Lisa Bock

Lisa Bock

Williamsport, Pennsylvania, United States
33K followers 500+ connections

About

I am a security ambassador with a broad range of IT skills and knowledge and a passion…

Courses by Lisa

See all courses

Articles by Lisa

  • Encryption Can't Prevent Ransomware

    Someone recently posted, “Encryption can protect against the loss of confidentiality. Can encryption protect against a…

    1 Comment
  • Ransomware 911

    The 2017 global WannaCry ransomware attack infected and held hostage more than 300,000 computers worldwide. Lisa Bock…

    2 Comments
  • Hiding in Plain Sight

    Recently several viewers have commented that they saw my course Ethical Hacking: Viruses and Worms, which they have…

  • The Internet of Things operate on a cowboy code—there are no rules.

    In the wild-wild west, there were no laws but there was something called a “cowboy code”. The cowboy code had a certain…

    19 Comments
  • Tech Savvy and Tech Safe

    Cybercrime is on the rise. Here’s how to protect yourself Cybercrime has been an issue for decades.

    3 Comments
  • Securing the Internet of Things

    The Internet of Things (IoT) is a collection of devices attached to the Internet that collect and exchange data using…

    8 Comments
  • A Short Primer on Security Plans, Policies, and Data Classification

    In order to take steps to reduce the risk to information assets, an organization starts with a security plan. A team…

  • Exposing your Website’s Soft Chewy Inside

    An organization’s web interface can be a potential target. Many web developers are not aware of the many…

  • Scanning versus Penetration Testing

    Scanning a network to check for vulnerabilities is an important exercise, but should not be confused with Penetration…

    1 Comment
  • Ethical Hacking – A Primer

    Ethical hacking is essential, as it enables an organization to identify vulnerabilities, and fine-tune their security…

    2 Comments

Activity

Experience

  • LinkedIn Graphic

    LinkedIn

    Carpinteria, California, United States

  • -

    Carpinteria, California, United States

  • -

    Carpinteria, California, United States

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Lynda.com

  • -

    Carpinteria, California, United States

  • -

    Carpinteria, California, United States

  • -

  • -

    Williamsport, Pennsylvania Area

Education

Licenses & Certifications

Volunteer Experience

  • Member InfraGard

    InfraGard Central Pennsylvania PA Harrisburg

    - Present 14 years 5 months

    Education

    The mission of the Central PA InfraGard Members Alliance is to improve the security and integrity of the critical infrastructures of the region by providing a forum for the confidential sharing of information, vulnerability assessment and reduction, and the education and training of its membership.

  • EC-Council Graphic

    Global Advisory Board for Ethical Hacking

    EC-Council

    - Present 2 years 7 months

    Science and Technology

    The Advisory Board for C|EH provides input to advance new and current initiatives in promoting Ethical Hacking. https://www.eccouncil.org/global-advisory-board-for-ethical-hacking/

Publications

  • Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark, 2nd Edition

    ‎Packt Publishing

    Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark's functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you'll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit…

    Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark's functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you'll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit your needs.

    This updated second edition of Learn Wireshark starts by outlining the benefits of traffic analysis. You'll discover the process of installing Wireshark and become more familiar with the interface. Next, you'll focus on the Internet Suite and then explore deep packet analysis of common protocols such as DNS, DHCP, HTTP, and ARP. The book also guides you through working with the expert system to detect network latency issues, create I/O and stream graphs, subset traffic, and save and export captures. Finally, you'll understand how to share captures using CloudShark, a browser-based solution for analyzing packet captures.

    By the end of this Wireshark book, you'll have the skills and hands-on experience you need to conduct deep packet analysis of common protocols and network troubleshooting as well as identify security issues.

    See publication
  • The Official CompTIA PenTest+ Self-Paced Study Guide (PT0-002)

    This is the only official CompTIA study guide for the CompTIA PenTest+ (PT0-002) certification exam. Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

    See publication
  • Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data

    Packt Publishing

    In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.

    The book begins by helping you to understand…

    In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.

    The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).

    By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.

    See publication
  • Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication

    ‎ Packt Publishing

    Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.

    Starting with an…

    Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.

    Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.

    By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies.

    See publication
  • Learn Wireshark

    Packt Publishing

    Confidently navigate the Wireshark interface and solve real-world networking problems

    See publication

Courses

  • Wireshark Functionality and Fundamentals

    Wireshark University

  • Wireshark Network Forensics and Security

    Wireshark University

  • Wireshark TCP/IP Network Analysis

    Wireshark University

  • Wireshark Troubleshooting Network Performance

    Wireshark University

View Lisa’s full profile

  • See who you know in common
  • Get introduced
  • Contact Lisa directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Lisa Bock in United States

Add new skills with these courses