Information Security Management + Cloud Labs

Information Security Management + Cloud Labs
-0 %
Besorgungstitel - wird vorgemerkt | Lieferzeit: Besorgungstitel - Lieferbar innerhalb von 10 Werktagen I

Unser bisheriger Preis:ORGPRICE: 179,50 €

Jetzt 179,48 €*

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9781284251470
Veröffentl:
2021
Erscheinungsdatum:
24.12.2021
Seiten:
0
Autor:
Michael Workman
Sprache:
Englisch
Beschreibung:

Dr. Michael D. Workman has over 15 years of experience as an academic, and over 25 years as a technology management professional. He received his Ph.D. from Georgia State University with post-doctoral work at the University of Florida. He has been a professor of information science at Florida State University, and is currently a professor of technology management at Texas A & M University in College Station. Michael has extensive experience in the computer industry -he began as a Unix software engineer at Honeywell where he worked on the Unix v.7 kernel for Motorola 68K processors, wrote the TTY and disk device drivers, and ported the Microfocus and Ryan-McFarland COBOL compilers to Unix. He moved into management (including Chief Technology Officer) with companies such as Digital Equipment Corp (HP), Unisys, Openware, France Telecom/Orange, NETCommerce, and Capital One. Michael has a demonstrated performance track record in entrepreneurship, leadership, management, strategy, software architecture, information and cybersecurity, process methodologies, software design and development, commercialization, venture capital and grant funding, and advanced R & D. He has successfully managed virtual teams, departments of over 500 people, budgets over $50 million, and people located globally (Montreal; London; and Paris, Lyon, Sophia Antipolis/Nice France). Michael has been a co-founder of two successful business ventures; and he has a track record for on-schedule and in-budget delivery of high quality, in-demand products used around the world (). Michael worked at the Security Policy Institute (SPI)/Modus Operandi as a research scientist on classified cybersecurity R & D, particularly in intelligence, surveillance, and reconnaissance (ISR) fusion for the US and NATO military and intelligence communities. Based on his work at the SPI, he was the invited editor of, The Semantic Web: Implications for Technologies and Business Practices, published by Springer Intl, Cham, Switzerland. Michael has published over 50 research manuscripts, 4 textbooks, and has worked on millions of dollars in research grants from the US Department of Defense, US Veterans Administration, and others. He has been a fellow of the L3Harris Institute of Information Assurance, has been the Director of North/Central Florida Software Process Improvement Network (SPIN), and has been a member of the NSA/DHS Cybersecurity Centers of Academic Excellence at Texas A & M University and Florida State University. He holds many certifications such as AWS Certified Developer, CINSec Security Management certification, Checkmarx Secure Code Basher, Zabbix Certified Specialist and Professional, Certified JAVA Programmer, and CyberTRec Certified Ethical Hacker. Michael is an associate editor of the, and Special Issues Editor for Springer Publishing, and is a research affiliate with Vox-Pol.
Print Textbook & Cloud Lab Access: 180-day subscription. The cybersecurity Cloud Labs for Information Security Management provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training. Labs: Lab 1: Applying DevSecOps Principles to the Software Development Process Lab 2: Conducting a Penetration Test Lab 3: Applying Cryptographic Controls Lab 4: Applying Network Security Controls Lab 5: Using Predictive Analytics to Forecast Threats

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.