Areas of Compentencies


Cryptopgraphy & Security Architecture

  • Key Negotiation Protocols and Key Management

  • Public Key Infrastructure (PKI)

  • Conceptual Security Architecture

  • Logical Security Architecture

  • Physical Security Architecture

  • Component Security Architecture

  • Contextual Security Architecture


Cyber Security Operational Policy & Risk Management

  • Operational Policy

  • Laws, Regulations, and Standards

  • Data Classification and Security Policy Models

  • Enforcement and Compliance

  • Categorization of Security Controls

  • Selection of Security Controls

  • Implementation of Security Controls

  • Assessment of Security Controls

  • Authorization of Security Controls

  • Continous Monitoring of Security Controls


Cyber Security Operations Management & Secure Software Design

  • Cyber Security vs. Business Practices

  • Return on Investment (ROI)

  • Secure Software Design and Development Lifecycles

  • Vulnerability Expolitations

  • Trusted Computing Platform (TCP)

  • Trusted Platform Module (TPM)

Network Vulnerability & Cyber Threat Intelligence

  • Threat Intelligence Lifecycle

  • 4 P’s (People, Process, Policy, and Partners)

  • Security Orchestration

  • CIA Triad

  • Vulnerability Intelligence