Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit

Size: px
Start display at page:

Download "Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit"

Transcription

1 Computer Forensics Training (1005 Hours) Cybercop 315 Windows Artifacts Attended: May 2014 (32 hours) in Phoenix, AZ Advanced Computer Forensic Analysis and Incident Response Attended: February 2014 (36 hours) in Scottsdale, AZ EnCase v7 Transition Course Attended: February 2014 (24 hours) in Phoenix, AZ Cyber Analyst Training Course Presented By: National Computer Forensics Institute Dept. of Homeland Sec. Attended: December 2013 (40 Hours) Point of Sale Investigations (POS) Presented By: National Computer Forensics Institute - US Secret Service Attended: August 2012 (28 hours) in Hoover, AL AccessData 2012 Users Conference (ADUC) Windows 8 Artifacts Hacking Investigations Macintosh Analysis Android Malware Memory Analysis Registry Analysis Browser Forensics Password Recovery Attended May 2012 (19 Hours) in Las Vegas Nevada 2011 Electronic Crimes Special Agent Program Conference (USSS) POS Investigations (5 Hours) Trustwave Sniper Forensics (4 Hours) Trustwave Windows Artifacts (4 Hours) Guidance Software Memory Analysis (4 Hours) CERT Malicious Code Analysis (4 Hours) CERT Other Miscellaneous Training (17 Hours) Attended: August 2011 (38 Hours) in Nashville, TN

2 Dr. Koffman Age Ranging Presented By: Dr. Koffman ICAC Phoenix Attended: November 2010 (2 Hours) in Phoenix, AZ Network Intrusion Response Program (NITRO) Presented By: National Computer Forensics Institute - US Secret Service Attended: July 2010 (112 hours) in Hoover, AL Cybercop Intermediate Data Recovery and Analysis (IDRA) T3 Attended: January 2010 (80 hours) in Phoenix, AZ Cyber-Investigation 260 Secure Techniques for Onsite Preview (STOP) T3 Attended: February 2009 (16 hours) in Fairmont, WV EnCase Advanced Computer Forensics Attended: December 2009 (32 hours) in Phoenix, AZ Macintosh Forensic Survival Course Level 1 Presented By: Forward Discovery Attended: June 2009 (40 hours approx.) in Phoenix, AZ Cybercop 401 Linux File System for Forensic Examiners (LINUX) Attended: February 2008 (36 hours) in Phoenix, AZ SANS Hacker Techniques, Exploits, & Incident Handling Attended: February 2008 (36 hours) in Phoenix, AZ IACIS Forensic Computer Examiner Training Program Presented By: The International Association of Computer Investigative Specialists Attended: May 2007 (80 hours) in Maitland, FL SANS Security Essentials Bootcamp Style Attended: February 2007 (46 hours) in Phoenix, AZ

3 EnCase Advanced Internet Examinations Attended: February 2007 (32 hours) in Phoenix, AZ Windows Forensics Presented By: AccessData Attended: December 2006 (21 hours) in Phoenix, AZ Cyber-Investigations 101 Secure Techniques for Onsite Preview (STOP) T3 Attended: October 2006 (16 hours) in Phoenix, AZ Microsoft Law Enforcement Tech 2006 Presented By: Microsoft Attended: October 2006 (21 hours approx.) in Redmond, WA DataLifter Advanced Data Recovery Training Presented By: DataLifter Attended: September 2006 (16 hours) in Phoenix, AZ AccessData BootCamp Presented By: AccessData Attended: September 2006 (24 hours) in Phoenix, AZ EnCase FIM/Mobile Use of EE Live Forensics Attended: August 2006 (32 hours) in Pasadena, CA Cybercop 301 Windows NT Operating Systems and the NT File System (NTx) Attended: July 2006 (36 hours) in Phoenix, AZ EnCase Intermediate Analysis and Reporting Attended: June 2006 (32 hours) in Phoenix, AZ Cybercop 101 Basic Data Recovery and Acquisition (BDRA) Attended: January 2006 (36 hours) in Phoenix, AZ Internet For Investigators

4 Presented By: David Vine Associates, LLC Attended: February 2005 (6 hours) in Phoenix, AZ Cyber-Investigations 101 Basic Online Technical Skills (BOTS) Attended: September 2005 (36 hours) in Phoenix, AZ Computer Forensics Certifications Guidance Software EnCase Certified Examiner (EnCE) 03/21/2012 AccessData AccessData Certified Examiner (ACE) Expired COMPTIA STORAGE+ Certification 09/22/2011 COMPTIA NET+ Certification 12/07/2010 COMPTIA A+ Certification 09/20/2010 IACIS - Certified Forensic Computer Examiner (CFCE) 07/16/2008 SANS - GIAC Certified Incident Handler (GCIH) 07/01/2008 SANS - GIAC Security Essentials Certification (GSEC) 06/30/2007 IACIS - Certified Electronic Evidence Collection Specialist 05/04/2007 Expert Testimony State of Arizona v. Steven Democker CR Homicide Yavapai Superior Court 9/15/2010 & 09/16/2010 State of Arizona v. Steven Democker CR Homicide Yavapai Superior Court 7/24/2013 & 07/25/2013 Additional Qualifications Member of the US Secret Service Electronic Crimes Task Force Contract instructor for the National White Collar Crime Center (NW3C) teaching the following classes:

5 o Cybercop 201 Intermediate Data Recovery and Analysis (IDRA) o Cybercop 101 Basic Data Recovery and Acquisition (BDRA) o Cyber-Investigations 101 Secure Techniques for Onsite Preview (STOP) Arizona Regional Computer Forensics Lab Network and Systems Administrator Minor in Computer Science from Embry-Riddle Aeronautical University (Prescott, AZ) Visual Basic & HTML Programmer Detective since 2003 Education Arizona POST Peace Officer Certification from the Arizona Law Enforcement Training Academy (ALEA) Bachelors of Science in Aeronautical Science, with minors in Computer Science and Aeronautical Safety from Embry-Riddle Aeronautical University (Prescott, AZ) Positions Held at the Department of Public Safety 2006 Present General Investigations Unit Highway Patrol Bureau (Metro Central and East) 1998 March 1999 Police Recruit 11/07/1998 Hire Date Prior Computer-Related Experience Embry-Riddle Aeronautical University o Teacher s Assistant (Professor Tom Lawson, Computer Science) o Webmaster, IBPP (International Bulletin for Political Psychology, Dr. Richard Bloom) o Webmaster, Embry-Riddle Flight Line (Dave Roy) o Aviation Computer Lab Administrator ASCAR Business Systems (Summers during college in Glendale, CA) o Computer Programmer (UNIBASIC) developing software for the transportation industry

Northeast Service Center

Northeast Service Center Northeast Service Center Frank J. Poerio Jr. IAAI-CFI Senior Fire Investigator Newark, NJ 201-874-1757 fpoerio@uis-usa.com EDUCATION: Bergen Community College Criminal Justice Paramus, New Jersey 1994-1996

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Matthew H. Brown Curriculum Vitae. Education

Matthew H. Brown Curriculum Vitae. Education Matthew H. Brown Curriculum Vitae Education Valley City State University o September 2012 to May 2014 o Bachelor of Science in Career and Technical Education North Dakota Highway Patrol Academy, Bismarck,

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

William Jacob Green, CCLO, CCPA, BLE

William Jacob Green, CCLO, CCPA, BLE PROFILE William Jacob Green ( Jake ) has over ten years of forensic investigation experience. Beginning in 2005, Jake was responsible for managing traffic enforcement and collision investigations, having

More information

James (Jim) Sevel. Curriculum Vitae. James (Jim) Sevel. Professional Experience

James (Jim) Sevel. Curriculum Vitae. James (Jim) Sevel. Professional Experience James (Jim) Sevel CEO, Senior Examiner Office: 619.550-1010 Mobile: 619.384-6633 jsevel@sd-df.com San Diego Office: 409 Camino Del Rio S. Suite 102 San Diego, California 92108 www.sd-df.com Professional

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

Education Certificate, Digital Forensics 2012 Edmonds Community College; Lynnwood, WA

Education Certificate, Digital Forensics 2012 Edmonds Community College; Lynnwood, WA Deadbolt Forensics 1915 NW AmberGlen Pkwy, #400 Beaverton, OR 97006 Phone: (503) 683-7138 www.deadboltforensics.com michael@deadboltforensics.com Curriculum Vitae: Michael Yasumoto Experienced expert witness

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

Curriculum Vitae Jason S. Hale Digital Forensic Examiner

Curriculum Vitae Jason S. Hale Digital Forensic Examiner Curriculum Vitae Jason S. Hale Digital Forensic Examiner One Source Discovery E-Mail: jhale [at] onesourcediscovery [dot] com Education M.S. Digital Forensics University of Central Florida December 2013

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President CYBER APPRENTICESHIP Dr. Leigh Armistead, President 1 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a) business with core competencies in IT security, IA and cyber warfare.

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

CYBER APPRENTICESHIP. Dr Leigh Armistead, President

CYBER APPRENTICESHIP. Dr Leigh Armistead, President CYBER APPRENTICESHIP Dr Leigh Armistead, President 1 EVERYBODY HAS THE SAME ISSUE 2 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a), SB with core competencies in IT security,

More information

Building the Cybersecurity Workforce. November 2017

Building the Cybersecurity Workforce. November 2017 Building the Cybersecurity Workforce November 2017 Our Global Footprint Measuring Kaplan University s Educational Impact For every career path +1MM students annually served Facilities in 30+ countries

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Catalog Description:

More information

AccessData offers a broad array of training options.

AccessData offers a broad array of training options. Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass

More information

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes

More information

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst

UPDATED: 10/17/16. Senior Level. Senior Specialty Threat, Consultant, Engineer, Manager. Mid Level Analyst WORKFORCE COLLABORATIVE: CYBERSECURITY BUILDING THE TALENT PIPELINE SECURITY ANALYST CAREER PATHWAY UPDATED: 10/17/16 CYBERSECURITY SECURITY ANALYST CAREER PATHWAY Senior Level Senior Specialty Threat,

More information

R. LeGrande Gardner, PhD, CFCE

R. LeGrande Gardner, PhD, CFCE R. LeGrande Gardner, PhD, CFCE Department of Criminology Florida Center for Cybersecurity (FC 2 ) University of South Florida 4202 East Fowler Ave, SOC 107 Tampa, FL 33620 GRADUATE EDUCATION Virginia Polytechnic

More information

ManTech Advanced Systems International 2018 Security Training Schedule

ManTech Advanced Systems International 2018 Security Training Schedule ManTech Advanced Systems International 2018 Security Training Schedule Risk Management Framework Course Dates Course Location Course Cost February 12 15, 2018 Las Vegas, NV $1,950.00 March 12 15, 2018

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

2017 YEAR END REPORT. 101 Sheriff Dierker Ct. O Fallon, MO Office: Fax:

2017 YEAR END REPORT. 101 Sheriff Dierker Ct. O Fallon, MO Office: Fax: 2017 YEAR END REPORT 101 Sheriff Dierker Ct. O Fallon, MO 63366 Office: 636-949-1848 Fax: 636-949-3059 Email: cybercrime@sccmo.org WWW.STCHARLESCYBER.ORG OVERVIEW Contents: Overview 2017 General Statistics

More information

Forensics for Managers

Forensics for Managers Forensics for Managers x Ryan Washington MBA, CISSP, CCE, CEH, NSA/IAM 703-961-9456 Extension 128 Introduction US Marines, Special Intelligence Communicator Bachelors in Management Masters of Business

More information

Learning Normal with the Kansa PowerShell IR Framework

Learning Normal with the Kansa PowerShell IR Framework Learning Normal with the Kansa PowerShell IR Framework Jason Simsay April 2017 GIAC GSEC GCIH GCIA GCUX GCPM SANS Technology Institute - Candidate for Master of Science Degree 1 1 Objective Prepare now

More information

Essentials to creating your own Security Posture using Splunk Enterprise

Essentials to creating your own Security Posture using Splunk Enterprise Essentials to creating your own Security Posture using Splunk Enterprise Using Splunk to maximize the efficiency and effectiveness of the SOC / IR Richard W. McKee, MS-ISA, CISSP Principal Cyber Security

More information

Immersion Academy Annual Report 2017

Immersion Academy Annual Report 2017 Immersion Academy Annual Report 2017 Accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security systems.

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

Strengthening Cybersecurity Workforce Development December 2017

Strengthening Cybersecurity Workforce Development December 2017 Strengthening Cybersecurity Workforce Development December 2017 Agenda 1. Introduc3ons SANS GIAC Team 2. Goal: 2017 Execu3ve Order 3. SANS GIAC NICE Workforce Framework (NCWF) Mapping Overview 4. Workforce

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9

COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9 COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI) V9 Course Code: 3401 Prepare for the CHFI certification while learning advanced forensics investigation techniques. EC-Council released the most advanced computer

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

Computer Grade 5. Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May

Computer Grade 5. Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May Computer Grade 5 1 st Term Unit: 1, 2 & 3 Total Periods 38 Lab 10 Months: April and May Summer Vacation: June, July and August 1 st & 2 nd week Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 First term (April) Week

More information

Graduates of this qualification will have the minimum qualification to enter the security industry as staff security personnel.

Graduates of this qualification will have the minimum qualification to enter the security industry as staff security personnel. National Certificate in Security (Level 2) This course will teach your staff the basics of working in security. They ll learn about the law, risk management, dealing with emergency situations, conflict

More information

Cybersecurity Training

Cybersecurity Training Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with

More information

Microsoft Certified Professional Transcript

Microsoft Certified Professional Transcript Last Activity Recorded: November 06, 2009 Microsoft Certified Professional PETER MARIAN GORLICKI Holstenstr. 96 Kiel 24103 DE peter.gorlicki@tcp4it.de Microsoft Certification Status Credential Certification

More information

Michigan State Police Cyber Computer Crimes Unit (CCU) & Michigan Cyber Command Center (MC3) Luke Thelen Ron Kraus, CFCE

Michigan State Police Cyber Computer Crimes Unit (CCU) & Michigan Cyber Command Center (MC3) Luke Thelen Ron Kraus, CFCE Michigan State Police Cyber Computer Crimes Unit (CCU) & Michigan Cyber Command Center (MC3) Luke Thelen Ron Kraus, CFCE Topics To Be Covered MSP Cyber Section Internet Crimes Against Children Task Force

More information

SANS Vendor Offerings Detail

SANS Vendor Offerings Detail SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking

More information

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018 GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences

More information

RUSSELL BOHSE.

RUSSELL BOHSE. RUSSELL BOHSE Peekinv@aol.com Peekinv@aol.com Professional Summary Fire Investigator offering over 30 years of both public and private investigation experience specializing in origin and cause and case

More information

GREATER PHOENIX THE CONNECTED PLACE CYBERSECURITY ECOSYSTEM

GREATER PHOENIX THE CONNECTED PLACE CYBERSECURITY ECOSYSTEM 1 GREATER PHOENIX THE CONNECTED PLACE CYBERSECURITY ECOSYSTEM WHY GREATER PHOENIX CYBER DENSITY COMPETITIVE EDUCATED LIVABILITY INFRASTRUCTURE OF FIRMS A robust ecosystem of independent cybersecurity companies

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

Atlantic Coast Service Center

Atlantic Coast Service Center Atlantic Coast Service Center Robert W. Pearson, PE Senior Forensic Civil/Structural Engineer 704-533-3250 rpearson@uis-usa.com EDUCATION: Virginia Tech Blacksburg, Virginia Bachelor of Science in Civil

More information

Auditor General's Office

Auditor General's Office City Purchasing Card Expense Report - January 2011 01/05/2011 National Association of Local Government Auditors $101.40 Professional Development Training: Knighton Award Contract (Webinar) 01/07/2011 The

More information

ITSY Y1 Information Technology Security Course Syllabus _ Page 1 COURSE SYLLABUS. Course Name INFORMATION TECHNOLOGY SECURITY

ITSY Y1 Information Technology Security Course Syllabus _ Page 1 COURSE SYLLABUS. Course Name INFORMATION TECHNOLOGY SECURITY Course Syllabus _ Page 1 COURSE SYLLABUS Course Name INFORMATION TECHNOLOGY SECURITY Course Number 2-4 - 3 Lecture - Lab - Credit NONE Prerequisite This syllabus has been reviewed and is current on the

More information

Course Schedule January December 2019

Course Schedule January December 2019 Course Schedule January December 2019 Freewater Technologies Service Disabled Veteran Owned Small Business 816 Greenbrier Circle, Suite 201 Chesapeake, VA 23320 (757) 499-6150 www.freewatertech.com Microsoft

More information

CRIME ANALYSIS SACRAMENTO COUNTY SHERIFF S DEPARTMENT

CRIME ANALYSIS SACRAMENTO COUNTY SHERIFF S DEPARTMENT 27 February 2018 Five Year Uniform Crime Reporting (UCR) Analysis 2013-2017 Page 1 16 SACRAMENTO COUNTY UNIFORM CRIME REPORT 2013-2017 This report provides a five-year analysis of crime trends within the

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

January-March 2016 Daytime Schedule

January-March 2016 Daytime Schedule January-March 2016 Daytime Schedule Your high expectations meet our high standards! 130 West Mason Springfield 217.524.6749 www.llcc.edu/cctc Schedules available electronically In accordance with Lincoln

More information

DoD Directive (DoDD) 8570 & GIAC Certification

DoD Directive (DoDD) 8570 & GIAC Certification DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: October 2010 What is DoDD 8570? Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management

More information

JOURNAL #5 - June 2018

JOURNAL #5 - June 2018 JOURNAL #5 - June 2018 This Deinocrotonid tick, encased in Burmese amber, was discovered by one of our licensees, Scott R. Anderson. Anderson co-authored an interesting study published in Nature Communications.

More information

Why the Change? 2 updates per year for the course. OS versions are progressing with no signs of slowing

Why the Change? 2 updates per year for the course. OS versions are progressing with no signs of slowing Why the Change? 2 updates per year for the course 1 Major and 1 Minor OS versions are progressing with no signs of slowing Phones become obsolete and need to be replaced with newer devices New methods

More information

Financial Forensic Accounting

Financial Forensic Accounting Financial Forensic Accounting Qualification Scope of Content Version: as at 02 March 2018 6. SCOPE OF CONTENT 1. Digital forensics overview 1.1. History of digital forensics 1.2. Sources of electronic

More information

Certification, Registration and Education of Digital Forensic Experts

Certification, Registration and Education of Digital Forensic Experts Digital Evidence 2008 26-27 27 June 2008 Certification, Registration and Education of Digital Forensic Experts Peter Sommer London School of Economics peter@pmsommer.com p.m.sommer sommer@lse.ac..ac.uk

More information

Microsoft Certified Professional Transcript

Microsoft Certified Professional Transcript Last Activity Recorded: March 12, 2009 Microsoft Certified Professional NEAL WALTERS 1770 PLUMMER DR ROCKWALL, TX 75087 US nwalters@sprynet.com Microsoft Certification Status Credential Microsoft Certified

More information

Atlanta Close Up. January 28, 2014 Snowpocalypse aka Snow Jam

Atlanta Close Up. January 28, 2014 Snowpocalypse aka Snow Jam Atlanta Close Up January 28, 2014 Snowpocalypse aka Snow Jam Panelist Michele Guido - Southern Company Gus Hudson - Atlanta Airport Aston Greene - Metropolitan Atlanta Rapid Transit Authority Michele Guido

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST

NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST NATIONAL INFORMATION TECHNOLOGY AUTHORITY - UGANDA (NITA-U) REGIONAL COMMUNICATIONS INFRASTRUCTURE PROGRAM (RCIP) INFORMATION SECURITY SPECIALIST TERMS OF REFERENCE February 2017 1 TERMS OF REFERENCE FOR

More information

Building the IA Workforce

Building the IA Workforce Building the IA Workforce Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 The First Question What s an IA Professional? The IA field is

More information

Digital Evidence: I know it s there, how do I get it?

Digital Evidence: I know it s there, how do I get it? : I know it s there, how do I get it? January 24, 2019 Matthew Rollins Senior Assistant District Attorney Paulding County Judicial Circuit Josh Reed Network Intrusion Forensic Analyst United States Secret

More information

Professional Experience

Professional Experience Eirene Knott, MCP, CBO, CFM 913-236-3361 eirene.knott@brrarch.com Qualifications: Professional - Bachelor of Science in Construction Science with a Minor in Planning, Master of Science in Management. Over

More information

CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS

CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS CYBER SECURITY TALENT SHORTAGE & INDUSTRY DYNAMICS WHITE PAPER January 2017 January 2017 1 THE PROBLEM PERSONNEL SHORTAGE The demand for skilled cyber security talent is outstripping supply. In 2014, there

More information

Applications for Preservation and Production in our Digital World

Applications for Preservation and Production in our Digital World Applications for Preservation and Production in our Digital World Gavin W. Manes, Ph.D. President, Digital Forensics Professionals, Inc. Research Assistant Professor, The University of Tulsa Background

More information

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

USF Sarasota-Manatee - New Undergraduate Course Proposal Form

USF Sarasota-Manatee - New Undergraduate Course Proposal Form USF Sarasota-Manatee - New Undergraduate Course Proposal Form 1. College/School Contact Information Tracking Number Date & Time Submitted 2 2010-03-29 16:54:18 Discipline College/School Budget Account

More information

Open Cloud Academy: Cyber Security Learning Track. Deborah Carter August, 2016

Open Cloud Academy: Cyber Security Learning Track. Deborah Carter August, 2016 Open Cloud Academy: Cyber Security Learning Track Deborah Carter August, 2016 Open Cloud Academy We are a Rackspace inspired Education Center focused on developing technical talent, and enhancing technical

More information

Bachelor of Applied Science Degree IT NETWORKING

Bachelor of Applied Science Degree IT NETWORKING Bachelor of Applied Science Degree IT NETWORKING Beginning fall 2017! Whatcom Community College s nationally acclaimed computer information systems program will begin offering a bachelor of applied science

More information

Objective: Education:

Objective: Education: Christopher L. Copeland 1008 Westminster Ln., Mansfield TX 76063 817.791.6728 chris@chriscopeland.com ccopeland@tarleton.edu Objective: I am an education professional with significant technical and process

More information

Miami-Dade County Public Schools Office of Human Resources

Miami-Dade County Public Schools Office of Human Resources Miami-Dade County Public Schools Office of Human Resources YOUR LICENSE TO TEACH Welcome to the professional ranks of Miami-Dade County Public School teachers. Teaching is a rewarding and exciting career.

More information

Microsoft Certified Professional Transcript

Microsoft Certified Professional Transcript Microsoft Certified Professional Transcript Last Activity Recorded September 26, 2013 Microsoft Certification ID 1004726 JANE HOWELL F1 Computing Systems Ltd 3 Kelso Place Upper Bristol Road Bath BA1 3AU

More information

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE)

What is the CISSP? Certified Ethical Hacker v8 or higher Certified Forensic Computer Examiner (CFCE) Certified Fraud Examiner (CFE) What is the CISSP? (ISC)2 s Certified Information Systems Security Professional (CISSP ) is the gold standard professional certification for experienced information security and related professionals worldwide.

More information

Chris Vegter University of Northern Colorado Monfort College of Business (970)

Chris Vegter University of Northern Colorado Monfort College of Business (970) Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration

More information

2018 CERTIFICATION TRAINING SCHEDULE COURSE TARGET AUDIENCE FEE JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC

2018 CERTIFICATION TRAINING SCHEDULE COURSE TARGET AUDIENCE FEE JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC CERTIFICATION TRAINING SCHEDULE COURSE TARGET AUDIENCE FEE JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC PECB ISO 9001: Quality PECB ISO 14001: Environmental PECB OHSA 18001: Occupational Health and

More information

COURSE SYLLABUS. Course Name SWITCHING BASICS. Course Number ITCC Y Lecture - Lab - Credit. NONE Prerequisite

COURSE SYLLABUS. Course Name SWITCHING BASICS. Course Number ITCC Y Lecture - Lab - Credit. NONE Prerequisite Course Syllabus _ Page 1 COURSE SYLLABUS Course Name SWITCHING BASICS Course Number ITCC 1340 46Y1 2-4 - 3 Lecture - Lab - Credit NONE Prerequisite This syllabus has been reviewed and is current on the

More information

ALABAMA FIRE COLLEGE AND PERSONNEL STANDARDS COMMISSION ADMINISTRATIVE CODE CHAPTER 360-X-2 REQUIREMENTS FOR CERTIFIED FIRE FIGHTER TABLE OF CONTENTS

ALABAMA FIRE COLLEGE AND PERSONNEL STANDARDS COMMISSION ADMINISTRATIVE CODE CHAPTER 360-X-2 REQUIREMENTS FOR CERTIFIED FIRE FIGHTER TABLE OF CONTENTS Fire College Chapter 360-X-2 ALABAMA FIRE COLLEGE AND PERSONNEL STANDARDS COMMISSION ADMINISTRATIVE CODE CHAPTER 360-X-2 REQUIREMENTS FOR CERTIFIED FIRE FIGHTER TABLE OF CONTENTS 360-X-2-.01 360-X-2-.02

More information

EXHIBIT 1 1 CURRICULUM VITAE YANIV SCHIFF 2 CASES TESTIFIED IN LAST FOUR YEARS 3 RATES CHARGED FOR THIS CASE

EXHIBIT 1 1 CURRICULUM VITAE YANIV SCHIFF 2 CASES TESTIFIED IN LAST FOUR YEARS 3 RATES CHARGED FOR THIS CASE Internal Investigations Trade Secrets Employment Litigation EXHIBIT 1 1 CURRICULUM VITAE YANIV SCHIFF 2 CASES TESTIFIED IN LAST FOUR YEARS 3 RATES CHARGED FOR THIS CASE Headquarters: 226 S. Wabash Ave.,

More information

EXAM - CFA-001. Certified Forensic Analyst (CFA) Buy Full Product.

EXAM - CFA-001. Certified Forensic Analyst (CFA) Buy Full Product. GAQM EXAM - CFA-001 Certified Forensic Analyst (CFA) Buy Full Product http://www.examskey.com/cfa-001.html Examskey GAQM CFA-001 exam demo product is here for you to test the quality of the product. This

More information

BP-S00132 STC BHS DBOM Procurement. Supplemental Investigation Update

BP-S00132 STC BHS DBOM Procurement. Supplemental Investigation Update BP-S00132 STC BHS DBOM Procurement Supplemental Investigation Update Presentation Overview February 9, 2018 PSC Meeting Scope of Supplemental Investigation Expert Investigation and Findings GOAA s Supplemental

More information

COURSE SYLLABUS. Course Name NETWORK+ Course Number ITNW Y Lecture - Lab - Credit. NONE Prerequisite

COURSE SYLLABUS. Course Name NETWORK+ Course Number ITNW Y Lecture - Lab - Credit. NONE Prerequisite Course Syllabus _ Page 1 COURSE SYLLABUS Course Name NETWORK+ Course Number ITNW 1358 46Y1 2-4 - 3 Lecture - Lab - Credit NONE Prerequisite This syllabus has been reviewed and is current on the date indicated.

More information

2018 CERTIFICATION TRAINING SCHEDULE COURSE TARGET AUDIENCE FEE JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC

2018 CERTIFICATION TRAINING SCHEDULE COURSE TARGET AUDIENCE FEE JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC CERTIFICATION TRAINING SCHEDULE COURSE TARGET AUDIENCE FEE JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC PECB ISO 90: Quality PECB ISO 140: Environmental PECB OHSA 180: Occupational Health and Safety

More information

Investigations and Incident Response Using BackTrack

Investigations and Incident Response Using BackTrack Investigations and Incident Response Using BackTrack HTCIA New England Chapter General Meeting September 22, 2009 Ming Chow Tufts University mchow@cs.tufts.edu http://www.cs.tufts.edu/~mchow 1 Introduction

More information

Building Secure Systems

Building Secure Systems Building Secure Systems Antony Selim, CISSP, P.E. Cyber Security and Enterprise Security Architecture 13 November 2015 Copyright 2015 Raytheon Company. All rights reserved. Customer Success Is Our Mission

More information