top of page

            Instructor, 

     David Sheidlower:

 

 

                     

 

 

                       

 

 

 

 

David Sheidlower, CISSP, CISM, is Vice President and Chief Information Security and Privacy Officer for Turner Construction Company.  He has been a security officer in multiple industries including Health Care and Financial Services.  He has served on the policy committee of the State of New York Health Information Network and on the Alameda County Long Term Care planning committee. 
 

He has published articles on many security topics, including the NIST Framework for Improving Critical Infrastructure Cybersecurity.  He was also the lead author of the CISOsConnect ebook on Vulnerability Management.

He holds a Bachelor’s degree from the University of California, Berkeley, and a Master’s from St. Mary’s College of California.

David Sheidlower pix.jpg

CYBERSECURITY

VIRUS AND MALWARE PROTECTION

 

By the end of this 5-week curriculum, participants will have a comprehensive understanding of the threat landscape, the role of technical safeguards including anti-malware software and network network security, and incident response strategies.

 

You will be equipped with practical skills to safeguard computer systems from viruses and malware.

USD-Cyber-Cybersecurity-vs-Information-Security-vs-Network-Security-_2.jpeg

Week 1: Introduction to Cybersecurity Threats

  • Objective: Understand the landscape of cybersecurity threats, with a focus on viruses and malware.

  • Introduction to common types of malware: viruses, worms, Trojans, ransomware, and spyware.

 

Week 2: Fundamentals of Cybersecurity

 

  • Objective: Explore the basic framework for understanding safeguards

  • Overview of the 6 fundamental concepts:

  • Confidentiality

  • Integrity

  • Availability

  • Physical Safeguards

  • Technical Safeguards

 

Week 3: Securing Endpoints and Networks

 

  • Objective: Understand how to extend protection beyond individual devices.

  • Introduction to endpoint security: firewalls, intrusion detection/prevention systems.

  • Network-level protection strategies.

 

Week 4: Guest Speaker – Sandia Labs

 

Week 5: Technical Safeguard: anti-malware software

 

  • Objective: Delve into advanced techniques employed by anti-malware tools for proactive defense.

  • Heuristic analysis and behavioral monitoring.

  • Signature-based vs. behavior-based detection.

  • Explore XDR (extended detection and response)

bottom of page