcafee Network Intrusion Detection System Project Report Selecting an intrusion detection and prevention system vendor can be a IDS/IPS protection, the current network configuration and the project budget,
More informationEthical Hacking & Information Security. Justin David G. Pineda Asia Pacific College
Ethical Hacking & Information Security Justin David G. Pineda Asia Pacific College Topics for today: Is there such thing as ethical hacking? What is information security? What are issues that need to be
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationNetwork Infrastructures & Service Provisioning
Network Infrastructures & Service Provisioning About Program Who May Apply? Learning Environment Program Overview Program Architecture Partnership with Industry Index Who is Who? 2 Index Introduction Preface
More informationCisco Intrusion Detection System User Guide Ace
Cisco Intrusion Detection System User Guide Ace attack vector, can be exploited locally on the vulnerable device, require user interaction, Effective use of Cisco Intrusion Prevention System (IPS) event
More information"Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary
Course Summary Description This course is designed to help network professionals improve the skills and knowledge that they need to maintain their network and to diagnose and resolve network problems quickly
More informationMohamed Moussad Mohamed Ibrahim Systems Engineer. Preface:
Preface: Egyptian 00966507972396 Eng_moh.mosad86@yahoo.com 9 / 9 /1986 Married Holding a bachelor degree in Systems and Control Engineering in 2008 Mansura University - Very Good with honor degree Ratio
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationOne Hospital s Cybersecurity Journey
MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital
More informationA UNIVERSAL SECURITY GATEWAY
A UNIVERSAL SECURITY GATEWAY IDS /IPS / HTTP AV/ Web Content Filter / Web Load Balancer / Web Reverse Proxy / Multi-line Internet / Network IP &Protocol Monitor / IP Reputation Blocker / Captive Portal
More informationInformation Security Architecture Gap Assessment and Prioritization
FEATURE Information Security Architecture Gap Assessment and Prioritization Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find
More informationMicrosoft Certified Professional Transcript
Last Activity Recorded: November 06, 2009 Microsoft Certified Professional PETER MARIAN GORLICKI Holstenstr. 96 Kiel 24103 DE peter.gorlicki@tcp4it.de Microsoft Certification Status Credential Certification
More informationInformation Security Specialist. IPS effectiveness
Information Security Specialist IPS effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationCompTIA A+ Accelerated course for & exams
CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is
More informationStudy and work in a well paid career. TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING CRICOS Provider 02771G
Study and work in a well paid career TELECOMMUNICATIONS AND IT NETWORKING ENGINEERING www.acit.edu.au CRICOS Provider 02771G TELECOMMUNICATIONS AND IT NETWORK ENGINEERING: Advanced Diploma Program OVERVIEW
More informationManaged Security Services - Endpoint Managed Security on Cloud
Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document
More informationGet the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively.
Cisco CCNP - HD Telepresence TSHOOT: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) 2.0 Get the skills to maintain your networks and to diagnose and resolve network problems quickly and effectively.
More informationChapter 10: Review and Preparation for Troubleshooting Complex Enterprise Networks
0: Review and Preparation for Troubleshooting Complex Enterprise Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Chapter TSHOOT 1v6 0 1 0 Objectives Review key maintenance and troubleshooting
More informationMissoula County Public Schools Job Description
Missoula County Public Schools Job Description Job Classification: Network Coordinator Bargaining Unit: Merged Missoula Classified Employees Association Reports to/supervised by: Supervisor of Technology
More informationCCNA. Murlisona App. Hiralal Lane, Ravivar Karanja, Near Pethe High-School, ,
CCNA Cisco Certified Network Associate (200-125) Exam DescrIPtion: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment
More informationDIS10.1 Ethical Hacking and Countermeasures
DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for
More information(Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile:
1 P a g e Amer J. I. El Hilu (Aws solution architect -Associate, ITIL, CEH, MCSE, Linux, CCNA, Open source expert) LinkedIn Profile: https://www.linkedin.com/in/amerelhilu/ Personal Details Name: Amer
More informationCourse Outline. Networking Essentials, Fifth Edition Pearson ucertify. Networking Essentials, Fifth Edition Pearson ucertify
Course Outline Networking Essentials, Fifth Edition Pearson ucertify 07 Apr 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationCEH: CERTIFIED ETHICAL HACKER v9
CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever
More informationCertifications Part Two: Security Certifications By Shawn Conaway
Certifications Part Two: Certifications By Shawn Conaway Information security spans many different roles and responsibilities. Growth in the available number of security certifications now provides enough
More informationCisco Certified Network Associate ( )
Cisco Certified Network Associate (200-125) Exam Description: The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50 60 question assessment that
More informationCisco IT Essentials v6 Standards Alignment
Cisco IT Essentials v6 Standards Alignment Texas Computer Maintenance TEKS ( 130.273) CompTIA A+ (901 & 902) CompTIA IT Fundamentals (FC0-U51) Microsoft Technology Associate (MTA): Windows Operating System
More informationAccount Executive / Account Manager
Account Executive / Account Manager Job Descriptions: Maintain and build relationship with both existing and new clients Responsible to both SME and Enterprise customers Identify prospects, develop and
More informationCourse Schedule January December 2019
Course Schedule January December 2019 Freewater Technologies Service Disabled Veteran Owned Small Business 816 Greenbrier Circle, Suite 201 Chesapeake, VA 23320 (757) 499-6150 www.freewatertech.com Microsoft
More informationApprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL
Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL WHY CHOOSE QA? There are lots of apprenticeship providers out there but we think we
More informationCybersecurity for Service Providers
Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:
More informationInformation and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012
Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus
More information