Years of experience: 35
Larry Blumenfeld, BS Criminology, NCASLB, Cyber Security Integration (CSI) Former System Integrator and Founder of Access Control Consultants (ACC) for 23 years.
Years of experience: 2
Position: Client RelationsCharles Tendell, CEH, CHFI, CISSP, Azorian Cyber Security, Cyber Security Expert and Ethical Hacker.
Certified Incident Handler
Security Professional (CISSP)
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information Systems Security Certification Consortium, also known as (ISC)². As of May 2014, (ISC)² reports 93391 members hold the CISSP certification worldwide, in 149 countries. In 2004 the CISSP obtained accreditation by ANSI ISO/IEC Standard 17024:2003 accreditation. It is also formally approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories for their DoDD 8570 certification requirement. The CISSP has been adopted as a baseline for the U.S. National Security Agency's ISSEP program.
Department of Homeland Security: Information Security Certified
Working with the Federal Emergency Management Agency and the Department of Homeland Security Azorian Cyber Security's Red team have eared national certification in information system security. Covering cyber security threats against critical infrastructure and federal resources.
Certifications and Affilations of the Team
Years of experience: 11
David Willson, JD, CISSP, Titan Info Security Group, Risk Management and Cyber Security Expert
Certified Hacking Forensic Investigator
Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and investigation training is a mandate in the present day. If you or your organization requires the knowledge or skills to identify, track, and prosecute cybercriminals as well as deal with internal matters such as abuse of company resources, then this is the course for you. This course helps students to excel in digital evidence acquisition, handling and analysis in a forensically sound manner. Acceptable in a court of law, these skills will lead to successful prosecutions in various types of security incidents such as data breaches, corporate espionage, insider threats and other intricate cases involving computer systems.
Certified Ethical Hacker
The Certified Ethical Hacker is a professional certification, provided by the International Council of E-Commerce Consultants (EC-Council.) An ethical hacker is usually employed by an organization who trusts him or her to attempt to penetrate networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing computer security vulnerabilities.
Certified Incident Handler
The EC-Council Certified Incident Handler program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. Combining industry best practices and methods to addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.