Depth of Training

DEPTH OF TRAINING / CERTIFICATIONS / PROFESSIONAL MEMBERSHIPS & AFFILIATIONS

Along with a heavy background in Forensic Psychology, Behavioral Analysis and Digital Defense, Ebony S. Muhammad has extensive training and expertise in the following areas:

(Click the “+” to expand)

  • Cyber Threat and Kill Chain Methodology

    Introduction to Threat Intelligence

    Vulnerability Management

    VMDR – Vulnerability Management Detection Response

    Trust & Security – How To Stay A Step Ahead

    Securing Open Source: Hidden In Plain Sight

    How To Defend Against Microsoft Cloud Takeovers

    The Science of Cybersecurity: Best Practices In the New Normal

    Continuous Assessment As A Mindset: A Top-down Approach

    The Myth of Cybersecurity: Prevention Is Ideal, but Detection Is A Must

    Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

    Death to Documents: How Hard Copy Documents Pose High Level Risks

    Getting Ahead of the Attacker: Mitigating Cyber Risks

    AWS Identity & Access Management

    The Age of Cyber Warfare: The Digital Battlefield

    A Master Class On Cybersecurity: Password Best Practices

    Building A Secure Experience Everywhere

    How to Turn the Tables on Cyber Criminals

    A Master Class On Cybersecurity: Data Driven Defense

    Why Teams, Strategies and Processes Are Essential for Managing Cyber Risks

    WIFI Dangers

    Cloud Security and Information Protection Strategies

  • Social Engineering: Executive Briefing

    Ethical Hacking: Social Engineering

    Don’t Let the Phish Bite: Protecting Yourself and Others

    Social Engineering Report: How Threat Actors Hijack Attention

    Identity Is the New Attack Surface: A CISO’s Perspective

    State of the Phish: Closing the Gap In User Vulnerability

    Combating Rogue URL Tricks

    Preventing Threats By Protecting Against Business Email Compromise (BEC)

    Popular Scams and How They Work

    The Role of Empathy in Social Engineering

    How Criminals Use AI and Voice Deep Fakes to Scam You

    The Human Deception Problem: Understanding & Defending Against Social Engineering Attacks

    The Human Factor in Today’s Modern Attacks

  • Getting Started with Insider Threats

    Intelligent Compliance

    2023 Threat Landscape

    Defend Your Data Against Insider Threats

    CISO: Justifying the Importance of Your DLP Program to The Board

    How To Stop Your Data from Leaving with Employees

    Pfizer’s Approach on Insider Threat Management

    Mitigate Risk from Insider Threats: Insights and Advice

    Decrease Insider Risk from Careless Users with Security Awareness

    Building A Successful Insider Threat Management Program

    Insider Threat Analysis

    Investigate and Respond to Insider Threats with Speed and Accuracy

    Manage Insider Threats with A People-Centric Approach

    Healthcare Threat Briefing: Keeping Your People Secure

    Data Protection in A Multi-Cloud World

    Insider Threats and International Espionage

    How to Detect and Investigate Malicious Insider Threats

    The What, Why and How of Data Privacy

    Consumer Privacy Act

    Information Privacy & Security

    Health Insurance Portability and Accountability Act (HIPAA) Compliance

    Fraud, Waste & Abuse

    Insider Trading Laws & Policies

  • Cyber Threat Hunting – Tools and Techniques

    Managed Threat Detection and Response

    Kaspersky Security Operations and Threat Hunting

    How To Minimize Threat Exposure with Automation

  • Computer Forensics Fundamentals

    Computer Forensics Investigation Process

    Digital Forensics Examiner

    Digital Forensics: The Big Picture

    Incident Forensics: Digital Media Acquisition

    Access Data Forensic Toolkit (FTK) Imager

    Malware As An Ongoing Email Issue

  • Artificial Intelligence, ChatGPT and Cybersecurity: A Match Made In Heaven or A Hack Waiting to Happen?

    Does ChatGPT Belong on Your Cyber Risk Register? Some Legal Perspectives

    Deep Fake Detection and GAN Fingerprints

    How Criminals Use AI and Voice Deep Fakes to Scam You

    Fake Videos of Real People and How To Spot Them

    Introduction to Artificial Intelligence (AI) and Machine Learning (ML)

    Applications of AI and ML to the World of Information Security

    Evaluating AI and ML based Products

  • Maritime Transportation System Cybersecurity

    National Airspace System & Airport Cybersecurity

  • Master of Legal Studies - Cybersecurity Law & Policy

    Master of Science - Psychology (Forensics)

    Bachelor of Science - Psychology (Behavioral Analysis)

  • Certified Insider Threat Specialist

    Certified Security Awareness Specialist

    Certified AI/ML Specialist

  • Hacker In Heels Insider

    Recon Thursday Defensive

    (ISC)²

    SE-COM