What we're about

Anyone that is passionate about Cybersecurity can join this group. We will promote security awareness, best practices in Cybersecurity, Cyber defense and offense highlighting popular tools and techniques. If there is anyone with good ideas or suggestions for a new meetup event you'd like to share, please do so.

My hope is to bring in quality guest speakers that will talk about the State of the Art in Cybersecurity.

A little bit about me:

I'm a Cybersecurity Adjunct Professor at UMGC. I teach 3 online classes: Information Assurance, Secure Software, Cryptology. I'm currently working towards a PhD in Computer Engineering. My Master's degree is in Information Assurance (Cybersecurity). I studied Computer Science and Mathematics at the University of Houston and received a Bachelor's degree in Computer Science with a minor in Mathematics.

I started my first business when I was 23 years old while attending the University of Houston.

I have around 10 years of experience running a small business and I have over 15 years of Software Engineer experience and have previously worked for a few Defense Contractors.

Thanks,

Leo

Upcoming events (5+)

Certified Chief Information Security Officer bootcam

Online event

$2,499.00

For DISCOUNT INFORMATION - Please contact me and I will give you the link to get the discount applied. Before reserving please contact me for any questions on this EC-COUNCIL certification online training. Certified Chief Information Security Officer | CCISO v3 From: $2,499.00 Cash app: $DCcyber or link to use my code and get 5.00 off for new users https://cash.app/app/RCPXMKR Google Pay -[masked] We accept PayPal: Account: [masked] Base package includes: Instructor led training modules (1 year access) Official e-courseware (1 year access) Certificate of Completion Exam Voucher Why CCISO? The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for a C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development, and the financial expertise vital to leading a highly successful IS program. The job of the CISO is far too important to be learned by trial and error. Executive level management skills are not areas that should be learned on the job. Material in the CCISO Program assumes a high-level understanding of technical topics and doesn’t spend much time on strictly technical information, but rather on the application of technical knowledge to an information security executive’s day-to-day work. The CCISO aims to bridge the gap between the executive management knowledge that CISOs need and the technical knowledge that many sitting and aspiring CISOs have. This can be a crucial gap as a practitioner endeavors to move from mid-management to upper, executive management roles. Much of this is traditionally learned as on the job training, but the CCISO Training Program can be the key to a successful transition to the highest ranks of information security management. Minimum Requirements In order to qualify to sit for the CCISO Exam without taking any training, candidates must have five years of experience in each of the 5 CCISO domains verified via the Exam Eligibility Application. To sit for the exam after taking training, candidates must have five years of experience in three of the five CCISO Domains verified via the Exam Eligibility Application.

Certified Ethical Hacker bootcamp

Online event

$1,899.00

For DISCOUNT INFORMATION - Please contact me and I will give you the link to get the discount applied. Before reserving please contact me for any questions on this EC-COUNCIL certification online training. Certified Ethical Hacker | CEH From: $1,899.00 Cash app: $DCcyber or link to use my code and get 5.00 off for new users https://cash.app/app/RCPXMKR Google Pay -[masked] We accept PayPal: Account: [masked] Contact me for more details on this CEH bootcamp. This an online instructor led class includes labs from EC-Council. The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The CEH exam is ANSI 17024 compliant adding credibility and value to credential members. CEH is used as a hiring standard and is a core sought-after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, and a cyber staple in education across many of the most prominent degree programs in top Universities around the globe. Hundreds of Thousands of InfoSec Professionals as well as Career Starters have challenged the exam and for those who passed, nearly all are gainfully employed with successful careers, but the landscape is changing. Cyber Security as a profession is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability. EC-Council raises the bar again for ethical hacking training and certification programs with the all-new CEH v10! This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you in a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The tools and techniques in each of these five phases are provided in detail in an encyclopedic approach and absolutely no other program offers you the breadth of learning resources, labs, tools and techniques than the CEH v10 program.

Certified Network Defender C|ND bootcamp

Online event

$1,899.00

For DISCOUNT INFORMATION - Please contact me and I will give you the link to get the discount applied. Before reserving please contact me for any questions on this EC-COUNCIL online training. Cash app: $DCcyber or link to use my code and get 5.00 off for new users https://cash.app/app/RCPXMKR Google Pay -[masked] We accept PayPal: Account: [masked] Certified Network Defender (CND) From: $1,899.00 Base package includes: Instructor led training modules (1 year access) Official e-courseware (1 year access) iLabs (6 Months Access) Certificate of Completion Exam Voucher This is the world’s most advanced Certified Network Defense course with 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks. Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and white papers for additional learning.

Certified Computer Hacking Forensic Investigator bootcamp

Online event

$1,899.00

For DISCOUNT INFORMATION - Please contact me and I will give you the link to get the discount applied. Before reserving please contact me for any questions on this EC-COUNCIL certification online training. Computer Hacking Forensic Investigator | CHFI From: $1,899.00 Cash app: $DCcyber or link to use my code and get 5.00 off for new users https://cash.app/app/RCPXMKR Google Pay -[masked] We accept PayPal: Account: [masked] Base package includes: • Instructor led training modules (1 year access) • Official e-courseware (1 year access) • iLabs (6 Months Access) • Certificate of Completion • Exam Voucher Course Descrption The course was designed and developed by experienced SMEs and digital forensics practitioners. A complete vendor neutral course covering all major forensics investigations technologies and solutions. Detailed labs for hands-on learning experience; approximately 50% of training time is dedicated to labs. It covers all the relevant knowledge-bases and skills to meets with regulatory compliance standards such as ISO 27001, PCI DSS, SOX, HIPPA, etc. The program presents a repeatable forensics investigation methodology required from a versatile digital forensic professional which increases your employability. What You Will Learn Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling Perform anti-forensic methods detection Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred. Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process. Identify & check the possible source / incident origin. Recover deleted files and partitions in Windows, Mac OS X, and Linux. Conduct reverse engineering for known and suspected malware files. Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents.

Past events (179)

Certified Security Analyst bootcamp

Online event

$1,899.00

Photos (57)