Our Team

ptitle-particle1
ptitle-particle2
ptitle-particle3
ptitle-particle4
Our skills

We're Awards Winning University

  • Deep commitment towards capacity building
  • Dedicated to expanding knowledge on next-gen technologies
  • Curriculum aligned with industry requirements
  • Committed to bridging the gap between academia and industry
  • Strong emphasis on practical training and exposure
  • One-to-one sessions and 100% job placement assistance
89%
Business
Consulting
69%
Health
Coaching
96%
Marketing
Strategy
1 +
Popular Coach
1 +
Our Advisors
1 +
Video Tutorials
1 +
Student Reviews
Our professionals

Meet Our Professinoal Team Members

Jojo

Jojo Aniag

Principal Investigator [C|EH, CCISO, CISA]
roger-nebel-instructors

Roger Nebel

Adjunct Professor
[CISA and CISSP]
Mukesh Kumar Rao

Mukesh Kumar Rao

Consultant, Trainer,
and Speaker
Tom Huskerson

Tom Huskerson

Professor/Chief Editor/Cyber Security Consultant
[CISM, Cyber Security Studies]
Ranjan Raja

Ranjan Raja

Cyber Security Analyst/Trainer
[Cyber Security Certified, C|EH]
deep-vyas-instructors

Deep Vyas

Cyber Crime Expert/Trainer
[C|EH, CCNA, CCNP, CCIE]
Prasannasai

Prasannasai Kapa

Security Analyst

Jojo Aniag

He’s a proficient problem-solver who guided organizations in correctly applying technology to the business environment that adds value in a timely manner. Jojo is a solid communicator and presenter that delivered information security training and led the team that planned and executed risk-based audits. In 20+ years of experience, he managed stakeholder involvement and communication with executive client management in multiple compliance projects and policy implementation controls such as HIPAA, PIPEDA, COPPA, FERPA, CJIS, and APP. He’s a driven collaborator and conflict resolution professional who has established relationships with businesses and customers in providing strategic leadership for corporate IT security. Jojo had managed the development of the business process and security audit review in the following domains of the enterprise: Governance and Risk Management, Asset Management, Human Resources Security, Physical and Environmental Security, Communications and Operations Security, Access Control Management; and Information Systems Acquisition, Development, and Maintenance.
  • Certified Chief Information Security Officer (CCISO), cert. #: ECC7524689130
  • Certified Ethical Hacker (CEH), cert. #: ECC1274563809
  • Master of Science in Computer Science, 1998, De La Salle Academy
  • Certified Information Security Auditor (CISA): EC – Council
  • Bachelor of Science in Computer Science, 1992, PLM

Roger Nebel

Roger has significant IT operations experience combined with education and professional certifications, software development, systems integration, IT audit and assessment, and investigation, and litigation subject matter experience. Especially adept at writing, briefing, and explaining technology subjects in layman’s terms. He’s a consulting leader, responsible for the successful launch and substantial growth of software, security, and internet-related professional, and managed security services offerings at five companies. Frequent public speaker on the challenges of managing software, information security, and compliance in the Internet-facing application era, he had collaborated on the development or assessment of hundreds of IT systems and projects. He led teams of professionals providing incident response, IT due diligence, IT controls oversight for compliance remediation efforts, system, and software security breach investigations, monitoring settlement and non-prosecution agreement compliance, software intellectual property litigation expert witness support, system architecture, and security operations consulting, and enterprise security assessments also wrote hundreds of reports.
  • MS, Management 1993, National-Louis Academy
  • BS, Engineering 1991, California Coast Academy
  • Certified Information System Auditor (CISA) since 1997
  • Certified Information Security Professional (CISSP) since 1997
  • Visa / PCI DSS Qualified Data and Application Security Professional 2001 – 2009

Mukesh Kumar Rao

He is a Mukesh, a gold medalist B.tech degree holder from a renowned university. He had trained more than 100 candidates in Cyber Security and provided Cyber Security awareness to more than 5000 individuals. He had also found several vulnerabilities in more than 50 indian govt websites and achieved appreciation from the Indian Govt for being a part of Responsible Vulnerability disclosure program under NCIIPC, India. He is currently associated with organizations like Securium Solutions Private Ltd, Cyber Security society, kanpur, Cybergurukul as a Principal Cyber Security Consultant, trainer and speaker.

Tom Huskerson

Tom is a Cyber Security educator/trainer, developing Cyber Security awareness programs and policy-focused CUI for enhancing the skills of professionals. He studied at NIST, COBIT, and federal Cyber Security models. He conducts presentations for students on cyber and information security, privacy, and corporate information collection techniques His skills are described as a highly effective writer, public speaker & lecturer, keen understanding of Cyber Security, social media, creates training & testing materials.

Ranjan Raja

Ranjan conducts network penetration tests & implemented vulnerability assessments and evaluates operational effects of security system attacks. He has rich experience in analyzing and resolving vulnerabilities in relation to automated networks. He prepared and documented test plans for security evaluations. Raja designs and updates reports about the security of targeted systems. He developed training programs and trained ethical hackers also participated in courses for password cracking and attack technologies. He had supported and administered security of intranet systems and networks. His technical qualifications are in Cyber Security, ethical hacking, penetration testing, vulnerability assessment, Search Engine Optimization “SEO”, Website security LINUX Operating system & IoT Devices, RED HAT Operating system, Kali Linux Operating System.

Deep Vyas

Deep is calm and composed under pressure and is able to work to tight deadlines, he has an ability to work within a busy and demanding team ecosystem, moreover can work with a minimum of supervision and on his own initiative. His presentation skills are rich to make others understand well. His technical skills are such as knowledge of routing and switching, kali Linux, windows hacking, password cracking techniques, data protection, and network security.

Prasannasai Kapa

Prasannasai Kapa is a graduate in Electronics and Communication from Vellore Institute of Technology, INDIA. He has more than two years of experience working in several domains such as web application, IOT security assessment and pentesting. He’s proficient in Linux and Microsoft OS configuration and utilities. He also has experience in conducting ethical hacking workshops and has trained several students by sharing his knowledge. After working as a security analyst at Net square security he decided to pursue his Masters in Computer Science with concentration in Cyber Security at Auburn Academy, USA. He had developed his technical skill over the years in several programming languages and still open to learn more as the trend progresses.

We understand the importance of approaching each work integrally and believe in the power of simple.

Melbourne, Australia
(Sat - Thursday)
(10am - 05 pm)
Cart

No products in the cart.