Chuck Easttom
This article, Chuck Easttom, has recently been created via the Articles for creation process. Please check to see if the reviewer has accidentally left this template after accepting the draft and take appropriate action as necessary.
Reviewer tools: Inform author |
This article, Chuck Easttom, has recently been created via the Articles for creation process. Please check to see if the reviewer has accidentally left this template after accepting the draft and take appropriate action as necessary.
Reviewer tools: Inform author |
This article, Chuck Easttom, has recently been created via the Articles for creation process. Please check to see if the reviewer has accidentally left this template after accepting the draft and take appropriate action as necessary.
Reviewer tools: Inform author |
- Comment: OK I have reviewed and cleaned up. For starters, I removed the certification section (I don't think industry certifications make one notable). Then I looked for whether or not the subject is notable. I found he was a Distinguished speaker of the ACM. According to Wikipedia's ACM article there are only 125 current distinguished speakers. I would think being one makes one notable. https://en.wikipedia.org/wiki/Association_for_Computing_Machinery#Distinguished_Speakers. I have found numerous references to this subject. In fact 8 different wikipedia articles on various topics, reference him. I disagree this is promotional though. I did not see any puffery. NO comments like "leading expert", "world renowned", "best", etc. It seems just a neutral listing of the subjects accomplishments. everything seems verified by third party trusted sources. There is no puffery language in this article (and was not in the first place). All the sources are from reliable third parties (about 40 such citations), none from the subject of the article. Now the question is this person notable enough for wikipedia? In my opinion being a Distinguished speaker of the ACM seems sufficient. Others may disagree. If that is not sufficient, then the 8 citations in Wikipedia itself should be sufficient. But there are also documented interviews from CNN and CBS, 15 patents, 26 books (not self published, but real publishers), and numerous external citations. From what I can find on Google, this guy speaks at pretty much every major cyber security conference there is. Is this not at least minor notability? I have made quite a few changes, but that is all the time I can spend on this. It is up to the rest of you to decide)
- Comment: Citation overkill. Textbook citations and research paper citations should be combined. AngusWOOF (bark • sniff) 02:17, 10 December 2018 (UTC)
- Comment: This appears to be a promotional autobiography. Wikipedia is not a resume hosting service. Please review WP:COI. K.e.coffman (talk) 03:12, 22 October 2018 (UTC)
Chuck Easttom is a computer scientist and educator, a specialist in cyber security.
Education
Chuck Easttom holds a B.A. from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a masters degree in Applied Computer Science from Northcentral University.[1],and a Masters in Systems Engineering from the University of Texas at El Paso, as well as a Doctor of Science in cyber security from Capitol Technology University[2][3][4].
Professional work
In addition to computer security , Easttom has done work in software engineering.[5],[6], applied mathematics, and other areas. . He has authored 26 books[7] on computer security, programming languages, Linux, cyber forensics, penetration testing, and cryptography. His books are used as textbooks for both undergraduate and graduate programs at over 60 universities[8][9][10][11][12][13][14][15][16][17][18]
Easttom was part of the team that created the original CompTIA Security+ [19]and CompTIA Linux+ exams. He created the OSFCE (OSForensics Certified Examiner) course and test [20], the EC Council Certified Encryption Specialist course and certification test [21], and EC Council CAST Advanced Encryption course [22] as well as working on other EC-Council certifications [23]
Easttom has been interviewed regarding cyber security topics by CNN Money[24] and CBS Smart Planet [25], and other media outlets [26][27][28][29][30][31][32], and He has been named a Distinguished Speaker of the ACM [33]
List of Books
Chuck Easttom is the author of 26 computer science books. These include:
- Essential Linux Administration: A Comprehensive Guide for Beginners. Cengage Press (2011)
- System Forensics, Investigation, and Response. Jones & Bartlett (2013)
- Certified Cyber Forensics Professional All in One Guide. McGraw-Hill (2014)
- Computer Security Fundamentals (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC)) (2016)
- System Forensics, Investigation, and Response (Information Systems Security & Assurance) 3rd Edition. Jones and Bartlett (2017)
- CompTIA Security+ Study Guide: Exam SY0-501. John Wiley & Sons (2017)
- Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (1st Edition). Pearson IT Cybersecurity Curriculum (2018)
- CompTIA Security+ Practice Tests: Exam SY0-501. Sybex (2018)
- Network Defense and Countermeasures: Principles and Practices (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC)) (2018)
- Networking Fundamentals, 3rd Edition. Goodheart-Wilcox Publishing) (2018)
- JBuilder 7.0 EJB Programming.WordWare Publishing (2002)
- Programming Fundamentals in C++.Charles River Learning. 1st Edition, Charles River Media (2003)
- Beginning JavaScript, 1st Edition.WordWare Publishing (2001)
References
- ^ "Northcentral University Alumni".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Secure World Speaker Bio".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Keynote Speakers Bio".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Easttom: in cyber war, malware is "the weapon of choice"".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "EC Council CASE Java".
- ^ "Computer Programming Course Syllabus" (PDF).
- ^ "Speaker Bio".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CS 511 digital forensics" (PDF).
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CCT 121 Computer Crime Investigation".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CIS 4345, CRN 80042, Network and Systems Security" (PDF).
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CIS 4385 Cybercrime Detection and Digital Forensics".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "TCOM/CFRS 661 Digital Media Forensics" (PDF).
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CSCE 201 Introduction to Computer Security".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "ACST 3530 - Linux Operating Systems and Networking".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "COMT 36330 LAN Security Fundamentals".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CSCI: Principles and Practices of Cybersecurity".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "ISSC630: Advanced Cybercrime Analysis" (PDF).
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CNT 4104 Software Project in Computer Networks".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "CompTIA Security+ SME List".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "OSForensics Training".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "ECES".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Author Bio".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "EC Council Certified Application Security Engineer". Retrieved 20 November 2018.
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Unhackable Code".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "NSA proof products: protective or a profit motive?".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "What the JPMorgan Chase Breach Teaches Us".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Hackers infiltrate Web site".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Interview With Chuck Easttom, Computer Scientist & Consultant".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Steps Executives Can Take to Fight Fraud".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Generating Cryptographic Keys: Will Your Random Number Generators (PRNGs) Do The Job?".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Speaker Bio" (PDF).
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "Forensic Focus".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help) - ^ "ACM Distinguished Speaker".
{{cite web}}
: Cite has empty unknown parameter:|dead-url=
(help)