Political Leanings:
Liberal | Conservative |
College of Southern Nevada ALL - Computer Information Technology
Program Direct of Cyber Security at The College of Southern Nevada &
Owner of Rex Technology Services
Computer & Network Security
Arthur
Salmon
North Las Vegas, Nevada
Overview
Currently I am finishing my Dissertation for my Doctoral degree in Information Assurance & Security. I hold a Masters in Network & Communication Management focusing in Security. I have worked in IT/Network/Security for over 17 years. Industries I work include Healthcare, Education, and Non-Profits.
References are available
Areas that I specialize in are listed below
Compliance Review
I conduct HIPAA/HITECH, PCI-DSS, and NIST audits. I’m brought in to organizations to review and verify compliances. I also often conduct mock audits to verify current standing for the difference compliances. Conducted 80 HIPAA compliance checks and 30 PCI-DSS checks.
Network and Security Architecture
Designing a secure network that align business and technology goals. Having designed networks for hospitals, hotels, and education centers.
CyberSecurity
Services include: Pen testing, risk assessments & mitigation, vulnerability assessment, physical security checking. I have completed over 120 assessments.
Project Management
Working to finish the hour requirement for my PMP, my Projects deal with Healthcare services and risk mitigation. I currently volunteer within healthcare facilities to manage projects.
On/off boarding
A common project I am brought in for is the transient between IT vendors. Verifying the transitions from the old to the new IT/MSP is done correctly.
Asset & License Audits
Work with management and accounting to discover assets, and licenses. Projects include assets life cycle development, software licenses verification and audits for pirated licenses.
Virtualized, Cloud & Email Migration
I have been a project lead moving from different VDI solution, cloud providers or even just updating current inhouse virtualized platforms. I have completed over 80 migrations to office365 with reducing security exposure and data loss.
Other areas include:
Digital Forensics
E-Discovery
VoIP
Third Party IT Review
Policies & Procedure Development
IT efficiencies
Adjunct Instructor
Network, Security and storage Instructor
Network & Security Architecture
I provide MSP Services. These services include areas such as
• Data Center Development
• Cybersecurity
• Networking
• VoIP
• Compliance Review
• Assessments in Risk & Vulnerabilities
• Helpdesk
• And other IT or Technology Related Services
The Focus of this MSP is Networking and Security
Professor & Director of Cyber Security Program
I am the Director of Cyber Security Program, i oversee the program, the management and the development of this program. I work with industry leaders to maintain relevance.
I also teach courses in Cybersecurity that include: general security, networking, ethical hacking, compliance, assessments, and Cisco courses up to CCNP.
I am the lead faculty that sponsors the CSN Cybersecurity club
Networking/Security Technician
•Managing support IT staff of 5 technician
•Installing, configuring an maintaining network equipment
•Plans and supports network and computing infrastructure
•Documents network problems and resolution for future reference
•Manage user accounts, permissions, email, anti-virus, anti-spam
Professor
•Providing instructions on Networking, Network Infrastructure, Server and Security concepts.
Doctor of Philosophy (PhD)
PhD in Information Assurance & Security
Bachelor of Applied Science (B.A.Sc.)
Technical Management in Business IS
Master's degree
Master of Network and Communications Management
Packt
What You Will Learn Use SET to clone webpages including the login page Understand the concept of Wi-Fi cracking and use PCAP file to obtain passwords Attack using a USB as payload injector Familiarize yourself with the process of trojan attacks Use Shodan to identify honeypots, rogue access points, vulnerable webcams, and other exploits found in the database Explore various tools for wireless penetration testing and auditing Create an evil twin to intercept network traffic Identify human patterns in networks attacks
The following profiles may or may not be the same professor: