Accomplished Academic Papers
Cybersecurity Program for (SME) Small and Medium-sized Enterprise Organizations Survival & Continuity
- Cybersecurity program
- Appropriate business strategies to ensure business sustainability, availability, and reliability
- Interpret risk assessments, gap analysis, and current cybersecurity
-
Cybersecurity Training
-
System Design Document
-
Incident Response Management
-
Cybersecurity Test Validation Scheme
-
Cybersecurity Program Maintenance
-
Procedures to track performance
-
Procedures to monitor and measure performance for areas of improvement
-
Procedures to identify new threats, vulnerabilities, or any countermeasures
-
Procedures to obtain feedback on the effectiveness of policies
-
Procedures and technical tools to monitor the internal and external environment
-
Procedures for budget allocation
-
Procedures to catch any oversights
Small and Medium Business Cyber-Security Development Program: Business Cyber-Security Development, Book publication through Amazon Books:
Cyber Security Academic Studies
-
Cyber Warfare and Applications
-
Enterprise Security Infrastructure Design
-
Technology Implementation of Security Solutions
-
Policy Management for Security Solutions
-
Penetration Testing and Risk Management
-
Enterprise Cyber Law and Compliance Strategies
-
Innovation in Security Frameworks
Soft Skills
- Team Building,
- Cross-functional Team Leadership,
- Problem Solving, Management,
- Experienced presentation skills,
- Coaching, and mentoring,
- Endpoint Security documentation & knowledge
Cyber Security
- NIST Standards and Guidance
- NIST SP 800-53, SP 800-37; SP 800-30
- NIST Cybersecurity Framework Version 1.1
- ISO/IEC 27001:2013 & ISO 17799
- HITRUST CSF v9.1, Risk Management Framework 2018
- ITIL, IT Service Management
- Security Project Management
- SOC II, III
- (SDL) Security Development Life-cycle
- (SDLC) Systems development life-cycle
- Information Security Management
- Risk Assessment
- Cyber Security Disaster Recovery
- Enterprise Architecture
- Secure Network Architecture
- Policies for: Securing Public Web Servers, Mobile Security, Electronic Mail, Security Continuous Monitoring, Security Pen Testing, etc..
- Security Document Hierarchy
- Requirements Analysis
- Business Continuity Planning
- Security Risk Management
- Data Management Policies
- Security Incident Responds
Cyber Laws and Regulatory Compliance
- Federal Information Security Management Act (FISMA) 2014 compliance mandates to organizations.
- State Data Breach Laws
- (HITECH) Act 2009, Health Information Technology for Economic and Clinical Health
- (HIPAA) Health Insurance Portability and Accountability Act of 1996
- (SOX) Sarbanes Oxley, Act 2002, sections 302 and 404
- (GDPR) General Data Protection Regulations 2018
- (PCI-DSS) Payment Card Industry -Data Security Standard 2006
- Copyright Law of the United States (Title 17) December 2016
- NERC CIP (Critical Infrastructure Protection) 2013
- Gramm-Leach-Bliley (GLB) Act of 1999
- Enhancement of Privacy and Public Safety in Cyberspace Act 1999
- Children’s Online Privacy Protection Act (COPPA) 1998
- Computer Fraud and Abuse Act of 1984
- Computer Security Act (CSA) 1987
- Encryption Act of 1999
Access Control & Endpoint Security
- Cisco Packet Tracer 7.2 used to create Network Defense System Diagrams
- (DLP) Data Loss Prevention tools
- (IDPS) Intrusion detection and prevention system
- (SIEM) Security Information and Event Management
- Firewalls, switches, and routers
- Security Matters Silent Defense, used for (SCADA Bulk Electric (BES) Systems)
- OSI model,
- Network Protocols, Transport Protocols, and Ports
- Social Engineering Security
- Access Control Models
- Access Control Requirements
- Kill Chain
- The five phases of a successful network penetration
- Wireless security
- IoT Internet of Things Security
- Encryption
- Active Directory
- Penetration Testing
- Vulnerabilities Testing
- Network Security
Cloud Security
- Cloud Services SaaS, IaaS; PaaS and Architecture, Azure.
- Cloud Delivery Models: Private, Public, Hybrid, and Community Cloud, On-Premise and Off-Premise and Security controls.
- Azure deployments of Dynamics AX 2012 R3
Cyber Security Analytic Tools
- VMware
- VirtualBox
- NMAP/SENMAP
- Wireshark
- Kali Linux tools
- OWASP ZAP
- Nessus
- Splunk 7.1.1
- Metasploit
- Burp Suite
- CANVAS
- FING
- FOUNDSCAN
- Backtrack5 r3
- Open-Audit OPMANTEK
- OpenVAS 8.0
- sademo64
- Microsoft Baseline Security Analyzer
- Microsoft Windows Subsystem for Linux
- PFSENSE
- RAPID7
- NETSPOT
- OPAL-RT
Operation Systems
- Windows 7
- Windows 10
- Mac OSX 10.13.6
- Parrot Security 4.4 Linux
- Ubuntu 18.10 Linux
- Debian 9.6 Linux
- Kali Linux 2018.2
- Fedora 29 Linux Server
- Fedora 29 Linux Workstation