On Equifax Data Breach and the Academic Arrogance of the InfoSec Professionals in LinkedIn

There are a lot of noise in the last couple of weeks regarding Equifax’s data breach. Equifax is one of the big four credit rating bureaus in the United States. You can imagine the type of data stored and the gravity of the data breach! The data breach was massive as the current investigations determined … Continue reading On Equifax Data Breach and the Academic Arrogance of the InfoSec Professionals in LinkedIn

Proud of my students’ achievements @ UA&P event

Last February 24, 2017, me and my undergraduate students went to the University of Asia and the Pacific (UA&P) in Pasig City to present their project Hydra in a school-initiated research conference. The event was not very big but various students from undergrad to PhD were prepared to present their papers. I was really pushy … Continue reading Proud of my students’ achievements @ UA&P event

8 Helpful Things You can do to Prepare and Pass a GIAC exam

Roughly one year after I passed the GIAC Web Application Penetration Tester (GWAPT) exam, I took the GIAC Mobile Device Security Analyst (GMOB). I became one of a less than a thousand professionals who earned the certification. One of the observations that I have is that preparations I did for both exams were pretty much … Continue reading 8 Helpful Things You can do to Prepare and Pass a GIAC exam

COMSEC2 Vulnerability POC and Analysis

For COMSEC2, the project of the students is to simulate and existing vulnerability (it can be application, network etc.) and create an analysis based from research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the … Continue reading COMSEC2 Vulnerability POC and Analysis

Machine Project in Infosec

Objectives ■To be able to configure, implement an open-source security tool. ■To simulate a real-world attack scenario where the security tool can be used. ■To show how to configure necessary functionalities of the security tool. Tasks ■Each group will be assigned a specific security tool. Each group will research about the topic and download an … Continue reading Machine Project in Infosec

Research Paper on Emerging Technologies

Introduction A Case Study will be held as an academic symposium during the midterms week to discuss various emerging technologies in the field of information security. Each group will be tasked to research on a specified topic, explore and answer key issues about the subject. As its culminating activity, an academic paper with a required … Continue reading Research Paper on Emerging Technologies

COMSEC1 – Culminating Project

In INFOSEC, the focus of the discussion is a bird's eye view of the different domains of Information Security. More importantly, the curriculum followed is the CompTIA Security+ lessons. The final project's objective is to be able to explore on security tools and software such as firewall, IDS, honeypot and to demonstrate the functionalities by … Continue reading COMSEC1 – Culminating Project