An inspired innovator and motivational leader with a desire to learn and share new skills at every opportunity to deliver actionable results.
Examines strategies for societal responses to cybersecurity threats at enterprise, national and global levels. The roles of government, inter-organizational alliances, and international cooperatives are explored, as well as legal concepts such as privacy, intellectual property, and civil liberties. Replaced by the Cyber Security Management and Policy degree.
Understands the principles of data protection, network security, and computer forensics. The specialization also introduces students to the ethical, legal, and policy issues associated with information security. Laboratory exercises are included in some courses to enhance the learning experience..
Fundamental education needed to achieve information superiority, thus enabling full spectrum dominance. The actions associated with information operations are wide-ranging from physical destruction to psychological operations to computer network defense.
Assists client organizations with assessing their Information Security programs, determining gaps in those programs, and offering recommendations for remediation.
Assisted client organizations in the implementation of Information Security Management Systems that could be certified to the ISO 27001 standard.
Performed cooperative and non-cooperative assessments of Navy networks and acted as an adviser and subject matter expert for war games and exercises.
Implemented the command information technology security program for site specific security policies and procedures and responsible for user security awareness training for all non-NMCI systems.
Responsible for prioritizing and directing the maintenance performed by on-shift personnel.
Responsible for the testing and repair the F/A-18 Hornet Fire Control RADAR system and maintenance of associated automated test equipment.
Hobbies are an important part of a good work life balance.