|Present||Coles College of Business, Kennesaw State University|
|Present||Lecturer of Information Security and Assurance, Kennesaw State University|
- ISA 4330 - Incident Response and Contingency Planning
- ISA 3100 - Principles of Information Security
- ISA 3200 - Network Security
- ISA 3210 - System Security I
- ISA 4200 - Perimeter Defense
- ISA 4220 - Systems Security II
- ISA 4805 - Penetration Testing
Research Works (4)
SNS Use, Risk, and Executive Behavior WISP2018: Workshop on Information Security And Privacy (WISP) - Pre-ICIS workshop (2018)
Organizations can suffer attacks designed to take advantage of employee vulnerabilities. Successful attacks cause firms to suffer financial damage ranging from minor information breaches to severe financial losses. Cybercriminals focus on organization executives, because the ...
Learning Outcomes for Cyber Defense Competitions Journal of Information Systems Education (2017)
Cyber defense competitions (CDCs) simulate a real-world environment, where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as ...
Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work? AMCIS 2013 Proceedings
This paper is part of a proposed study that looks at the emerging information security personnel needs of organizations. We are attempting to explore the correlation between components of a regional cyber defense competition and ...
Academic Textbook (4)
Guide to Firewalls and VPNs, 3rd Edition Faculty Publications (2011)
Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, ...