Realtime website analytics



Our Team:


Sondra J. Schneider
Founder & CEO
Full Time Professor, Lead PKI Instructor, CISSP, CEH/ Q/EH, ESCA/ Q/SA, Q/PTL, CHFI/ Q/FE, Q/ND, ISO 27001 Lead Auditor.

A 20-year information security industry veteran, Sondra Schneider is the CEO of Security University, an Tactical CyberSecruity, Information Security & Assurance Certification and Training Company. For the past 20 years Sondra has been traveling around the world training network professionals to be network and security professionals as a full time professor/CEO. In 2006-2007 Sondra worked tirelessly to update the Security University 2000 AIS certifications (Advanced Information Security Cert) to the new performance based Q/ISP “hands-on” security certifications for the information & assurance community. The new “Qualified” Q/ISP certification, and related Q/EH, Q/SA-Q/PTL, Q/FE & Q/ND Certifications have been selected to be approved by the DoD 8570 proposal committee in early 2011.

In 2005 Ms. Schneider was awarded “Entrepreneur of the year” for the First Annual Woman of Innovation Awards from the CT Technology Council. She is an active advisor for the CT Technology Counsel, and advisers 3 computer security internet (start-up) technology companies and a frequent speaker at computer security and wireless industry events. She is a founding member of the NYC HTCIA and IETF, and works closely with the vendor community to provide information security certification training to comply with the 8570 DoDM mandate.

Ms. Schneider specializes in password and identity management – access, authentication and PKI systems, biometrics, wireless networks and wireless security, network perimeter architecture and security, vulnerability auditing, intrusion detection, and broad band networks. Prior to founding Security University, she was a founding partner of the first information security consulting practice located in New York City ( since acquired by Price Waterhouse/True Secure) where she developed information security consulting, training & certifications processes for Fortune 500 customers and developed and managed Federal IA/IS consulting projects. Ms. Schneider has been a pioneer in information security technologies since 1992 when she began her career delivering 45 mega bit broadband services along the eastern seaboard for first implementation of the “internet” with MFS DataNet. While with MFS DataNet she was part of the team that built the first “downstream ISP provider” market - AOL, PSI Net & Earthlink etc.

After MFS DataNet was acquired in 1993, she left to pursue a new Internet role at ATT as the first ATT Internet Specialist where she used her MFS Datanet internet skills to create and deliver the first internet sites for ATT. Ms Schneider was tasked with educating large (10M+) ATT client accounts about internet access as a business process tool. And in 1995 she was involved with the first ATT branded firewall (Site Patrol) from BBN to protect corporate networks as they deployed Internet access across closed networks. In 1996, she accepted the Director of Business Development position in the Northeast for the WheelGroup Corporation ( since acquired by CISC O in 1997) , where she was responsible for the “introduction and implementation” of the CISC O/ WheelGroup NetRanger intrusion detection and NetSonar network auditing tools product line with large customers and VARs . Capitalizing on her earlier product experience with ATT, she brought real-time intrusion detection systems and tools to financial institutions telcos, healthcare, and Fortune 500 customers.

Niamh Harte - Qualification/ Certification Compliance Program Officer

Wanted Sr. QISP Instructor(s) - Help us Help our TROOPS. Qualified Instructors to train our troops!
Sr. Instructors Qualified/ Information Security Professional QISP
his person is a full time employee working in the Northern VA area. Responsibilities are teaching Q/EH Qualified/ Ethical Hacking classes, Q/SA Qualified Security Analyst Penetration Testing, Q/NA Qualified/ Network Defender, and Q/FE Qualified/ Forensic Expertwith a Forensic & incident response background.

Ken Cutler CISSP, CISM, CISA Dir. Professional Certification Programs
Sr. Security Instructor & CISSP® Curriculum Manager, Security+

Senior Security Evangelist and Professional Certification Curriculum Manager Security University
Ken Cutler is Director Professional Certification Programs @ Security University (SU). His responsibilities include CyberSecurity and Professional Certification curriculum development and senior lead instructor for SU. He is an internationally recognized consultant, lecturer, and hands-on trainer in the Information Security and IT audit fields. Previously, Ken founded the Information Security curriculum for MIS Training Institute in 1993 and served as training department head, conference/symposium chair, and lead instructor for over 18 years. He has delivered a wide array of lecture and hands-on courses throughout the United States , including numerous US government agencies, as well as, in Russia , United Kingdom , Netherlands , Finland , Nigeria , Ghana , Tunisia , South Africa , Serbia , Mexico , United Arab Emirates , Oman , Greece , Singapore , and Hong Kong .

Previously, Ken has headed major Information Security and Quality Assurance programs at American Express Travel Related Services and Lockheed-Martin (Martin Marietta) and has been a Fortune 500 company Chief Technology Officer (Moore McCormack Resources). His industry experience includes: insurance, banking, financial services, healthcare, natural resources, manufacturing, government contracting, security and audit software product design and utilization, consulting and training.

Mr. Cutler has been a long-time active participant and advisor in US federal, international government, and industry security standards initiatives and co-authored NIST SP 800-41, “Guidelines on Firewalls and Firewall Policy”. Ken has also published works on the intricacies of Information Security, security architecture, disaster recovery planning, wireless security, vulnerability testing, firewalls, and single sign-on. In addition, he has been frequently quoted in popular trade publications such as Healthcare Information Security Newsletter, Computerworld , Information Security Magazine , Infoworld, InformationWeek, CIO Bulletin, and MIS TransMISsion. Mr. Cutler was featured in a special TV program entitled, “The Electronic Battlefield” , on Abu Dhabi , UAE Public TV.

Mr. Cutler is also the Founder and Principal Consultant of KCA InfoSec Assurance, an independent consulting firm delivering a wide array of Information Security and IT Audit management and technical professional services. His input on vulnerability and risk assessment tools has been frequently sought out by major software vendors.

Ken served as a Certified Weather Forecaster in the US Air Force and was decorated for his exemplary performance during his overseas duty assignment in Alaska.

H. Morrow Long, CISSP, CEH, CHFI (View H. Morrow Long's resume Resume)
Instructor - Qualified/ Information Security Professional Program (Q/ISP)

H. Morrow Long is Director Qualified/ Information Security Professional (Q/ISP) Programs @ SU. Morrow has been a presenter at (and organizer of) several conferences as well as an instructor at Yale University, Fairfield University, the University of New Haven, Gateway Community Technical College and a number of private training institutes.
H. Morrow Long (CISSP, CISM, CEH, Q/EH, Q/SA - Q/PTL, Q/FE, Q/ND) is the Yale University Information Security Officer, Director of the Information Security Office and DMCA Notification Agent for Yale University. He has been with Yale University for the past 23 years, participating in many campus and IT projects (Y2K Planning, Business Continuity/DR, Oracle Financials/HR Business Modernization Project, Yale's Windows NT to Windows 2000 Active Directory Migration Project, HIPAA Security). 

Morrow Long is also a Visiting Scientist with the Carnegie Mellon University Software Engineering Institute's in the CERT/Networked Systems Survivability group. 

Mr. Long is a UNIX, NT and TCP/IP security expert, an author, consultant and educator with more than 26 years of experience with the IP (Internet Protocol) networking protocols and over 13 years of experience designing Internet/Intranet firewalls and information security solutions. 

Morrow has written and released several information security software programs into the public domain (including one of the first TCP portscanners and the first audio Web server CGI cited in Wired magazine).

Morrow has taught computer science, networking and information security courses at several Universities (including Yale, the University of New Haven and Fairfield University) and private seminar institutes (including SecurityUniversity).

Mr. Long was one of the original participants in the Infragard program in Connecticut. Morrow was on the executive board of CUISP (Campus University & Information Security Professionals) and also participates in the EDUCAUSE/I2 Computer/Network Security Task Force (a founder of the annual Educause Security Professionals Conference), CISDG (CT InfoSec Discussion Group) and is President of the Connecticut ISSA Chapter. 

Prior to working at Yale University Mr. Long was a Member Technical Staff at the ITT Advanced Technology Labs in Stratford and Shelton (1984-6) Connecticut and a Lead Programmer Analyst developing INVESTWARE(TM) at New England Management Systems (NEMS 1982-84).Mr. Long holds a B.S. in Communications from the Boston University School of Communication (1981) and a M.S. C.I.S. (Computing and Information Systems) from the University of New Haven (1986).

Mr. Long holds a B.S. in Communications from the Boston University School of Communication (1981) and a M.S. C.I.S. (Computing and Information Systems) from the University of New Haven (1986) as well as CISSP®, CISM® and CEH™ certification. Morrow has contributed to several papers and books on computer security, computer crime, digital forensics, network survivability and information assurance.


Kevin Cardwell (View resume Resume)

Kevin Cardwell spent 22 years in the U.S. Navy, during this time he tested and evaluated Surveillance and Weapon system software, some of this work was on projects like the Multi-Sensor Torpedo Alertment Processor (MSTRAP), Tactical Decision Support System (TDSS), Computer Aided Dead Reckoning Tracer (CADRT), Advanced Radar Periscope Discrimination and Detection (ARPDD), and the Remote Mine Hunting System (RMHS). He has worked as both software and
systems engineer on a variety of Department of Defense projects and was selected to head the team that built a Network Operations Center (NOC) that provided services to the command ashore and ships at sea in the Norwegian Sea and Atlantic Ocean . He served as the Leading Chief of Information Security at the NOC for six years prior to retiring from the U.S. Navy. During this time he was the leader of a 5 person Red Team that had a 100% success rate at compromising systems and networks.

He currently works as a free-lance consultant and provides consulting services for companies throughout the US , UK and Europe . He is an Adjunct Associate Professor for the University of Maryland University College where he participated in the team that developed the Information Assurance program for Graduate Students which is recognized as a Center of Excellence program by the National Security Agency (NSA). He is an Instructor and Technical Editor for Computer Forensics, and Hacking courses. He has presented at the Blackhat USA Conference. He is a Certified Ethical Hacker (CEH), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. His current research projects are in Computer Forensic evidence collection on "live" systems, Professional Security Testing and Advanced Rootkit technologies.

TAP Laision/ Dir of Business Development & Client Success

William Alan Matthey II
Instructor, CISSP/ CISM, MCSE/ MCITP Security+, A=, Network +, Windows7

William has been delivering security training and consulting for over 25 years. With a formidable skill set that includes management and technical skills. William is currently working on projects worldwide to develop and manage secure Enterprise solutions utilizing Vista & 08 Server technologies and advanced MIS applications for both Microsoft Corporation and the US DOD.

Having worked for the US DOD and State Department William has been delivering security training and consulting services for the US government for several years. William meets DOD 8570.1 Compliance and enjoys US Security Clearance. This involves William traveling worldwide, which takes him to some interesting places.

Education: B.A. Psychology 1974
Texas Christian University, Ft. Worth,
TX Oklahoma University 12 hrs toward MBA

Need Instructor CWNA, CWSP Q/WAP

Metka Dragos, CWNE, CWNA, CWSP, CWAP, CWNE, CISSP, Q/SA- Q/PTL, Q/EH, Instructor / Wireless Advisor

Metka is a highly repected Wireless instructor who is a gifted presenter, She is known for her wit and broad wireless & security technical expertise. She holds over multiple technical certifications including a CISSP, Q/SA CWNE.

Metka Dragos has more than twenty years of experience in IT industry and delivering training programs. Her corporate career included positions in Application Programming, Database Administration, System Administration and Network Engineering. Experience gained from these positions, years of mentoring and certifications from Microsoft, Cisco and CWNP give her unique blend of real life and classroom scenarios that she passionately shares with her students. As a consultant, Metka works with clients in greater Bay Area with a specialty in LAN/WLAN security and analysis.

She holds a B.S. degree in Information Technology, Microsoft MCSE and MCT, Planet3 Wireless CWNE and CWNT and Cisco certifications.

Her outside of technology life is catching up with her family and the rest of the world.

Krag Brotby Instructor, CISM, CGEIT

Krag Brotby has more than twenty five years of experience in the area of enterprise computer security architecture, governance, risk and metrics and is certified as a CISM and CGEIT. Extensive experience includes intensive involvement in governance, metrics and current and emerging enterprise security architectures. He holds a foundation patent for digital rights management and has published numerous technical and IT security related articles and books. Krag is the recipient of the 2009 ISACA John W. Lainhart IV Common Body of Knowledge Award.

Krag has served as principal author and editor of the ISACA Certified Information Security Manager Review Manual since 2005, and as the researcher and author of the widely circulated Information Security Governance, A Guide for Directors and Executive Management, 2nd ed., and the Information Security Governance : Guidance for Information Security Managers as well as a new approach to Information Security management metrics to be published in '09. He is the author of Information Security Management Metrics; Auerbach '09 and Information Security Governance; a practical development and implementation approach; Wiley '09.

He has served on the ISACA Security Practice Development Committee, appointed to the Test Enhancement Committee responsible for exam question development, and to a new committee developing a systems approach to information security called the Business Model for Information Security. He is a member of the California High Tech Task Force Steering Committee, an advisory board for law enforcement.

Krag is a frequent workshop presenter and speaker at conferences globally and lectures on information security governance, metrics, information security management and CISM preparation throughout Asia, Australia Europe, the Middle East and North and South America.

As a practitioner in the security industry for over two decades, he was the principal Xerox BASIA enterprise security architect and managed a global PKI implementation plan. He was a principal architect of the SWIFT Next Gen PKI security architecture; served as Technical Director at RAND Corporation for the cyber assurance initiative; and as Chief Security Strategist and PKI architect for TransactPlus, a JP Morgan spinoff; provided governance consulting to Australia Post, New Zealand Inland Revenue, the Singapore Government, the US Department of Defense, Microsoft, ATT, major financial institutions and numerous other organizations


Tom Bowers (View resume Resume)
In the world of High-Tech, High-Value information, Tom Bowers, CISSP, PMP takes the old proverb, “Keep Your Friends Close, Your Enemies Closer” to heart. As a Certified Ethical Hacker, Tom is a well known expert in the area of data leakage prevention, global enterprise information, security architecture and ethical hacking. 

With over 25 years of experience in the field of computer technology and information systems Bowers has served as the chief architect for information security structures and protections in numerous industries. He brings a real world, pragmatic approach to the business of security based upon his Fortune 100 enterprise experience in both the IT and Global Security functions. Bowers leads the independent think tank and industry analyst group Security Constructs, LLC. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale

As immediate past president of the Philadelphia chapter of Infragard, a non-profit organization consisting of members of the FBI and physical/cyber security professionals from private industry, Tom lead one of the largest chapters in the country with over 850 members. Tom works closely with law enforcement agencies including the FBI on issues of computer forensics and investigations of security breaches, theft and fraud.

Bowers shares his depth of knowledge with the computer and information technology and security field as a Technical Editor for both TechTarget (Information Security Magazine, and IDG Publications (ComputerWorld, InfoWorld…) He is the author of several white papers, >100 articles and is a highly respected speaker at conferences and webinars. He has recently been featured in CSO Magazine, CIO Decisions, InfoWorld, ComputerWorld, NetworkWorld,, Information Security Magazine, BusinessWeek and The Wall Street Journal

Wanted Experienced Ethical Hacker/ Pen Tester Instructor!

Jeremy Alward CISSP, CISM, PMP, Q/EH

Mr. Alward is an information security professional with over ten years of progressive experience working for Fortune 500 companies and the Federal Government. In addition to experience, Mr. Alward has achieved a Masters of Science in Information Systems from Drexel University, and has continually pursued technical and non-technical industry certifications as appropriate including the CISSP (ISC2), CISM (ISACA), CGEIT (ISACA), ITIL Foundations, and the RHCE (Red Hat). Throughout his career, Mr. Alward has supported a wide range of clients that have spanned the globe as well as business sectors including Energy/Power, Healthcare, and Finance/Banking. Most recently, Mr. Alward has focused on information security program development, providing this service to his clients as well as internally within his own organization. Mr. Alward has expertise in Certification and Accreditation (C&A) work, specifically C&A based on National Institute of Standards and Technology (NIST) guidelines and has taught on this subject matter. Some of the other projects he has completed include Gap Analysis of security infrastructure, security baseline development, firewall/intrusion detection system (IDS) deployment, security assessments, and security awareness training. Mr. Alward also has experience developing security policies for large organizations.

Chris Pugrud Instructor Q/CA

Chris is an information security professional with over fifteen years of progressive experience working for Fortune 500 companies and the Federal Government. Chris has expertise in Certification and Accreditation (C&A) work, specifically C&A based on National Institute of Standards and Technology (NIST) guidelines and has taught on this subject matter. Some of the other projects he has completed include Gap Analysis of security infrastructure, security baseline development, firewall/intrusion detection system (IDS) deployment, security assessments, and security awareness training. Chris has supported a wide range of clients that have spanned the globe as well as business sectors including Energy/Power, Healthcare, and Finance/Banking. Most recently, Chris has focused on information security program development, providing this service to his clients as well as internally within his own organization. Mr. Alward also has experience developing security policies for large organizations.

Glen Strutz Instructor Q/CA

Mr. Strutz is an information security professional with over ten years of progressive experience working for Fortune 500 companies and the Federal Government. In addition to experience and has continually pursued technical and non-technical industry certifications as appropriate including the CISSP (ISC2), Throughout his career, Glen has supported a wide range of clients that have spanned the globe as well as business sectors including , Healthcare, and Finance/Banking, Energy/Power. Most recently, has focused on information security program development, providing this service to his clients. Glen has expertise in Certification and Accreditation (C&A) work, specifically C&A based on National Institute of Standards and Technology (NIST) guidelines and has taught on this subject matter. Some of the other projects he has completed include Gap Analysis of security infrastructure, security baseline development, firewall/intrusion detection system (IDS) deployment, security assessments, and security awareness training. Glen also has experience developing security policies for large organizations.

Michael Penders Instructor ISO 27001 Lead Auditor/ Lead Implementer

Michael J. Penders Esq. Michael Penders is Chairman of Environmental Security International (ESI) L3C. He has managed advanced investigations, developed standards for integrated Security Management Systems (SMS), and tested their application in numerous critical infrastructure sectors. Mr. Penders led assessment teams at Critical Infrastructure facilities in the private and public sectors. He has directed investigations into acts of terrorism, organized crime, industrial sabotage, and security risks around the world, and facilitated implementation of risk management and compliance programs. Mr. Penders chaired the international group of experts which developed the first standard for integrated Security Management Systems (SMS). This approach has been adopted in several international standards such as ISO 27000, ISO 28000, ISO 31000, and ISO 26000, as well as environmental and security regulations, and guidance for best management practices. Mr. Penders has served on several ISO and ANAB committees and working groups, including the DHS Homeland Security Panel and ANSI’s integrated Management System Strategic Advisory Board. ESI clients have been recognized by the American National Accreditation Board (ANAB) for Best Practices in Cyber Security by certification to the international standard: ISO 27001:2005. Mr. Penders has worked with organizations such as DOD, DOE, NATO, EPA the United Nations, the American Chemistry Council, corporations, ports, and public utilities on environmental, security and risk management, related legal and policy issues, including cyber security and deployment of appropriate technologies. Mr. Penders served as Chair of the American Bar Association (ABA) Committee on Homeland Security in the Section of Environment, Energy and Resources (SEER). Previously, he worked as a Prosecutor, Director of Legal Counsel for US EPA’s Criminal Enforcement, and Chairman of the G8 Nations’ Project on international organized crime. Michael has published numerous articles, testified before Congress on National Security and Criminal Justice matters, and spoken at dozens of major conferences around the world. Mr. Penders is a certified Lead Auditor and Implementer for the ISO 27000 series of standards for Best Practices in Implementing Information Security Management Systems (ISMS). He currently works as a consultant for organizations in the financial services, data management, insurance, and public sectors to facilitate implementation of integrated risk management systems which may be certified to ISO standards, designed to assure compliance with applicable laws, Executive Orders, and government programs such as PS Prep, CFATS and CTPAT.

WANTED - Interns

Looking for an internship in the information security industry? Security University is the place for you! Security University is a small company looking for help in Reston, VA area.

Security University specializes exclusively in information assurance (IA) security certification training. We're passionate about security. Our internship program allows talented college students to learn our business by supporting customers by supporting the administration of our internal systems, and public relations to the Security University community of users.

As an Security University Intern you will be given a real project to work with Security University attendees that are interested in persuing their Qualified Information Security Professional (QISP) Credential. You'll attend one of our computer security classes and will receive mentoring from the team management at Security University. You'll learn about computer security and writing secure code from the experts.

Security University internships frequently start as part time employment during the school year and are full time over the summer. Summer only internships are also available.

Absolutely non-negotiable requirements:

  • Excellent command of written and spoken English
  • Top grades or a track record of success
  • Permanent legal right to work in the United States. student visas (J1, F1, etc) cannot be considered.
  • Currently enrolled in a 4 year academic institution or Master's program having at least completed your sophomore year.
  • Significant coursework in Computer Science (major not required)
  • Knowledge of Java or .NET and at least one other common programming language
  • Top notch computer programming and testing skills.
  • Position is in our office in Reston VA location telecommuting optional

Apply today!  Officially, applications are due June 1, 2010, but we process them as they come in, so all available openings may be taken well before June 1st.

Applications for 2010 internships are now being processed. They are processed on a first-come, first-served basis so apply soon!

To Apply

To apply for any of these positions, please email us at careers (at) securityuniversity.(dot) net , attaching a current resume in HTML, Word, Plain Text or PDF format. In the body of the email, indicate the position you are interested in and explain why you would be a good fit for this job. If you have a website, send us the URL.

Security University does not discriminate in employment matters on the basis of race, color, religion, gender, national origin, age, military service eligibility, veteran status, sexual orientation, marital status, disability, or any other protected class. We support workplace diversity.

APPLY Today for 2013 Interns..

Meet our PAST Interns
2010 Devin Kuhn is graduating Yorktown High School located in Arlington, VA. For over nine years, Devin has participated in programs at the Arlington County Career Center (ACC), a center which provides specialized training for academic, enrichment, career and technical programs for teens and adults. The Career Center is now a Governors Academy and receives grants from the Bill and Melinda Gates foundation.  Last year, Devin took an advanced computer science class at the Career Center during the school day and was selected to participate in a college level programming course this year.  He is one of just three students in all of Arlington to have been selected!

Devin has also participated in the U.S. Naval Sea Cadet program, a nationwide program available to students ages 13 to 17. In addition, he has attended the U.S. Naval Recruit Training Command, based in Chicago, IL, for basic cadet basic training.

Devin enjoys school but has a greater passion. "I enjoy my classes, but my passion is really about computer science.  I have been attending the Arlington Career Center on the weekends for the last seven years.  It is a TV Multimedia class where we make movies and TV shows."

At home, Devin develops video games and is a co-owner of 0m3ga, which hosts websites, servers and game servers.

"I've been doing a lot of web design and development. Right now I am focusing on php and MySQL.  I have a fairly firm grasp of the lua programming language, and several others.  Python, Javascript, HTML, php, DOS, and am almost done learning MySQL. I'm really looking forward to interning at Security University this summer!"

2004 Past Interns Michelle has Graduated COLLEGE!!
Michelle Leung is a current student attending Academy of Information Technology at Stamford , CT. She is an accomplished student who enjoys helping people. She participates in the Stamford High School Marching Band and plays the clarinet. Michelle is an active member of Student Council, Origami Club, and Winter Percussion. On her free time she like to read, write, and every girl's favorite, go shopping. Her new favorite band is now Coldplay, and enjoys listening to Kelly Clarkson. She now enjoys simple pleasures of relaxing at a coffee shop with a cup-of-joe and a good book to read.

Emanuel Olaguivel started attending the University of Connecticut ,Storrs, in Fall 2005. He is a 2005 graduate from the Academy of Information Technology . At UCONN, he majored in Civil Engineering. Working with computers is a hobby and he has been MOS certified in some Microsoft programs. During his free time he likes to watch TV, surf the web, and chat with friends. He especially loves playing and watching soccer; his favorite team is Barcelona . He grew up in Peru and moved to Stamford at the age of 6. His goal in life is to be successful in all aspects of life

Stephen Gantz, CISSP

Stephen Gantz, CISSP, is the senior architect for Roundarch, a systems integrator specializing in the development and delivery of enterprise portal and integration solutions. He also leads Roundarch's security practice, which focuses on application security, security architecture, and compliance with civilian and DoD security policies. Steve has 12 years' experience in technology-related professional services and software development, primarily as an IT architect designing e-commerce, enterprise application integration, customer relationship management, and security systems and infrastructures.
Steve's industry expertise includes federal civilian and state government, financial services, insurance, retail, telecommunications, and higher education. His areas of technical expertise include customer relationship management (CRM) and enterprise resource planning (ERP) applications, middleware technologies, security and e-commerce systems architecture, and data transport and exchange using EDI and XML. He is a regular speaker at industry events on enterprise application integration, e-Commerce, and XML. He holds a Masters Degree in technology policy from the John F. Kennedy School of Government at Harvard University, as well as a Bachelors degree in applied mathematics and statistics from Harvard.

CND Instructors WANTED
CISSP, Security+, Q/EH, Q/SA -Q/PTL, Q/FE, Q/ND

Jay Beale


M. E. Kabay, Instructor Cyberlaw, Mgt Information.
PhD, CISSP-ISSMP, Assoc Prof of Information Assurance at Norwich University, Technical Editor of the Computer Security Handbook 4th and 5th editions, and writer of the Network World Security Strategies column. Inducted into the ISSA Hall of Fame in 2004.

Gulf Region Partners


Mohamed Faiz

< Mohamed Faiz Shaban/ Chief Operating Officer Oman

Mr. Mohamed Faiz Shaban has 12 years of experience in International Education and Training program in the Gulf countries manages international institutional agreements, supports the faculty and colleges in the advancement of their strategic priorities for international education and Evaluate training needs for external certification programs for professionals and students, develop training strategies, and design certification programs using a variety of instructional techniques.

He has held executive position Information Security Specialist training and development manager, responsible of the accreditation processes of any training and career development program. He is among officials who are responsible of the accreditation processes for Information Technology training. He has lived and worked in Europe, Asia and North Africa. During his career, Mr. has held executive positions at a number of International firms in Gulf Countries hold

Professional Certified Trainer in information security From (Canada). Has held senior leadership positions with direct responsibility for managing International Training programs

Munir Elhag
<Munir Elhag/ Chief Financial Officer

Munir Elhag, CPA is a Finance and Management Consultant who has served in different senior positions and as the Chief Financial Officer (CFO) of a Multi Local and International Company.

He has over 15 years of international executive experience in change management, business process re-engineering, and management consulting involving complex global Implementations. He has lived and worked in the Gulf countries, Africa and North America.

During his career, Mr. Elhag has held executive positions at a number of International firms to expand business to Gulf Region / International markets. As a Senior level executive he gained extensive hand-on experience in management, business leadership and working with board of directors, and bank attorney. Mr. Elhag is a CPA with established records of success in significantly growing enterprise value. His strengths also include budgets, staff development management and development, financial strategic planning, cash forecasting, acquisitions, business valuation and audit.

* Advisor to CEO for strategic thinking and planning, internal & external consulting, business partnerships, best practices, risk management, and organizational development
* Successfully developed cash management reporting system and successfully implemented financial reporting for multi-corporations.
* Developed individual, combined and consolidated financial statements for executive committee
* Directed conversion of accounting system within a MIS environment, including general accounting
* Manage and motivate the Training & Development staff to ensure clients are product proficient through web-based and classroom trainings.
* Manage and enhance internal product training needs through instructor led and self paced curriculums in local and international levels.
* Take a lead role in creating content and trainings for all new hires coming through multi workplace locations and in international level.
* Develop self-service support portal including product guides, knowledgebase articles and new release documentation.
* Coordinate activities related to "Product Training Road Shows" (marketing the training, scheduling facilities, enrolling participants, etc).



Current Schedule
Site Map SU Policies Webmaster Contact Us Opt-Out Testimonials Advertise Brochure
Copyright © 2014 Security University, Inc. All rights reserved.
Translate this page to