New!! Authority Magazine Interviews Prof. Osgood

“Prof. Osgood On The 5 Things Every American Business Leader Should Do To Shield Themselves From A Cyberattack”Read more

Tahir Khan

Title: Adjunct Professor

Groups: Faculty Bio Page

Mr. Khan has over twenty years of experience in the Information Security field. Mr. Khan is currently the Chief Information Security Officer of Sensity Systems and an advisor of a startup focusing on identity management and authentication. Previously he was the Chief Information Security Officer for a private financial services company managing the incident response, fraud detection and information security teams as well as research in the information security arena. Mr. Khan spent more than a decade at Northrop Grumman where he served various federal agencies in information security and network operations. Mr. Khan’s current hobbies are mobile application analysis, mobile application reverse engineering and researching wireless vulnerabilities.

Credentials:
MS Computer Forensics – George Mason University

Courses:
Penetration Testing Forensics, Mobile Application Analysis and Forensics, Anti Forensics
Penetration Test Comp Forensics (Fall)
Anti-Forensics (Fall)
Mobile Application/Forensic Analysis (Spring)

T. Roy

Title: Adjunct Professor

Groups: Faculty Bio Page

T.Roy is the founder and president of CodeMachine. He spends most of his time on security research, reverse engineering, software development, and training. He holds a Master’s Degree in Computer Engineering and has taken many products from their infancy all the way through to commercial success. He has spent more than a decade working on security products like host intrusion prevention, network firewalls, behavioral anti-malware, document security, and data leak prevention systems. He has also worked on the offensive side of security for the government and defense industry.

He has been delivering training courses to companies all over the world, has taught Microsoft’s own engineers and has received many instructor recognition awards. He has an innate talent for taking complex concepts and explaining them in a lucid manner. Through the courses he teaches, he shares the knowledge he has acquired through years of hands-on experience.

Credentials:
MS in Computer Engineering

Courses:
Kernel Forensics and Analysis

Simson Garfinkel

Title: Adjunct Professor

Groups: Faculty Bio Page

Simson L. Garfinkel has been researching and writing about computer security since the late 1980s. His book Practical UNIX and Internet Security (co-authored with Gene Spafford and Alan Schwartz), has sold more than 250,000 copies and been translated into more than a dozen languages since the first edition was published in 1991. He holds seven US patents and has published dozens of research articles in computer security and digital forensics. He is an ACM Fellow, an IEEE Senior Member, as a member of the National Association of Science Writers. Garfinkel is the author or co-author of fourteen books on computing. His book Database Nation: The Death of Privacy in the 21st Century (O’Reilly, 2000) discussed the impact of technology on privacy in the 20th and 21st centuries. As an entrepreneur, Garfinkel founded five companies between 1989 and 2000, including Vineyard.NET, which provided Internet service on Martha’s Vineyard to more than a thousand customers from 1995 through 2005, and Sandstorm Enterprises, an early developer of digital forensic tools.

Credentials:
S.B., Chemistry, Massachusetts Institute of Technology.
S.B., Political Science, Massachusetts Institute of Technology.
S.B., Science, Technology & Society, Massachusetts Institute of Technology.
M.S., Journalism, Columbia University School of Journalism
Ph.D., Computer Science, Massachusetts Institute of Technology.
CISSP® #4757
CIPP/US #000203701I

Courses:
Cloud Forensics

Michael Robinson

Title: Adjunct Professor

Groups: Faculty Bio Page

Michael Robinson is a Security Engineer and Incident Manager at Google, where he manages the response to security and privacy incidents. He specializes in computer forensics, mobile device forensics, and intrusion analysis. Prior to joining Google, Michael was a senior cyber threat analyst and digital forensic examiner for a large international company. He was a computer and cell phone forensic analyst working with various agencies in the U.S. Intelligence Community. He was the Chief Information Officer (CIO) of the Department of Defense’s Business Transformation Agency. As the CIO he oversaw all IT and Information Assurance operations for the agency, including forensic examinations of computers and mobile devices. Michael was the Program Coordinator and Adjunct Professor for Stevenson University’s Master of Science in Cyber Forensics, where he was the recipient of the Rose Dawson Award for outstanding adjunct faculty member of the year.

Credentials:
MS in Computer Forensics, Stevenson University
MS in Information Technology/Information Assurance, University of Maryland
BS in Chemical Engineering, Drexel University
Graduate Certificate in Applied Intelligence, Mercyhurst University

Courses:
Incident Response Forensics
Mobile Device Forensics

Kristi Horton

Kafi Hassan

Title: Adjunct Professor

Groups: Faculty Bio Page

Dr. Hassan has been working for Sprint Corporation in Reston, Virginia since 2006. He is a Senior Technology Development Engineer in the Network Innovation and Architecture team. From 1995 to 2006, he worked as a Member of Technical Staff at Bell Laboratories at Whippany, New Jersey, doing research and development in design and analysis of communication systems.

Dr. Hassan’s current research interest include computer forensics, intrusion detection systems, lawful surveillance systems, high-performance network optimization algorithms, network architectures and resource management, evolutionary computation and mobile applications.

Dr. Hassan is the current Chair of the IEEE Communications Society (ComSoc) Northern Virginia Chapter.

Credentials:
Ph.D. Electrical Engineering, Graduate Center of City University of New York
BS and MS Electrical Engineering, University of North Carolina at Charlotte

Courses:
Operations of Intrusion Detection and Forensics

Joseph C. Opacki

Title: Adjunct Professor

Groups: Faculty Bio Page

Mr. Opacki is a career cybersecurity professional with specialization in malware reverse engineering, computer intrusion investigation, security research, and threat intelligence. He has been active in academia working as an Adjunct Professor for many years in the George Mason University Master of Computer Forensics program and has been a part of the Cybersecurity Curriculum Advisory Council (CCAC) at University of Maryland University College. Before his career in the private sector, Mr. Opacki was the malware reverse engineering Subject Matter Expert (SME) and the Technical Director of advanced digital forensics in the Operational Technology Division at the Federal Bureau of Investigation. In 2011, Mr. Opacki was awarded the FBI Director’s Award of Excellence for Outstanding Technical Advancement and in 2012 he was awarded the Office of the Director of National Intelligence’s Science and Technology Team Award; both for his work in enterprise-level malware investigative triage. Mr. Opacki holds a Masters of Science in Information Technology from the Virginia Polytechnic and State University as well as a Bachelors of Individualized Study from George Mason University.

Credentials:
MS in Information Technology.
Bachelor of Individualized Study, Multimedia Software Design

Courses:
Malware Reverse Engineering

John J. Larkin

Title: Adjunct Professor

Groups: Faculty Bio Page

John Larkin leads an innovative team of intelligence analysts and network security experts in developing cyber threat indicators, warnings, and predictive analysis to protect global information infrastructure against external and internal threat.

Mr. Larkin has 26 years of experience in the technology industry and has extensive expertise in working with government and private sector entities. He has consulted and developed guidance to ensure systems reliability and accessibility and to prevent and defend against unauthorized access to networks, application systems, and data.

John received his Bachelor’s Degree in Information Technology Security Management and his Master’s of Science in IT Management from George Mason University. He is also a Certified Information Systems Security Professional (CISSP), Certified Chief Information Officer (CIO), and Project Management Professional (PMP).

Credentials:
MS in IT Management, George Mason University
BS in IT Security Management, George Mason University
CIO, CISSP, PMP, A+

Courses:
Digital Media Forensics

John J. Irvine

Title: Adjunct Professor

Groups: Faculty Bio Page

Mr. Irvine has over twenty five years of experience working for and around the Federal Government, with nearly twenty years specializing in Computer Forensic Analysis and Digital Investigations. John has performed computer forensic analysis and media exploitation casework for the FBI, CIA, DEA, and both large and small commercial companies. Over his career, he has been both a practicing examiner and an active manager, leading teams of up to forty specialists working in the areas of computer forensic analysis, network forensic analysis, malicious code and binary reverse engineering, software development, test and quality assurance, and technical support.

As a senior digital forensic analyst himself, Mr. Irvine specializes in the areas of Cyber Profiling and counterterrorism-based digital forensic analysis.

Currently, Mr. Irvine is the CTO of CyTech Services, Inc. and oversees the development of CyFIR Enterprise, an enterprise-level remote digital forensics and incident response platform. CyFIR Enterprise is known as the tool that found active malicious code at the Office of Personnel Management in 2015 during a demonstration of CyFIR’s capabilities, leading to the announcement of the largest network breach in US Government history.

Credentials:
M.S. Information Systems, GMU, 2000
G.C. Software Systems Engineering, GMU, 2000
EnCE – EnCase Certified Examiner
Q/EH – Qualified Ethical Hacker
Former Private Investigator, Commonwealth of Virginia
Former CART Certified Field Examiner, Federal Bureau of Investigation
Former DEA Certified Examiner, Drug Enforcement Administration

Courses:
Legal and Ethical Issues in Computer Forensics

Jessica L. Hyde

Title: Adjunct Professor

Groups: Faculty Bio Page

Jessica Hyde is an experienced forensic examiner in both the government and commercial sectors having worked as a contractor providing forensics services to the Department of Defense and Intelligence Community. She currently serves as a Consultant to Magnet Forensics where she was the Director of Forensics and is Adjunct Professor teaching Mobile Forensics in the graduate program at George Mason University, where she achieved an MS in Computer Forensics. Jessica is the host of Cache Up, a weekly podcast where she interviews digital forensics practitioners. She is also involved in several community efforts including as a volunteer for the Marine Corps Cyber Auxiliary, Chair of DFIR Review, 1st Vice President of the New York Metro High Tech Crime International Association Chapter, advisory board for Cyber Sleuths Lab, and a member of the Editorial Board for the Forensic Science International: Digital Investigations Journal. Her previous roles included performing forensic examinations as a Sr. Mobile Exploitation Analyst for Basis Technology, Senior at EY, and Senior Electrical Engineer at American Systems. Jessica is also proud to be a veteran of the United States Marine Corps.

Credentials:
M.S. Computer Forensics
B.S. Electronics Engineering Technology

Courses:
Mobile Device Forensics