Biography:Chuck Easttom
Chuck Easttom | |
---|---|
Born | William Easttom II October 5, 1968 |
Citizenship | United States |
Alma mater | Capitol Technology University University of Portsmouth University of Texas El Paso Southeastern Oklahoma State University Northcentral University |
Awards | |
Scientific career | |
Fields | Cybersecurity Engineering Cryptography Quantum Computing Nanotechnology |
Institutions | Georgetown University |
Thesis | A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing |
William "Chuck" Easttom II (born October 5, 1968) is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.
Education
Chuck Easttom holds a B.A. from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a master's degree in Applied Computer Science from Northcentral University[1] and a Masters in Systems Engineering from the University of Texas at El Paso, as well as a D.Sc. Doctor of Science in cyber security from Capitol Technology University[2][3][4] dissertation topic "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing", a Ph.D.Doctor of Philosophy in Technology focused on Nanotechnology[5] dissertation topic "The Effects of Complexity on Carbon Nanotube Failures", and a Ph.D.Doctor of Philosophy in Computer Science from University of Portsmouth[6] dissertation topic "A Systematic Framework for Network Forensics Using Graph Theory".
Professional work
In addition to computer security, Easttom has done work in software engineering.,[7][8] applied mathematics, and other areas. He has authored 37 books[9] on computer security, programming languages, Linux, cyber forensics, quantum computing, computer networks, penetration testing, and cryptography. His books are used as textbooks for both undergraduate and graduate programs at over 60 universities.[10][11][12][13][14][15][16][17][18][19][20] He is an inventor with 25 patented computer science inventions.[21] He is a frequent speaker at major cybersecurity conferences.[22][23][24][25]
Easttom was part of the team that created the original CompTIA Security+ [26] and CompTIA Linux+ exams. He created the OSFCE (OSForensics Certified Examiner) course and test,[27] the EC Council Certified Encryption Specialist course and certification test,[28] and EC Council CAST Advanced Encryption course [29] as well as working on other EC-Council certifications [30]
Easttom has been involved in numerous IEEE standards. He is currently the Chair of IEEE P3123 - Artificial Intelligence and Machine Learning (AI/ML) Terminology and Data Formats Working Group,[31] a member of IEEE 2731 BCI unified terminology working group,[32] a former member (2017 to 2019) of IEEE Software & Systems Engineering Standards Committee. Working on the DevOps 2675,[33] a member of IEEE P2995 - Trial-Use Standard for a Quantum Algorithm Design and Development Standards Group,[34] and Vice Chair IEEE P23026 - Systems and Software Engineering -- Engineering and Management of Websites for Systems, Software, and Services Information[35]
Chuck Easttom has been interviewed regarding cyber security topics by CNN Money[36] and CBS Smart Planet,[37] and other media outlets,[38][39][40][41][42][43][44] and He has been named a Distinguished Speaker of the ACM[45] and a Distinguished Visitor of the IEEE.[46] He is also a Senior member of the IEEE [47] and Senior member of the ACM.[48]
Easttom was Editor in Chief for the American Journal of Science and Engineering from 2018 to 2022.[49] He was also the director of the Quantum Computing and Cryptography Lab at Capitol Technology University,[50] from 2019 to 2022 he was an adjunct professor for the University of Dallas,[51] he is currently an adjunct lecturer for Georgetown University [52] and an Adjunct professor for Vanderbilt University.[53]
Books
Easttom has authored 38 computer science books. These include:
- Beginning JavaScript, 1st Edition.WordWare Publishing (2001)
- JBuilder 7.0 EJB Programming.WordWare Publishing (2002)
- Programming Fundamentals in C++.Charles River Learning. 1st Edition, Charles River Media (2003)
- Essential Linux Administration: A Comprehensive Guide for Beginners. Cengage Press (2011)
- System Forensics, Investigation, and Response, 2nd Edition, Jones & Bartlett (2013)
- System Forensics, Investigation, and Response (Information Systems Security & Assurance), 3rd Edition Jones and Bartlett (2017) ISBN:978-1284121841
- Certified Cyber Forensics Professional All in One Guide. McGraw-Hill (2014) ISBN:978-0071839761
- Computer Security Fundamentals (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC) (2016) ISBN:978-0789757463
- CompTIA Security+ Study Guide: Exam SY0-501. John Wiley & Sons (2017)
- Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (1st Edition). Pearson IT Cybersecurity Curriculum (2018) ISBN:978-0789759375
- CompTIA Security+ Practice Tests: Exam SY0-501. Sybex (2018)
- Network Defense and Countermeasures: Principles and Practices, 3rd Edition Pearson IT Cybersecurity Curriculum (ITCC)) (2018)
- Networking Fundamentals, 3rd Edition. Goodheart-Wilcox Publishing) (2018)
References
- ↑ "Northcentral University Alumni". https://alumnius.net/northcentral_univers-11143-year-2011#alumni.
- ↑ "Secure World Speaker Bio". https://events.secureworldexpo.com/speakers/chuck-easttom/.
- ↑ "Keynote Speakers Bio". http://saiconference.com/FICC2019/Speakers.
- ↑ "Easttom: in cyber war, malware is "the weapon of choice"". https://www.captechu.edu/blog/easttom-cyber-war-malware-weapon-of-choice.
- ↑ "Faculty Bio". https://gufaculty360.georgetown.edu/s/contact/0031Q00002CafP5QAJ/william-easttom.
- ↑ "Chuck Easttom". https://www.amazon.com/Chuck-Easttom/e/B001IYZ6I8%3Fref=dbs_a_mng_rwt_scns_share.
- ↑ "EC Council CASE Java". https://www.youtube.com/watch?v=l-S2ooZMgrY.
- ↑ "Computer Programming Course Syllabus". http://cedat.mak.ac.ug/wp-content/themes/CEDAT-Theme/curriculums/bsc-electrical-engineering/CMP-1201.pdf.
- ↑ "Speaker Bio". http://www.technosecurity.us/tx/speakers/chuck-easttom.[yes|permanent dead link|dead link}}]
- ↑ "CS 511 digital forensics.". https://www.liberty.edu/online/wp-content/uploads/CSCI511_CourseGuide.pdf.
- ↑ "CCT 121 Computer Crime Investigation.". https://pages.southwesterncc.edu/kirks/bookorder.htm.
- ↑ "CIS 4345, CRN 80042, Network and Systems Security". https://www.tamuct.edu/syllabi/docs/2017_Fall/20170880042.pdf.
- ↑ "CIS 4385 Cybercrime Detection and Digital Forensics". http://www.cs.fsu.edu/~langley/CIS4385-2018-1/Syllabus.html.
- ↑ "TCOM/CFRS 661 Digital Media Forensics". https://cfrs.gmu.edu/assets/Summer15/TCOM-CFRS-661-001-Summer2015-Syllabus-v1.pdf.
- ↑ "CSCE 201 Introduction to Computer Security". https://cse.sc.edu/~farkas/csce201-2015/csce201-syllabus.htm.
- ↑ "ACST 3530 - Linux Operating Systems and Networking". http://ksuweb.kennesaw.edu/~ashaw8/acst3530-01-Summer16/acst3530s1syllabus.html.
- ↑ "COMT 36330 LAN Security Fundamentals". http://www.personal.kent.edu/~jbolen/comt36330/comt_36330.htm.
- ↑ "CSCI: Principles and Practices of Cybersecurity". http://www.citadel.edu/root/mathcs-courses/descriptions/undergraduate-computerscience/58-academics/schools/ssm/mathematics-and-computer-science/22597-csci-227-cybersecurity-non-cs.
- ↑ "ISSC630: Advanced Cybercrime Analysis". http://www.apus.edu/z/course-syllabus/ISSC630.pdf.
- ↑ "CNT 4104 Software Project in Computer Networks". http://itech.fgcu.edu/faculty/zalewski/CNT4104/CNT4104-3.html.
- ↑ "United States Patent Office". http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=0&f=S&l=50&TERM1=easttom&FIELD1=INNM&co1=AND&TERM2=&FIELD2=&d=PTXT.
- ↑ "Hacker Halted". 2017-01-18. https://www.hackerhalted.com/hacker-halted-2019/agenda/.
- ↑ "Secure World". https://events.secureworldexpo.com/agenda/dallas-tx-2018/.
- ↑ "ISC2 Security Congress". https://www.eventscribe.com/2018/ISC2/agenda.asp?pfp=agenda.
- ↑ "DEFCON". https://www.defcon.org/html/defcon-25/dc-25-workshops.html.
- ↑ "CompTIA Security+ SME List". 2016-02-09. https://www.slideshare.net/jmailen/comptia-sme-announcement-sept-2002.
- ↑ "OSForensics Training". https://www.osforensics.com/training.html.
- ↑ "ECES". https://www.youtube.com/watch?v=ZLuz60ImHuM.
- ↑ "Author Bio". http://www.jblearning.com/catalog/9781284121841/5.[yes|permanent dead link|dead link}}]
- ↑ "EC Council Certified Application Security Engineer". https://iclass.eccouncil.org/schedule/certified-application-security-engineer-live-february-18-20-washington-dc/.
- ↑ "IEEE P3123". https://sagroups.ieee.org/3123/.
- ↑ Easttom, C.; Bianchi, L.; Valeriani, D.; Nam, C. S.; Hossaini, A.; Zapala, D.; Roman-Gonzalez, A.; Singh, A. K. et al. (2021). "IEEE 2731". IEEE Open Journal of Engineering in Medicine and Biology 2: 91–96. doi:10.1109/OJEMB.2021.3057471. PMID 35402984.
- ↑ "Pearson Bio". https://www.pearsonitcertification.com/authors/bio/8c7754c9-7309-40b5-90f8-70e7cc5ac318.
- ↑ "IEEE P2995". https://sagroups.ieee.org/quadd.
- ↑ "IEEE P23026". https://standards.ieee.org/ieee/23026/10425/.
- ↑ "Unhackable Code". https://money.cnn.com/2011/09/02/technology/unhackable_code/.
- ↑ "NSA proof products: protective or a profit motive?". http://www.smartplanet.com/blog/bulletin/nsa-proof-products-protective-or-a-profit-motive/.
- ↑ "What the JPMorgan Chase Breach Teaches Us". http://www.bankinfosecurity.com/interviews/what-jpmorgan-chase-breach-teaches-us-i-2982.
- ↑ "Hackers infiltrate Web site". http://www2.ljworld.com/news/2006/aug/06/hackers_infiltrate_web_site/.
- ↑ "Interview With Chuck Easttom, Computer Scientist & Consultant". https://www.forensicfocus.com/News/article/sid=2902/.
- ↑ "Steps Executives Can Take to Fight Fraud". https://www.bankinfosecurity.com/executives-must-use-discretion-on-social-media-a-8777.
- ↑ "Generating Cryptographic Keys: Will Your Random Number Generators (PRNGs) Do The Job?". https://www.cryptomathic.com/news-events/blog/author/chuck-easttom-guest8.[yes|permanent dead link|dead link}}]
- ↑ "Speaker Bio". http://usmcoc.org/wp-content/uploads/2016/07/2016-Summit-Bios-Final.pdf.
- ↑ "Forensic Focus". https://www.forensicfocus.com/c/mode=prnt/id=189/interviews/2017/chuck-easttom-computer-scientist-amp-consultant/.
- ↑ "ACM Distinguished Speaker". https://speakers.acm.org/speakers/easttom_8543.
- ↑ "Chuck Easttom | IEEE Computer Society" (in en-US). 16 January 2020. https://www.computer.org/profiles/Chuck-Easttom.
- ↑ "IEEE Senior Member". 2019-05-06. http://interface.computer.org/ieee-computer-society-new-class-of-senior-members/.
- ↑ "ACM Senior Member". https://awards.acm.org/award_winners/easttom_0447967.
- ↑ "American Journal of Science and Engineering". http://ajse.us/editorial-board/.
- ↑ "Quantum Computing and Cryptography Research Lab". https://www.captechu.edu/student-experience/labs-and-centers/quantum-computing-and-cryptography-research-lab.
- ↑ "University of Dallas Faculty Page". https://udallas.edu/cob/about/adjunct-faculty/easttom_chuck.php.
- ↑ "Georgetown Faculty Page". https://gufaculty360.georgetown.edu/s/contact/0031Q00002CafP5QAJ/william-easttom.
- ↑ Easttom, Chuck (2022). "Basic Information Theory". Modern Cryptography. Springer. pp. 51–73. doi:10.1007/978-3-031-12304-7_3. ISBN 9783031123047. https://link.springer.com/chapter/10.1007/978-3-031-12304-7_3.
Original source: https://en.wikipedia.org/wiki/Chuck Easttom.
Read more |