Chuck Easttom
William "Chuck" Easttom II (born October 5, 1968) is an American computer scientist specializing in cyber security.
Chuck Easttom | |
---|---|
Born | William Easttom II October 5, 1968 |
Citizenship | United States |
Alma mater | Capitol Technology University University of Portsmouth University of Texas El Paso Southeastern Oklahoma State University Northcentral University |
Awards | |
Scientific career | |
Fields | Cybersecurity Engineering Cryptography Quantum Computing Nanotechnology |
Institutions | Georgetown University |
Thesis | A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing |
Education
Chuck Easttom holds a B.A. from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a master's degree in Applied Computer Science from Northcentral University[1] and a Masters in Systems Engineering from the University of Texas at El Paso, as well as a D.Sc. Doctor of Science in cyber security from Capitol Technology University[2][3][4] dissertation topic "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing", a Ph.D.Doctor of Philosophy in Technology focused on Nanotechnology[5] dissertation topic "The Effects of Complexity on Carbon Nanotube Failures", and a Ph.D.Doctor of Philosophy in Computer Science from University of Portsmouth[6] dissertation topic "A Systematic Framework for Network Forensics Using Graph Theory".
Professional work
In addition to computer security, Easttom has done work in software engineering.,[7][8] applied mathematics, and other areas. He has authored 31 books[9] on computer security, programming languages, Linux, cyber forensics, penetration testing, and cryptography. His books are used as textbooks for both undergraduate and graduate programs at over 60 universities.[10][11][12][13][14][15][16][17][18][19][20] He is an inventor with 23 patented computer science inventions.[21] He is a frequent speaker at major cybersecurity conferences.[22][23][24][25]
Easttom was part of the team that created the original CompTIA Security+ [26] and CompTIA Linux+ exams. He created the OSFCE (OSForensics Certified Examiner) course and test,[27] the EC Council Certified Encryption Specialist course and certification test,[28] and EC Council CAST Advanced Encryption course [29] as well as working on other EC-Council certifications [30]
Easttom has been involved in numerous IEEE standards. He is currently the Chair of IEEE P3123 - Artificial Intelligence and Machine Learning (AI/ML) Terminology and Data Formats Working Group,[31] a member of IEEE 2731 BCI unified terminology working group,[32] a former member (2017 to 2019) of IEEE Software & Systems Engineering Standards Committee. Working on the DevOps 2675,[33] a member of IEEE P2995 - Trial-Use Standard for a Quantum Algorithm Design and Development Standards Group,[34] and Vice Chair IEEE P23026 - Systems and Software Engineering -- Engineering and Management of Websites for Systems, Software, and Services Information[35]
Chuck Easttom has been interviewed regarding cyber security topics by CNN Money[36] and CBS Smart Planet,[37] and other media outlets,[38][39][40][41][42][43][44] and He has been named a Distinguished Speaker of the ACM[45] and a Distinguished Visitor of the IEEE.[46] He is also a Senior member of the IEEE [47] and Senior member of the ACM.[48]
Easttom is Editor in Chief for the American Journal of Science and Engineering.[49] He was also the director of the Quantum Computing and Cryptography Lab at Capitol Technology University,[50] he is currently an adjunct lecturer for Georgetown University [51] and an Adjunct professor for the University of Dallas.[52] He is the co-chair for the 2020 ACM Quantum Computing and Engineering conference.[53]
Books
Easttom has authored 31 computer science books. These include:
- Beginning JavaScript, 1st Edition.WordWare Publishing (2001)
- JBuilder 7.0 EJB Programming.WordWare Publishing (2002)
- Programming Fundamentals in C++.Charles River Learning. 1st Edition, Charles River Media (2003)
- Essential Linux Administration: A Comprehensive Guide for Beginners. Cengage Press (2011)
- System Forensics, Investigation, and Response, 2nd Edition, Jones & Bartlett (2013)
- System Forensics, Investigation, and Response (Information Systems Security & Assurance), 3rd Edition Jones and Bartlett (2017) ISBN 978-1284121841
- Certified Cyber Forensics Professional All in One Guide. McGraw-Hill (2014) ISBN 978-0071839761
- Computer Security Fundamentals (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC) (2016) ISBN 978-0789757463
- CompTIA Security+ Study Guide: Exam SY0-501. John Wiley & Sons (2017)
- Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (1st Edition). Pearson IT Cybersecurity Curriculum (2018) ISBN 978-0789759375
- CompTIA Security+ Practice Tests: Exam SY0-501. Sybex (2018)
- Network Defense and Countermeasures: Principles and Practices, 3rd Edition Pearson IT Cybersecurity Curriculum (ITCC)) (2018)
- Networking Fundamentals, 3rd Edition. Goodheart-Wilcox Publishing) (2018)
References
- "Northcentral University Alumni".
- "Secure World Speaker Bio".
- "Keynote Speakers Bio".
- "Easttom: in cyber war, malware is "the weapon of choice"".
- "Faculty Bio".
- https://www.amazon.com/Chuck-Easttom/e/B001IYZ6I8%3Fref=dbs_a_mng_rwt_scns_share.
{{cite web}}
: Missing or empty|title=
(help) - "EC Council CASE Java".
- "Computer Programming Course Syllabus" (PDF).
- "Speaker Bio".
- "CS 511 digital forensics" (PDF).
- "CCT 121 Computer Crime Investigation".
- "CIS 4345, CRN 80042, Network and Systems Security" (PDF).
- "CIS 4385 Cybercrime Detection and Digital Forensics".
- "TCOM/CFRS 661 Digital Media Forensics" (PDF).
- "CSCE 201 Introduction to Computer Security".
- "ACST 3530 - Linux Operating Systems and Networking".
- "COMT 36330 LAN Security Fundamentals".
- "CSCI: Principles and Practices of Cybersecurity".
- "ISSC630: Advanced Cybercrime Analysis" (PDF).
- "CNT 4104 Software Project in Computer Networks".
- "United States Patent Office".
- "Hacker Halted". 2017-01-18.
- "Secure World".
- "ISC2 Security Congress".
- "DEFCON".
- "CompTIA Security+ SME List". 2016-02-09.
- "OSForensics Training".
- "ECES".
- "Author Bio".
- "EC Council Certified Application Security Engineer". Retrieved 20 November 2018.
- "IEEE P3123".
- "IEEE 2731".
- "Pearson Bio".
- "IEEE P2995".
- "IEEE P23026".
- "Unhackable Code".
- "NSA proof products: protective or a profit motive?".
- "What the JPMorgan Chase Breach Teaches Us".
- "Hackers infiltrate Web site".
- "Interview With Chuck Easttom, Computer Scientist & Consultant".
- "Steps Executives Can Take to Fight Fraud".
- "Generating Cryptographic Keys: Will Your Random Number Generators (PRNGs) Do The Job?".
- "Speaker Bio" (PDF).
- "Forensic Focus".
- "ACM Distinguished Speaker".
- "Chuck Easttom | IEEE Computer Society". Retrieved 2020-11-09.
- "IEEE Senior Member". 2019-05-06.
- "ACM Senior Member".
- "American Journal of Science and Engineering".
- "Quantum Computing and Cryptography Research Lab".
- "Georgetown Faculty Page".
- "University of Dallas Faculty Page".
- "2020 ACM Quantum Computing and Engineering Conference".