top of page


     David Sheidlower:











David Sheidlower, CISSP, CISM, is Vice President and Chief Information Security and Privacy Officer for Turner Construction Company.  He has been a security officer in multiple industries including Health Care and Financial Services.  He has served on the policy committee of the State of New York Health Information Network and on the Alameda County Long Term Care planning committee. 

He has published articles on many security topics, including the NIST Framework for Improving Critical Infrastructure Cybersecurity.  He was also the lead author of the CISOsConnect ebook on Vulnerability Management.

He holds a Bachelor’s degree from the University of California, Berkeley, and a Master’s from St. Mary’s College of California.

David Sheidlower pix.jpg




By the end of this 5-week curriculum, participants will have a comprehensive understanding of the threat landscape, the role of technical safeguards including anti-malware software and network network security, and incident response strategies.


You will be equipped with practical skills to safeguard computer systems from viruses and malware.


Week 1: Introduction to Cybersecurity Threats

  • Objective: Understand the landscape of cybersecurity threats, with a focus on viruses and malware.

  • Introduction to common types of malware: viruses, worms, Trojans, ransomware, and spyware.


Week 2: Fundamentals of Cybersecurity


  • Objective: Explore the basic framework for understanding safeguards

  • Overview of the 6 fundamental concepts:

  • Confidentiality

  • Integrity

  • Availability

  • Physical Safeguards

  • Technical Safeguards


Week 3: Securing Endpoints and Networks


  • Objective: Understand how to extend protection beyond individual devices.

  • Introduction to endpoint security: firewalls, intrusion detection/prevention systems.

  • Network-level protection strategies.


Week 4: Guest Speaker – Sandia Labs


Week 5: Technical Safeguard: anti-malware software


  • Objective: Delve into advanced techniques employed by anti-malware tools for proactive defense.

  • Heuristic analysis and behavioral monitoring.

  • Signature-based vs. behavior-based detection.

  • Explore XDR (extended detection and response)

bottom of page