CURRICULUM VITAE SHON L. HARRIS, CISSP

Similar documents
Mohammad Shahadat Hossain

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Certified Ethical Hacker V9

Certified Ethical Hacker

E-guide Getting your CISSP Certification

CyberVista Certify cybervista.net

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Course 831 Certified Ethical Hacker v9

Shon Harris s Newly Updated CISSP Materials

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Chapter 1 Ethical Hacking Overview. Revised

Tim Heagarty, CISA CISSP - (859) Lexington, KY

Certified Ethical Hacker (CEH)

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Free Cissp Official Isc2 Practice Tests By Mike Chapple

Workforce Certification

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Building Secure Systems

Management Update: Information Security Risk Best Practices

The fast track to top skills and top jobs in cyber. Guaranteed.

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

DIS10.1:Ethical Hacking and Countermeasures

Standard Course Outline IS 656 Information Systems Security and Assurance

DIS10.1 Ethical Hacking and Countermeasures

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

Information Security Officer (ISO) Education

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

A United States Cyber Academy Program

Course Schedule January December 2019

Ethical Hacking and Prevention

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

How Secure is Blockchain? June 6 th, 2017

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Ingram Micro Cyber Security Portfolio

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

CCNA Cybersecurity Operations 1.1 Scope and Sequence

Certified information Systems Security Professional(CISSP) Bootcamp

Hacker Academy UK. Black Suits, White Hats!

Building the Cybersecurity Workforce. November 2017

ITT Technical Institute. IT360 Networking Security I Onsite Course SYLLABUS

IS305 Managing Risk in Information Systems [Onsite and Online]

CYBER SECURITY TRAINING

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Global Security Consulting Services, compliancy and risk asessment services

CEH: CERTIFIED ETHICAL HACKER v9

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

Ethical Hacking & Information Security. Justin David G. Pineda Asia Pacific College

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CSWAE Certified Secure Web Application Engineer

Certified Cyber Security Specialist

Training on CREST Practitioner Security Analyst (CPSA)

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Certified Ethical Hacker - CEH v9 Training & Certification

Opportunities to Integrate Technology Into the Classroom. Presented by:

Negotiations or Clarifications - Do you know the difference?

Job Specification & Recruiting Profile of Vacancy

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

This is to certify that. Chris FitzGerald. has completed the course. Systems Security Engineering _eng 2/10/08

Article II - Standards Section V - Continuing Education Requirements

Open Cloud Academy: Cyber Security Learning Track. Deborah Carter August, 2016

Hacking and Cyber Espionage

ISACA Certifications Overview

CCISO Blueprint v1. EC-Council

CRAW Security. CRAW Security

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

IT Technician Pathways Course Guide

CPTE: Certified Penetration Testing Engineer

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

HCISPP HealthCare Information Security and Privacy Practitioner

locuz.com SOC Services

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

C HFI SCIENCE SECURING FORENSIC. Every crime leaves a trail of evidence. Computer Hacking Forensic Investigator v9 NETWORKS WITH.

ManTech Advanced Systems International 2018 Security Training Schedule

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CIT 480: Securing Computer Systems. Putting It All Together

itsm003 v.3.0 DxCERTS IT & NIST Cybersecurity Workforce Development Training Curriculum & Management Program

PROFESSIONAL SERVICES (Solution Brief)

CERTIFIED FINANCIAL PLANNER BOARD OF STANDARDS, INC. ANONYMOUS CASE HISTORIES NUMBER 30648

Descriptions for CIS Classes (Fall 2017)

RISK MANAGEMENT Education and Certification

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Ethical Hacking Foundation Exam Syllabus

Information Systems and Tech (IST)

The Convergence of Security and Compliance. How Next Generation Endpoint Security Manages 5 Core Compliance Controls

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

American Society for Quality

Transcription:

CURRICULUM VITAE SHON L. HARRIS, CISSP Logical Security, Inc. 9901 I-10 West, Suite 800 San Antonio, Texas 78230 210-566-0488 888-373-5116 888-373-5116 Fax ShonHarris@LogicalSecurity.com www.logicalsecurity.com Shon Harris, Certified Information Systems Security Professional (CISSP) is the founder and CEO of Logical Security, a computer security consultant, a former engineer in the Air Force s Information Warfare unit, an instructor and an author. She has authored two best selling CISSP books, was a contributing author to the book, Hacker s Challenge, a contributing author to the book Gray Hat Hacking, and is currently working on a Certified Ethical Hacker (CEH) book. Ms. Harris has developed a full digital information product series for Pearson publishing. Ms. Harris has taught computer and information security to a wide range of clients, some of which have included Microsoft, Department of Defense, Department of Energy, National Security Agency, Bank of America, Defense Information Systems Agency, RSA, U.S. Military Academy at West Point, and many more. Ms. Harris has consulted for several Fortune 500 companies in the U.S., including Cisco, American Express, Warner Brothers, Bridgestone\Firestone, CitiBank, CitiFinancial, and many more. Her competencies range from setting up risk management programs and developing enterprise network security architectures to constructing enterprise-wide security programs that connects computer security and business needs in a synergistic manner. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine. CURRENT 2003-Present: Shon Harris is the founder and chief executive of Logical Security, Inc. Logical Security is an information and computer security consulting and training company. Logical Security provides services to private and public entities and to law firms as a litigation consultant/expert witness in lawsuits alleging negligent/inadequate security. Services include: Risk Management & Regulatory Compliance Security Management Consultation Secure Enterprise Programs Business Continuity Planning

Security Surveys (Technical & Procedural) Information Security Training Litigation Consultation/Testimony Secure Network Architecture Design EMPLOYMENT HISTORY Two years: Information security contractor for G2, Inc. in Washington DC. Managed consulting teams, developed and deployed: risk management programs, enterprise security architectures, regulatory and legal compliancy services and solutions, awareness training programs, risk assessments and analysis processes and procedures, security policies and standards. Two years: Security engineer in the Air Force Information Warfare Unit in Tacoma, WA. Carried out internal and external network assessments for U.S. bases world-wide. Responsibilities included: performing extensive penetration testing and hacking activities to ensure Air Force military bases and U.S. government systems were safe from information warfare attacks. Recalled to active duty for four months after the 9\11 attacks. Two years: Trainer and curriculum developer and contractor for Intense School in Ft. Lauderdale, FL. Trained security professionals on the following topics; telecommunications and network security, business continuity, physical security, operational security, enterprise networks, law and regulatory compliance, and secure access control technologies. Three years: Security engineer for Getronics in Spokane, WA. Responsibilities included: securing networks and computers at bank branches for CitiFinancial in the U.S., Canada, and Mexico, operational security management for CitiBank branches, deploying on-line banking software solutions and consulting services to financial institutions world-wide. Two years: Resource analyst and network engineer for Software Spectrum in Spokane, WA. Responsibilities included: administrating and maintaining a 500 system network, technical support for various Microsoft operating systems and applications. PROFESSIONAL CERTIFICATION CISSP from the International Information Systems Security Certifications Consortium, Inc. (ISC2) 2. PROFESSIONAL TRAINING Ms. Harris has received extensive professional training from nationally certified instructors in such subjects as: Novell networking, Microsoft operating systems and networking, Cisco networking, telecommunications security, network security, business continuity, physical security, operational security, enterprise networks, legal compliance, and security management metrics.

PROFESSIONAL AFFILIATIONS Current: Information Systems Security Association (ISSA) Information Systems Audit and Control Association (ISACA) Infragard CompTIA San Antonio Chamber of Commerce AUTHOR Ms. Harris is a world-wide recognized expert and published author in the information security field. Ms. Harris has published the following books and products: Certified Information Systems Security Professional (CISSP) All-In-One Exam Guide (5 th Edition) McGraw Hill (ISBN-10: 978-0-07-160217-4 CISSP Practice Exams McGraw Hill (ISBN: 978-0-07-170139-6) Security Information and Event Management (SIEM) Implementation McGraw Hill (ISBN-10: 0071701095) Gray Hat Hacking: The Ethical Hacker s Handbook (3 nd Edition) McGraw Hill (ISBN: 978-0- 07-149568-4) Manual Hackera by Grada Publishing (ISBN: 978-80-247-1346-5) Hacking ẻtico by Anaya Publishing (ISBN-10 # 8441518742) Gray Hat Hacking: Chinese by McGraw Hill Publishing (ISBN: 978-7-302-14615-5) CISSP Passport: by McGraw Hill Publishing (ISBN: 0072225785) Shon Harris CISSP Solution Set by Logical Security (ASIN: B000VAUVOO) CISSP Computer Based Training Video Seminar by Logical Security (ASIN: B000VAUVRG) CISSP Video Mentor by Pearson Publishing (ISBN: 0789740281) CISSP Cert Flash Cards by Pearson Publishing (ISBN: 0789740354) CISSP My Information Technology Certification Labs by Pearson Publishing (ISBN: 0789744791) Shon Harris Systems Security Certified Practitioner (SSCP) Solution Set by Logical Security SSCP Computer Based Training Video Seminar by Pearson Publishing (ISBN: 0789739909) SSCP Video Mentor by Pearson Publishing (ISBN: 0789739518) SSCP Flash Cards by Pearson Publishing (ISBN: 0789739615) SSCP My Information Technology Certification Labs by Pearson Publishing (ISBN: 0789739712) Security+ Computer Based Training Video Seminar by Pearson Publishing (ISBN: 078973964X) Security+ Video Mentor by Pearson Publishing (ISBN: 0789740249) Security+ Flash Cards by Pearson Publishing (ISBN: 0789740281) Security+ My Information Technology Certification Labs by Pearson Publishing (ISBN: 0789744759) CEH Video Mentor by Pearson Publishing (ISBN: 078974029X) CEH Flash Cards by Pearson Publishing (ISBN: 0789740346) CEH My Information Technology Certification Labs by Pearson Publishing (ISBN: 0789744775)

PUBLICATIONS Articles: 802.11 Security Shortcomings, WindowsITpro.com, October 2001 Learning from SQL Slammer, WindowsITpro.com, July 2003 How 802.11i Addresses WEP s Core Deficiencies, WindowsITpro.com, July 2003 NIPS and HIPS, WindowsITpro.com, July 2006 Vulnerability Management, TechTarget.com, January 2005 To Catch a Thief, TechTarget.com, December 2005 Role-based Access Controls, TechTarget.com, May 2007 A Taxonomy of Malicious Software, Logical Security, January 2008 DIACAP Workflow Map, Logical Security, January 2008 History of Cryptography, Logical Security, January 2008 Attaining True Security - The 360 Model, Logical Security, January 2008 Vulnerability Management - Let s Do It Right This Time! Logical Security, January 2008 Self Defending Networks - The New Generation of Protection, Logical Security, January 2008 SELinux and AppArmor: An Introductory Comparison, Logical Security, February 2008 Reinforcing the Security Policy of Linux Systems, Logical Security, February 2008 How do Bots and Botnets Work?, Logical Security, February 2008 A Family of EAP s (or Is It a Flock of EAP;s?), Logical Security, March 2008 How VoIP Really Works, Logical Security, March 2008 What the Botnets Are Netting and for Whom, Logical Security, March 2008 Access Control Methods, Logical Security, March 2008 Introduction to Elliptic Curve Cryptography, Logical Security, March 2008 Introduction to Intrusion Detection Systems, Logical Security, March 2008 Base-Rate Fallacy Considerations, Logical Security, March 2008 What Are the Dangers of Instant Messaging, Logical Security, March 2008 GBL Suggestions, Logical Security, April 2008 Malicious Software: Viruses, Logical Security, May 2008 VOIP, Logical Security, August 2008 Network Scanning Techniques, Logical Security, September 2008 An Introduction to Security in Software Development, Logical Security, September 2008 Fundamentals of Asterisk, Logical Security, September 2008 Firewall, Logical Security, September 2008 Security Audit, Logical Security, September 2008 3 Attack Vectors: Overview, Logical Security, September 2008 3 Attack Vectors: Web Code, Logical Security, September 2008 3 Attack Vectors: DB, OS, Hardware, Logical Security, September 2008 The CISSP Exam is Out of Date, Irrelevant, and Subjective, Logical Security, November 2008 Multi-Protocol Label Switching (MPLS), Logical Security, November 2008 TCP Session Hijacking: the Mitnick Attack, Logical Security, November 2008 How SSL Works, Logical Security, December 2008 What to CISSPs Really Know? Logical Security, December 2008 A Satire of the Security Divas of Today, Logical Security March 2009 Handbook of Malicious Code, Logical Security, June 2009 Security Policies, Logical Security, July 2009 British Standard 7799, Logical Security, July 2009

Who s Who, Logical Security, July 2009 Gramm-Leach-Bliley Act, Logical Security, July 2009 Various Networking Components, Logical Security, July 2009 OMB Circular A-123, Logical Security, July 2009 Regulation Government Agencies, Logical Security, July 2009 An Introduction to Firewalling with iptables and pf, Logical Security, July 2009 Passing the Audit, Logical Security, July 2009 SOX and, Logical Security, July 2009 PCI Standards, Logical Security, July 2009 GLBA Compliance Challenges, Logical Security, July 2009 Steps to Better Secure Your Mac, Logical Security, January 2010 E-mail Threats, Logical Security, January 2010 Basic Security Development Issues, Logical Security, January 2010 Programming Languages, Logical Security, January 2010 Web Security Concepts and Attacks, Logical Security, January 2010 XML Security, Logical Security, January 2010 Cross Site Scripting Attacks, Logical Security, January 2010 Mobile Telephony, Logical Security, January 2010 Enterprise Methodologies, Logical Security, January 2010 Back to School: IT Training Services, Logical Security, January 2010 Role Model, Logical Security, January 2010 Introduction to Security Governance, Logical Security, January 2010 Risk Management Guide, Logical Security, January 2010 Understanding Standards for Risk Management and Compliance, Logical Security, January 2010 Risks Associated with Outsourcing, Logical Security, January 2010 Denying Denial-Of-Service, Logical Security, January 2010 Security Strategies for E-Companies The Science of Secrets, Logical Security, January 2010 802.11 Security Shortcomings, Logical Security, January 2010 Learning from SQL Slammer, Logical Security, January 2010 Greater WLAN Security with 802.11i, Logical Security, January 2010 How 802.11i Addresses WEP s Core Deficiencies, Logical Security, January 2010 Vulnerability Management, Logical Security, January 2010 To Catch a Thief, Logical Security, January 2010 Identity Management, Logical Security, February 2010 Basic Footprinting, Logical Security, March 2010 IT Security Auditors Roles, Logical Security, March 2010 PRESENTATIONS April 2005-LogicalSecurity.com Attacks on Information Systems Increase What to do? April 2005-LogicalSecurity.com Analysis of Information Systems Attacks April 2005-LogicalSecurity.com The 360 Security Model A Holistic approach to Corporate Security April 2005-LogicalSecurity.com Vulnerability Management Let s get it right this time April 2005-LogicalSecurity.com Information Security From Chaos to Structure

September 2008-TechTarget.com CISSP Essentials Training: Domain 1, Security Management Practices September 2008-TechTarget.com CISSP Essentials Training: Domain 2, Access Control September 2008-TechTarget.com CISSP Essentials Training: Domain 3, Cryptography September 2008-TechTarget.com CISSP Essentials Training: Domain 4, Security Models and Architecture September 2008-TechTarget.com CISSP Essentials Training: Domain 5, Telecommunications and networking September 2008-TechTarget.com CISSP Essentials Training: Domain 6, Application and System Development September 2008-TechTarget.com CISSP Essentials Training: Domain 7, Business Continuity September 2008-TechTarget.com CISSP Essentials Training: Domain 8, Law, Investigations and Ethics September 2008-TechTarget.com CISSP Essentials Training: Domain 9, Physical Security September 2008-TechTarget.com CISSP Essentials Training: Domain 10, Operations Security November 2008-LogicalSecurity.com Data Validation Attacks May 2009-LogicalSecurity.com Kerberos July 2009-LogicalSecurity.com Law and Investigation