29 results in Catalog Computing Cyber Security

  • Applications of Finite Element Method: Modelling of optical fibers and Photonic Crystal Fibers

    Online In Finite Element Method, Cyber Security, and 4 more (Show All) In Finite Element Method, Cyber Security, Computing, Emerging Technologies, Photonics & Electro-Optics, Cyber Security (Show less)

    In this module we move from guided wave structures to the use of S parameters for calculating Reflection/Transmission at interfaces and ports. This has application in multiple fields.  We will through 4 examples cover simple Fresnel reflection to anti reflection coatings, polar dielectric layers and plasmonic structures.What you will learn:Build a model for optical fibers and photonic crystal fibersExplain the concept of S parametersCompute reflection and transmission from optical interfacesThis course is part of the following course program:Finite Element Method for PhotonicsCourses included in this program:Introduction to Numerical MethodsThe Basics of Finite Element MethodApplications of Finite Element Method: Modelling of multilayer stacks/anti-reflection coatingsApplications of Finite Element Method: Modelling of optical waveguides and fibersWho should attend: Electrical engineer, Systems engineer, Hardware engineer, Design engineer, Product engineer,  Communication engineer, Lead engineer, Project engineerInstructorArti AgrawalArti Agrawal is an expert in numerical modelling methods for Photonics and has co-authored a text book “Finite element modelling methods for Photonics” published by Artech House as well as edited a book, “Recent Trends in Computational Photonics” published by Springer. She is currently an Associate Professor in the School of Data and Electrical Engineering at University of Technology Sydney. Her research interests are modelling of photonics devices: spiral fibres, solar cells, photonic crystals etc. and development of numerical methods. Arti is a Chartered Engineer and Chartered Physicist as well as a Senior Member of IEEE. She writes a blog http://artiagrawal.wordpress.com.Publication Year: 2019ISBN: 978-1-5386-8597-6

    English (United States)

  • Cloud Security

    Online In Ethical Hacking, Cyber Security, and 3 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Cyber Security (Show less)

    Cloud computing is causing a transformational shift that touches almost every part of the technology landscape. This video course presents a picture of threat vectors in cloud services, and the unique architectural considerations for securing assets as they move through cloud providers. The security challenges that result from the loss of control over information assets in the cloud, and how a more complex regulatory environment augments those challenges are also discussed. What you will learn:Summarize threat vectors in cloud servicesDiscuss architectural considerations for securing assetsDescribe security challenges in cloud servicesDiscuss cloud security standardsThis course is part of the following course program:Cyber Security Tools for Today's EnvironmentCourses included in this program:Data Security in the CloudIntroduction to Penetration TestingSystem Fundamentals for Cyber SecurityCryptography FundamentalsFootprintingMobile Device SecurityNetwork SniffingSocial Engineering for Cyber SecurityWeb Server & Web Application SecurityWiFi and Bluetooth SecurityWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean Oriyano Sean Oriyano Photo Sean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security. As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor. Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media. Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio. To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies. Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops. Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed. When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta. He also enjoys traveling, bodybuilding, training and MMA. Publication Year: 2016 ISBN: 978-1-5090-0535-2

    English (United States)

  • Cryptography Fundamentals

    Online In Ethical Hacking, Cyber Security, and 4 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    When storing and transmitting data, it's important to secure your data in such a way that only those for whom it is intended can read/process it. Cryptography is a method to ensure this security. This course will explore areas of cryptography. Topics covered will include symmetric and asymmetric encryption, as well as hashing and steganography. Finally the course will examine the language of cryptography and where it plays a major role.What you will learn:Explain functions of cryptographyProvide examples of symmetric and asymmetric encryption algorithmExplain the role of digital certificatesThis course is part of the following course program:Cyber Security Tools for Today's EnvironmentCourses included in this program:Cloud SecurityData Security in the CloudIntroduction to Penetration TestingSystem Fundamentals for Cyber SecurityFootprintingMobile Device SecurityNetwork SniffingSocial Engineering for Cyber SecurityWeb Server & Web Application SecurityWiFi and Bluetooth SecurityWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean OriyanoSean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security.  As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media.  Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio.  To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops.  Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta.  He also enjoys traveling, bodybuilding, training and MMA.Publication Year: 2016ISBN: 978-1-5090-0519-2

    English (United States)

  • Cyber Security Tools for Today's Environment

    Course Program In Ethical Hacking, Recommended Courses, and 5 more (Show All) In Ethical Hacking, Recommended Courses, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    Cyber Security Tools for Today's Environment is designed to help businesses improve their security techniques, and is ideal for technical professionals across all industries who support their company's IT departments and require up-to-date information on how to protect enterprise networks from potential threats. These courses are intended for mid to advanced career professionals in IT, computer science, and related fields that are looking to enhance their knowledge and stay current in the field of cyber security.What you will learn:Threat vectors in cloud services and data securityPenetration testing to determine vulnerabilitiesNetwork sniffing and encryptionWeb servers and application security and footprintingWiFi, Blutooth and mobile device securityCourses included in this program:Cloud SecurityData Security in the CloudIntroduction to Penetration TestingSystem Fundamentals for Cyber SecurityCryptography FundamentalsFootprintingMobile Device SecurityNetwork SniffingSocial Engineering for Cyber SecurityWeb Server & Web Application SecurityWiFi and Bluetooth SecurityCourse Program Length: 11 hoursProgram Level: IntermediateWho Should Attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean Oriyano, a veteran of the IT and information security field with almost three decades of practical, hands-on experience in the subjectPublication Year: 2017ISBN: 978-1-5090-0545-1

    English (United States)

  • Data Security in the Cloud

    Online In Ethical Hacking, Cyber Security, and 4 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    The move to Cloud services introduces many new and complex issues related to data security. This video course addresses the threats to data security as they relate to the Cloud, and offers a review of the technologies that work together to create a robust Data Loss Prevention (DLP) architecture. Core concepts such as Encryption and Key Management are discussed, as well as strategies for the development of an enterprise-wide DLP policy. What you will learn:Describe data security concerns in the cloudDiscuss data loss prevention (DLP) strategiesDiscuss DLP technology trendsThis course is part of the following course program:Cyber Security Tools for Today's EnvironmentCourses included in this program:Cloud SecurityIntroduction to Penetration TestingSystem Fundamentals for Cyber SecurityCryptography FundamentalsFootprintingMobile Device SecurityNetwork SniffingSocial Engineering for Cyber SecurityWeb Server & Web Application SecurityWiFi and Bluetooth SecurityWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructor Sean Oriyano Sean Oriyano Photo Sean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security. As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor. Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media. Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio. To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies. Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops. Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed. When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta. He also enjoys traveling, bodybuilding, training and MMA. Publication Year: 2016 ISBN: 978-1-5090-0536-9

    English (United States)

  • Denial of Service Attacks

    Online In Ethical Hacking, Cyber Security, and 4 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    A denial of service is an old, but effective type of cyber attack. In this course, we explore the many forms they can take against a target, including network level and application layer attacks.What you will learn:Describe the impact of denial of service (DOS) attacksExplain different types of DOS attacksDescribe defense methods for DOS attacks This course is part of the following course program:Hacking Your Company: Ethical Solutions to Defeat Cyber AttacksCourses included in this programEthical Hacking: ScanningEthical Hacking: EnumerationEthical Hacking: System HackingEthical Hacking: Malware FundamentalsEthical Hacking: Session HijackingEthical Hacking: SQL InjectionsEthical Hacking: Evasion TechniquesWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean OriyanoSean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security.  As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media.  Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio.  To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops.  Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta.  He also enjoys traveling, bodybuilding, training and MMA.Publication Year: 2016ISBN: 978-1-5090-0541-3

    English (United States)

  • Ethical Hacking: Enumeration

    Online In Ethical Hacking, Cyber Security, and 4 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    This course reviews the concept of enumeration. Enumeration is the process of identifying resources on a network, and extracting information from a system. Techniques for retrieving information such as usernames, sharenames, network information and other vital pieces of information will be discussed.What you will learn:Explain what enumeration isSummarize points of weakness and ports of interest for conducting enumerationDescribe how NetBios worksExplain how enumeration works in Unix and Linux system  This course is part of the following course program:Hacking Your Company: Ethical Solutions to Defeat Cyber AttacksCourses included in this programEthical Hacking: ScanningEthical Hacking: System HackingEthical Hacking: Malware FundamentalsDenial of Service AttacksEthical Hacking: Session HijackingEthical Hacking: SQL InjectionsEthical Hacking: Evasion TechniquesWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean OriyanoSean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security.  As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media.  Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio.  To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops.  Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta.  He also enjoys traveling, bodybuilding, training and MMA.Publication Year: 2016ISBN: 978-1-5090-0529-1

    English (United States)

  • Ethical Hacking: Evasion Techniques

    Online In Ethical Hacking, Cyber Security, and 4 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions.What you will learn:Explain how different types of Intrusion Detection systems (IDS) workDescribe IDS detection methodsProvide examples of malicious behaviors that can be detected by IDSThis course is part of the following course program:Hacking Your Company: Ethical Solutions to Defeat Cyber AttacksCourses included in this programEthical Hacking: ScanningEthical Hacking: EnumerationEthical Hacking: System HackingEthical Hacking: Malware FundamentalsDenial of Service AttacksEthical Hacking: Session HijackingEthical Hacking: SQL InjectionsWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean OriyanoSean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security.  As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media.  Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio.  To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops.  Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta.  He also enjoys traveling, bodybuilding, training and MMA.Publication Year: 2016ISBN: 978-1-5090-0532-1

    English (United States)

  • Ethical Hacking: Malware Fundamentals

    Online In Ethical Hacking, Cyber Security, and 4 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    Malware is harmful software that is intended to cause damage or to disable computers and networks. This course takes an in-depth look at the nature of malware and its many different forms. Topics covered will include viruses, Trojans, rootkits, buffer overflows and other related forms of malware.What you will learn:Summarize forms of malwareExplain how computer worms workDescribe steps to create computer virusesSummarize methods of spyware injectionThis course is part of the following course program:Hacking Your Company: Ethical Solutions to Defeat Cyber AttacksCourses included in this programEthical Hacking: ScanningEthical Hacking: EnumerationEthical Hacking: System HackingDenial of Service AttacksEthical Hacking: Session HijackingEthical Hacking: SQL InjectionsEthical Hacking: Evasion TechniquesWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean OriyanoSean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security.  As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media.  Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio.  To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops.  Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta.  He also enjoys traveling, bodybuilding, training and MMA.Publication Year: 2016ISBN: 978-1-5090-0524-6

    English (United States)

  • Ethical Hacking: SQL Injections

    Online In Ethical Hacking, Cyber Security, and 4 more (Show All) In Ethical Hacking, Cyber Security, Computing, Emerging Technologies, Ethical Hacking, Cyber Security (Show less)

    SQL injections are a powerful, but complex attack that can be used to strike out at web applications and their databases. This course explores how an SQL attack could alter, steal, or remove data without necessarily "hacking" a target.What you will learn:Explain the key concepts of SQL injectionsDescribe vulnerabilities in databasesList countermeasure for SQL injectionsThis course is part of the following course program:Hacking Your Company: Ethical Solutions to Defeat Cyber AttacksCourses included in this programEthical Hacking: ScanningEthical Hacking: EnumerationEthical Hacking: System HackingEthical Hacking: Malware FundamentalsDenial of Service AttacksEthical Hacking: Session HijackingEthical Hacking: Evasion TechniquesWho should attend: Electrical Engineer, Software Engineer, Design Engineer, AI/ML Engineer, Computer Engineer, Systems Engineer, Communications, Product Engineer, Lead Engineer, Project Engineer, QA/Quality Engineer, IT Director/Manager/Consultant/Auditor, Security Consultant/Manager, Security Auditor/Architect, Security Systems Engineer, Chief Information Security Officer, Chief Compliance/Privacy/Risk Officer, Network Specialist/Analyst/Manager/Architect/Consultant/Administrator, Technical Support Engineer, Systems Analyst/AdministratorInstructorSean OriyanoSean Oriyano is a seasoned security professional and entrepreneur. Over the past 25 years he has split his time between writing, researching, consulting and training various people and organizations on a wide range of topic relating to both IT and security.  As an instructor and consultant Sean has traveled to all different places all over the world sharing his knowledge as well as gaining exposure to many different environments and cultures along the way. His broad knowledge and easy to understand manner, with a healthy dose of humor, have led to Sean being a regularly requested instructor.Outside of training and consulting Sean is also a best-selling author with many years experience in both digital and print media.  Sean has published books for McGraw-Hill, Wiley, Sybex, O'Reilly Media and Jones & Bartlett. Over the last decade Sean has also expanded his reach even further by appearing on shows in both TV and radio.  To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cyber security topics and technologies.Outside his own business activities Sean is a member of the military as a Chief Warrant Officer specializing in infrastructure and security as well as the development of new troops.  Additionally, as a CWO he is recognized as a Subject Matter Expert in his field and is frequently called upon to provide expertise, training and mentoring wherever needed.When not working Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta.  He also enjoys traveling, bodybuilding, training and MMA.Publication Year: 2016ISBN: 978-1-5090-0531-4

    English (United States)

Can't find what you're looking for?  Make a content suggestion!