About
I am a security ambassador with a broad range of IT skills and knowledge and a passion…
Courses by Lisa
Articles by Lisa
Activity
-
Who takes their security and privacy more seriously, iPhone or Android users? Host Tjitske de Vries dives into this and lots more with privacy…
Who takes their security and privacy more seriously, iPhone or Android users? Host Tjitske de Vries dives into this and lots more with privacy…
Shared by Lisa Bock
-
An interesting question in this podcast: Is AI Unhealthy? Host David Ruiz is joined by Malwarebytes Labs Editor-in-Chief Anna Brading and Social…
An interesting question in this podcast: Is AI Unhealthy? Host David Ruiz is joined by Malwarebytes Labs Editor-in-Chief Anna Brading and Social…
Shared by Lisa Bock
Experience
Education
Licenses & Certifications
Volunteer Experience
-
Member InfraGard
InfraGard Central Pennsylvania PA Harrisburg
- Present 14 years 5 months
Education
The mission of the Central PA InfraGard Members Alliance is to improve the security and integrity of the critical infrastructures of the region by providing a forum for the confidential sharing of information, vulnerability assessment and reduction, and the education and training of its membership.
-
Global Advisory Board for Ethical Hacking
EC-Council
- Present 2 years 7 months
Science and Technology
The Advisory Board for C|EH provides input to advance new and current initiatives in promoting Ethical Hacking. https://www.eccouncil.org/global-advisory-board-for-ethical-hacking/
Publications
-
Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark, 2nd Edition
Packt Publishing
Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark's functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you'll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit…
Wireshark is a popular and powerful packet analysis tool that helps network administrators investigate latency issues and potential attacks. Over the years, there have been many enhancements to Wireshark's functionality. This book will guide you through essential features so you can capture, display, and filter data with ease. In addition to this, you'll gain valuable tips on lesser-known configuration options, which will allow you to complete your analysis in an environment customized to suit your needs.
This updated second edition of Learn Wireshark starts by outlining the benefits of traffic analysis. You'll discover the process of installing Wireshark and become more familiar with the interface. Next, you'll focus on the Internet Suite and then explore deep packet analysis of common protocols such as DNS, DHCP, HTTP, and ARP. The book also guides you through working with the expert system to detect network latency issues, create I/O and stream graphs, subset traffic, and save and export captures. Finally, you'll understand how to share captures using CloudShark, a browser-based solution for analyzing packet captures.
By the end of this Wireshark book, you'll have the skills and hands-on experience you need to conduct deep packet analysis of common protocols and network troubleshooting as well as identify security issues. -
The Official CompTIA PenTest+ Self-Paced Study Guide (PT0-002)
This is the only official CompTIA study guide for the CompTIA PenTest+ (PT0-002) certification exam. Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
-
Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data
Packt Publishing
In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.
The book begins by helping you to understand…In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.
The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).
By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI. -
Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
Packt Publishing
Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.
Starting with an…Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition.
Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies.
By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. -
Learn Wireshark
Packt Publishing
Confidently navigate the Wireshark interface and solve real-world networking problems
Courses
-
Wireshark Functionality and Fundamentals
Wireshark University
-
Wireshark Network Forensics and Security
Wireshark University
-
Wireshark TCP/IP Network Analysis
Wireshark University
-
Wireshark Troubleshooting Network Performance
Wireshark University
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentOthers named Lisa Bock in United States
-
Lisa Bock
Senior Vice President - National Accounts
-
Lisa Bock
Non-Production Purchasing Manager at Lear Corporation
-
Lisa Bock
Senior Story Producer
-
Lisa Bock
Health Care Facility Inspector at Commonwealth of Massachusetts
52 others named Lisa Bock in United States are on LinkedIn
See others named Lisa Bock