LiveCareer-Resume

adjunct professor cybersecurity resume example with 7+ years of experience

Jessica Claire
, , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
Home: (555) 432-1000 - Cell: - resumesample@example.com - : - -
Education
Expected in 07/2023 to to
Ph.D.: Cybersecurity
Capitol Technology University - Laurel, MD,
GPA:
Expected in 04/2005 to to
Master of Science: Information Systems
University of Phoenix - Phoenix,
GPA:
Expected in 05/2000 to to
Bachelor of Science: Information Technology
University of Phoenix - Phoenix, AZ,
GPA:
Certifications and Certificates

Project Management Professional (PMP) 2022

PMI Institute


Certified Information Privacy Manager (CIPM) 2022

IAPP


Certified Information Systems Auditor (CISA) 2022

ISACA


AWS Certified Security – Specialty 2022

AWS


Certified Data Privacy Solutions Engineer (CDPSE) 2021

ISACA


AWS Certified Solutions Architect - Professional 2021

AWS


Certified Ethical Hacker (CEH) 2021

EC-Council


Certified Chief Information Security Officer (C|CISO) 2016

EC-Council


Digital Forensics Certified Practitioner (DFCP) 2013

Digital Forensics Certification Board


Certified Fraud Examiner (CFE) 2010

Association of Certified Fraud Examiners


Certified Information Security Manager (CISM) 2009

ISACA


AccessData Certified Examiner (ACE) 2008

AccessData Group


National Security Agency- INFOSEC Assessment Methodology (NSA-IAM) 2005

Information Security Training and Rating Program


Certified in Risk and Information Systems Control (CRISC) 2005

ISACA


EnCase Certified Examiner (EnCE) 2005

OpenText


Certified Information Systems Security Professional (CISSP) 2001

ISC2


Microsoft Certified Systems Engineer (MCSE) 1999

Microsoft


Senior Executive Fellows Program, April 2023, John F. Kennedy School of Government at Harvard University, Executive Education

Professional Summary

Highly Seasoned, Strategic, and Credentialed Cybersecurity and Artificial Intelligence Leader.

Providing a positive, productive climate for education – high on positive collaboration and results, with a sophisticated touch in incorporating real-world practical experience when working with diverse groups of people engaged in complex issues.

  • 23 Years of practical cybersecurity industry leadership experience spanning across the military, government, private, and education sectors.
  • 13 Years of university teaching experience. 7 Years graduate level and 14 years of online teaching experience.
  • Possess several highly recognized industry certifications, including CISSP, CISM, CISA, CRISC, CEH, CDPSE, CIPM, CCISO, CFE, DFCP, EnCE, AWS-SAP, AWS-S, and PMP.
  • Several professional and peer-reviewed academic publications and conference presentations.
Academia Professional Experience
01/2018 to Current
Adjunct Professor, Cybersecurity University Of Virginia City, STATE,

Designed the curriculum for UVA’s first ever cybercrime and digital forensics course, SEC 4010 - Digital Forensics and Cybercrime.
Assisted the Dean in the Development and launch of an undergraduate Certificate in Cybersecurity Analysis and a concentration in Cybersecurity Analysis for the Bachelor of Interdisciplinary Studies program.
Serve as a cybersecurity mentor professor for cybersecurity capstone research. Facilitate class instruction for both undergraduate and graduate online and campus courses.


Graduate Courses Taught:


BUS 5010 - Cybersecurity Management

  • Provides managers with the essential framework needed to design and develop an effective cybersecurity program (Aligns with the NICE Framework Oversight & Development: Security Program Management).

BUS 5020 - Security Policy Development & Assessment

  • Examines the steps required in policy development, including password protection, acceptable use of organization information technology assets, risk acceptance, identification of threats, countermeasures, intellectual property, proprietary information and privacy issues, compliance reporting, and escalation procedures.

BUS 5100 - Cyber Law, Regulation & Ethics

  • An overview of the ethical challenges in the information age and introduces the complex and dynamic state of the law as it applies to behavior in cyberspace.


Undergraduate Courses Taught:


SEC 3010 - Securing the Cyber World

  • Provides a global perspective on cybersecurity and the impact of cyber threats.

SEC 4010 - Digital Forensics and Cybercrime

  • Examines cybercrimes and the digital forensics processes and techniques needed to discover, prosecute, and mitigate cybercrime.

SEC 4020 - Mobile Security and Forensics

  • Explores mobile device architecture and cyber threats.

SEC 4030 Ethical Hacking

  • Explores the tools and techniques used to assess the security posture of a target system. Aligns with the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
01/2018 to Current
Adjunct Professor, Computer Science - Cybersecurity Maryville University City, STATE,

Instruct cybersecurity courses to graduate students as part of the Maryville University M.S Program. Coordinate courseware and curriculum for online and campus with the academic department chair. Facilitate class instruction for both online and campus courses. Evaluate Student Performance for outcome attainment

Graduate Courses Taught:

ISYS 680 – Cybersecurity Log Management and Analysis

  • This course allows students to interact with security information and event management tools (SIEM) to analyze data and construct queries that allow for data analysis and event triage.

ISYS 685 – Cyber Incident Handling and Breaches

  • This course examines the industry standard Computer Emergency Response Team (CERT) processes, including incident response, vulnerability assessment, incident investigation, and malicious code analysis.
01/2016 to Current
Adjunct and Visiting Professor of Pratice Saint Leo University City, STATE,

RAI 470 - Intelligent Systems

Serve as an Advisory Board Member for the Center for Cybersecurity Education. Teach cybersecurity and artificial intelligence courses. Develop and manage syllabus materials to create a student centered course. Update and design new cybersecurity undergraduate courses. Coordinate courseware and curriculum for online and campus with the academic department chair facilitate class instruction for both online and campus courses. Evaluate student performance for outcome attainment.

Undergraduate Courses Taught:

  • This course introduces students to practical applications of Artificial Intelligence (AI) with emphasis on its use to solve real world problems for which solutions are difficult to express using the traditional algorithmic approach. It explores the essential theory behind methodologies for developing systems that demonstrate intelligent behavior including dealing with uncertainty, learning from experience and following problem solving strategies found in nature.

RAI 480 - Fundamentals of Machine Learning

  • This course will provide students an in-depth introduction to the areas of Supervised and Unsupervised Machine Learning. The course will cover core machine learning algorithms for classification, regression, clustering, and dimensionality reduction Topics covered in the course include Neural Networks, Linear Discriminants, Multi-layer Perception, Radial Basis Functions and Splines, and Optimization and Search.

COM 465 - Artificial Intelligence

  • An introductory course in artificial intelligence (AI) concepts and techniques. The course is designed to introduce the students to the major topics in AI which include: history of AI; intelligent agents; problem solving; search strategies, including games, knowledge, reasoning, and planning; robotics; ethical issues; and future trends in AI.

COM-215 - Principles of Networking

  • This course will introduce the fundamental computer networking concepts. Students will gain knowledge in the following areas: network media, the Open System Interconnection (OSI) model, the TCP/IP protocol stack, the configurations of switches and routers, and networking protocols.

COM-497 - Computer Science Capstone

  • The capstone course provides the student with an opportunity to demonstrate his or her knowledge covered in the Computer Science field by researching, developing, designing, and/or implementing a computing solution that uses knowledge from broad areas in Computer Science including systems architecture, programming, databases, computer networks, algorithm analysis, and artificial intelligence.

COM-221 - Fundamentals of Cybersecurity

  • The advent of global networks has provided communication capabilities for businesses and individuals unparalleled in the history of the world. Attacks on the system that deny service, destroy systems, and purloin information through the use of worms, viruses, and other criminal attacks make it imperative that information security be a significant part of any business plan and that individuals working in that or allied fields become knowledgeable in the principles of information security. This course provides an introduction to the field of information security that lays a necessary foundation for later courses.

COM 450 - Network Defense and Security

  • Global and local networks provide capabilities for businesses and individuals that have become essential in the success of the world economy. Defending these systems against attacks through the use of worms, viruses, and other criminal acts is imperative. This course provides a solid foundation in the fundamentals of network security and some hands-on experience in the installation and use of firewalls and intrusion detection systems.

COM-460 - Internet/Intranet Security

  • Access to the Internet for multiple purposes is one of the major components of most business operations. Many businesses also have intranets which provide internal communications. Security of these assets is imperative for a successful business. This course provides an introduction to the concepts and procedures of assessing and providing security for Internet/intranets.

COM 470 - Management of Information Security

  • It is imperative that information security be a significant part of any business plan and that managers working in that or allied fields are aware of the principles and methodology of managing information security. This course provides an in-depth view of the management of information security for governments, corporations, and other institutions.
01/2023 to Current
Adjunct Professor Cybersecurity Brandies University City, STATE,

SME for graduate cybersecurity course development. Develop and manage syllabus materials to create a student-centered course. Coordinate courseware and curriculum for online and campus with the academic department chair. Facilitate class instruction for both online and campus courses. Evaluate Student Performance for outcome attainment.

Courses Taught:

  • RIAS 150 – Principles of Risk Management in Cybersecurity
  • RIAS 125 - Principles of Cyber Incident Response
Affiliations
  • U.S. Secret Service Cyber Fraud Task Force 2023
  • High Technology Crime Investigation Association’s (HTCIA) 2022
  • International Information Systems Security Certification Consortium (ISC2) 2010
  • Association of Certified Fraud Examiners (ACFE) 2010
  • Digital Forensics Certification Board (DCFB) 2010
  • Secret Service Electronic Crimes Task Force (ECTF) 2009
  • Information Systems Audit and Control Association (ISACA) 2001
  • Information Systems Security Association (ISSA) 2001
  • FBI InfraGard 2000

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • Capitol Technology University
  • University of Phoenix
  • University of Phoenix

Job Titles Held:

  • Adjunct Professor, Cybersecurity
  • Adjunct Professor, Computer Science - Cybersecurity
  • Adjunct and Visiting Professor of Pratice
  • Adjunct Professor Cybersecurity

Degrees

  • Ph.D.
  • Master of Science
  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: