DEPTH OF TRAINING / CERTIFICATIONS / PROFESSIONAL MEMBERSHIPS & AFFILIATIONS
Along with a heavy background in Forensic Psychology, Behavioral Analysis and Digital Defense, Ebony S. Muhammad has extensive training and expertise in the following areas:
(Click the “+” to expand)
-
Cyber Threat and Kill Chain Methodology
Introduction to Threat Intelligence
Vulnerability Management
VMDR – Vulnerability Management Detection Response
Trust & Security – How To Stay A Step Ahead
Securing Open Source: Hidden In Plain Sight
How To Defend Against Microsoft Cloud Takeovers
The Science of Cybersecurity: Best Practices In the New Normal
Continuous Assessment As A Mindset: A Top-down Approach
The Myth of Cybersecurity: Prevention Is Ideal, but Detection Is A Must
Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses
Death to Documents: How Hard Copy Documents Pose High Level Risks
Getting Ahead of the Attacker: Mitigating Cyber Risks
AWS Identity & Access Management
The Age of Cyber Warfare: The Digital Battlefield
A Master Class On Cybersecurity: Password Best Practices
Building A Secure Experience Everywhere
How to Turn the Tables on Cyber Criminals
A Master Class On Cybersecurity: Data Driven Defense
Why Teams, Strategies and Processes Are Essential for Managing Cyber Risks
WIFI Dangers
Cloud Security and Information Protection Strategies
-
Social Engineering: Executive Briefing
Ethical Hacking: Social Engineering
Don’t Let the Phish Bite: Protecting Yourself and Others
Social Engineering Report: How Threat Actors Hijack Attention
Identity Is the New Attack Surface: A CISO’s Perspective
State of the Phish: Closing the Gap In User Vulnerability
Combating Rogue URL Tricks
Preventing Threats By Protecting Against Business Email Compromise (BEC)
Popular Scams and How They Work
The Role of Empathy in Social Engineering
How Criminals Use AI and Voice Deep Fakes to Scam You
The Human Deception Problem: Understanding & Defending Against Social Engineering Attacks
The Human Factor in Today’s Modern Attacks
-
Getting Started with Insider Threats
Intelligent Compliance
2023 Threat Landscape
Defend Your Data Against Insider Threats
CISO: Justifying the Importance of Your DLP Program to The Board
How To Stop Your Data from Leaving with Employees
Pfizer’s Approach on Insider Threat Management
Mitigate Risk from Insider Threats: Insights and Advice
Decrease Insider Risk from Careless Users with Security Awareness
Building A Successful Insider Threat Management Program
Insider Threat Analysis
Investigate and Respond to Insider Threats with Speed and Accuracy
Manage Insider Threats with A People-Centric Approach
Healthcare Threat Briefing: Keeping Your People Secure
Data Protection in A Multi-Cloud World
Insider Threats and International Espionage
How to Detect and Investigate Malicious Insider Threats
The What, Why and How of Data Privacy
Consumer Privacy Act
Information Privacy & Security
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Fraud, Waste & Abuse
Insider Trading Laws & Policies
-
Cyber Threat Hunting – Tools and Techniques
Managed Threat Detection and Response
Kaspersky Security Operations and Threat Hunting
How To Minimize Threat Exposure with Automation
-
Computer Forensics Fundamentals
Computer Forensics Investigation Process
Digital Forensics Examiner
Digital Forensics: The Big Picture
Incident Forensics: Digital Media Acquisition
Access Data Forensic Toolkit (FTK) Imager
Malware As An Ongoing Email Issue
-
Artificial Intelligence, ChatGPT and Cybersecurity: A Match Made In Heaven or A Hack Waiting to Happen?
Does ChatGPT Belong on Your Cyber Risk Register? Some Legal Perspectives
Deep Fake Detection and GAN Fingerprints
How Criminals Use AI and Voice Deep Fakes to Scam You
Fake Videos of Real People and How To Spot Them
Introduction to Artificial Intelligence (AI) and Machine Learning (ML)
Applications of AI and ML to the World of Information Security
Evaluating AI and ML based Products
-
Maritime Transportation System Cybersecurity
National Airspace System & Airport Cybersecurity
-
Master of Legal Studies - Cybersecurity Law & Policy
Master of Science - Psychology (Forensics)
Bachelor of Science - Psychology (Behavioral Analysis)
-
Certified Insider Threat Specialist
Certified Security Awareness Specialist
Certified AI/ML Specialist
-
Hacker In Heels Insider
Recon Thursday Defensive
(ISC)²
SE-COM