Lisa Bock
- Auteur
Lisa Bock is an associate professor in the IT department at Pennsylvania College of Technology, in Williamsport, PA. Some of the courses she has taught since 2003 include networking, security, biometrics, protocol vulnerabilities using Wireshark, CCNA security, and unified communications. In addition to this, she is a LinkedIn learning instructor and has published over 30 courses, mainly in cybersecurity and networking.
She holds an MS from UMUC along with numerous other certifications. She has had training in forensics, biometrics, networking, steganography, and network security.
She holds an MS from UMUC along with numerous other certifications. She has had training in forensics, biometrics, networking, steganography, and network security.
Lisa Bock is an associate professor in the IT department at Pennsylvania College of Technology, in Williamsport, PA. Some of the courses she has taught since 2003 include networking, security, biometrics, protocol vulnerabilities using Wireshark, CCNA security, and unified communications. In addition to this, she is a LinkedIn learning instructor and has published over 30 courses, mainly in cybersecurity and networking.
She holds an MS from UMUC along with numerous other certifications. She has had training in forensics, biometrics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning, nationally known speaker.
She holds an MS from UMUC along with numerous other certifications. She has had training in forensics, biometrics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning, nationally known speaker.
Geschreven door Lisa Bock
Lisa Bock
Modern Cryptography for Cybersecurity Professionals
Every minute of the day, there are petabytes of data exchanged between our homes, cars, businesses, and IoT devices. But just what exactly is involved when using cryptographic techniques?
Meer