About
Courses by Lisa
Articles by Lisa
Activity
-
♻️ Found this helpful? Repost to help your LinkedIn network Two things to Remember in life: Take care of your thoughts when your alone and take…
♻️ Found this helpful? Repost to help your LinkedIn network Two things to Remember in life: Take care of your thoughts when your alone and take…
Liked by Lisa Bock
-
In a recent article, Patrick Spencer lists 15 predictions every security leader needs to know. According to the article, he states: “Every…
In a recent article, Patrick Spencer lists 15 predictions every security leader needs to know. According to the article, he states: “Every…
Shared by Lisa Bock
-
Every day, the world passively collects petabytes of data, and that data can fall into the wrong hands, which affects our privacy. One issue that…
Every day, the world passively collects petabytes of data, and that data can fall into the wrong hands, which affects our privacy. One issue that…
Shared by Lisa Bock
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Member InfraGard
InfraGard Central Pennsylvania PA Harrisburg
- Present 14 years 11 months
Education
The mission of the Central PA InfraGard Members Alliance is to improve the security and integrity of the critical infrastructures of the region by providing a forum for the confidential sharing of information, vulnerability assessment and reduction, and the education and training of its membership.
-
Global Advisory Board for Ethical Hacking
EC-Council
- Present 3 years 1 month
Science and Technology
The Advisory Board for C|EH provides input to advance new and current initiatives in promoting Ethical Hacking. https://www.eccouncil.org/global-advisory-board-for-ethical-hacking/
Publications
-
Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark, 2nd Edition
Packt Publishing
See publicationWireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark's functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you'll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit…
Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark's functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you'll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit your needs.
This updated second edition of Learn Wireshark starts by outlining the benefits of traffic analysis. You'll discover the process of installing Wireshark and become more familiar with the interface. Next, you'll focus on the Internet Suite and then explore deep packet analysis of common protocols such as DNS, DHCP, HTTP, and ARP. The book also guides you through working with the expert system to detect network latency issues, create I/O and stream graphs, subset traffic, and save and export captures. Finally, you'll understand how to share captures using CloudShark, a browser-based solution for analyzing packet captures.
By the end of this Wireshark book, you'll have the skills and hands-on experience you need to conduct deep packet analysis of common protocols and network troubleshooting as well as identify security issues. -
The Official CompTIA PenTest+ Self-Paced Study Guide (PT0-002)
See publicationThis is the only official CompTIA study guide for the CompTIA PenTest+ (PT0-002) certification exam. Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
-
Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data
Packt Publishing
See publicationIn today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.
The book begins by helping you to understand…In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.
The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).
By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI. -
Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Packt Publishing
See publicationBiometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.
Starting with an…Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.
Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.
By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. -
Learn Wireshark
Packt Publishing
See publicationConfidently navigate the Wireshark interface and solve real-world networking problems
Courses
-
Wireshark Functionality and Fundamentals
Wireshark University
-
Wireshark Network Forensics and Security
Wireshark University
-
Wireshark TCP/IP Network Analysis
Wireshark University
-
Wireshark Troubleshooting Network Performance
Wireshark University
Other similar profiles
-
Reza Nazari
Reza Nazari
-
Douglas Fisher
Douglas Fisher
-
Jonathan S. Weissman
Jonathan S. Weissman
-
wasim alhamdani
wasim alhamdani
-
Vanderbilt Brabson III
Vanderbilt Brabson III
-
Aaron Thompson
Aaron Thompson
-
Barbara Coloroso
Barbara Coloroso
-
Jen Malia, Ph.D.
Jen Malia, Ph.D.
-
Kristin Holsman-Francoeur
Kristin Holsman-Francoeur
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Lisa Bock in United States
53 others named Lisa Bock in United States are on LinkedIn
See others named Lisa Bock