Student Mentoring

I continue to offer free mentoring sessions for all current and former students.

Get in touch

If you want an appointment, click the link below and choose an available time on my calendar. If you other questions, please complete the form and submit. I will get back to you as soon as I am able.

cybersecurity information-security network-security data-breach encryption penetration-testing firewall malware phishing ransomware vulnerability zero-day cyber-attack threat-intelligence incident-response endpoint-security cloud-security identity-management access-control authentication authorization compliance governance risk-management cyber-threats dark-web ethical-hacking digital-forensics intrusion-detection security-awareness cybersecurity-framework security-policy cyber-hygiene security-controls SIEM SOC cybersecurity-training cyber-resilience cyber-espionage cyber-warfare cyber-defense cyber-offense cybercrime cyber-investigation cybersecurity-strategy cyber-risk artificial-intelligence AI-security machine-learning blockchain-security cryptography IoT-security DevSecOps secure-coding software-security vulnerability-management risk-assessment cyber-insurance cybersecurity-certifications penetration-testers red-teaming blue-teaming purple-teaming threat-hunting cyber-incident cyber-operations security-audit cyber-governance security-architecture cloud-computing secure-cloud hybrid-cloud on-premises security-access cyber-threat-intelligence cyber-infrastructure cyber-ethics cyber-safety cyber-education cyber-defense-strategy secure-communications cyber-policy mobile-security wireless-security endpoint-protection cyberlaw CISO cybersec-training cybersecurity-awareness cyber-frameworks MITRE-ATT&CK cyber-training data-protection cyber-responsibility cyber-situational-awareness cyber-penetration ethical-hacker cybersecurity-analyst cyber-risk-assessment secure-software infosec-security forensics-analysis cybersecurity-consulting cybersecurity-careers zero-trust cybersecurity-standards threat-modeling bug-bounty cyber-resilience-strategy cyber-defense-tactics