Harry Cooper

Adjunct Professor at University of Charleston
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Claymont, Delaware, United States, US
Languages
  • English -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Stephanie Shea

Harry has been my sounding board on anything technology-related for the past ten years. I worked work him directly when he was our IT person at Ampro, and then I've done a bunch of websites and projects with him in the many years since then. He's a do-er, he's pragmatic, and he doesn't immediately just push for the easiest, (and usually most expensive) solution, Harry is good at weighing out the options, and suggesting good "middle ground" solutions for IT/Technology-related challenges. He's good-natured and generally very fun to work with. Great sense of humor. Great skills in client meetings. Great teacher.

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Higher Education
    • 200 - 300 Employee
    • Adjunct Professor
      • Jan 2022 - Present

      • Teach and develop courses at the Undergraduate level. • Courses taught/teaching include: Cybersecurity Strategy Security and Data Privacy Advanced Security Trends • Teach and develop courses at the Undergraduate level. • Courses taught/teaching include: Cybersecurity Strategy Security and Data Privacy Advanced Security Trends

    • Higher Education
    • 700 & Above Employee
    • Adjunct Professor
      • Jan 2022 - Present

      • Teach and develop courses at the Undergraduate and Graduate levels. • Courses taught/teaching include: Cybersecurity, Technology, and Society Cybersecurity Principles Advanced Cybersecurity Techniques and Operations • Teach and develop courses at the Undergraduate and Graduate levels. • Courses taught/teaching include: Cybersecurity, Technology, and Society Cybersecurity Principles Advanced Cybersecurity Techniques and Operations

    • United States
    • Higher Education
    • 700 & Above Employee
    • Assistant Professor and Co-Director, APUS Center for Cyber Defense
      • Jul 2018 - Present

      • Teach and develop courses in both the Graduate and Undergraduate level. • Work on program and school initiatives • Courses taught/teaching include: Computer and Network Security Information Security Advanced Cybercrime Analysis Ethics in Information Technology Biometrics Information Assurance Computer Networks and Data Systems Cyberlaw and Privacy in a Digital Age Cybersecurity, Surveillance, Privacy and Ethics ICS and SCADA Security Architecture SCADA Risk Management SCADA Security Standards Threats to SCADA Networks Cybersecurity Studies Capstone Cybersecurity Capstone Portfolio IT Security: Risk Management Network Surveillance Show less

    • United States
    • Nanotechnology Research
    • 1 - 100 Employee
    • Adjunct Professor
      • Dec 2018 - Present

      • Teach and develop courses at the Undergraduate level. • Courses taught/teaching include: Fundamentals of Cybersecurity Cyber Threat Intelligence Counter Cyber Threat Intelligence • Teach and develop courses at the Undergraduate level. • Courses taught/teaching include: Fundamentals of Cybersecurity Cyber Threat Intelligence Counter Cyber Threat Intelligence

    • United States
    • Higher Education
    • 700 & Above Employee
    • Adjunct Professor
      • May 2018 - Present

      • Teach and develop courses in both the Graduate and Undergraduate level. • Courses taught/teaching include: Cyber Threat Intelligence Kali Linux Linux Shell Scripting Linux Server Administration Cyber Intelligence Intrusion Detection Law for Forensics Professionals Future of Cybersecurity Firewalls & Defense in Depth Mobile Device Forensics Pen Testing & Incident Response • Teach and develop courses in both the Graduate and Undergraduate level. • Courses taught/teaching include: Cyber Threat Intelligence Kali Linux Linux Shell Scripting Linux Server Administration Cyber Intelligence Intrusion Detection Law for Forensics Professionals Future of Cybersecurity Firewalls & Defense in Depth Mobile Device Forensics Pen Testing & Incident Response

    • United States
    • Higher Education
    • 700 & Above Employee
    • Adjunct Instructor
      • Nov 2015 - Jan 2022

      • Taught courses at the Graduate level. • Courses taught include: Incident Detection and Response Investigations – Digital Forensics Core Technologies Security Risk Analysis and Planning Cyberlaw and Ethics • Taught courses at the Graduate level. • Courses taught include: Incident Detection and Response Investigations – Digital Forensics Core Technologies Security Risk Analysis and Planning Cyberlaw and Ethics

    • United States
    • Higher Education
    • 700 & Above Employee
    • Adjunct Instructor
      • Mar 2015 - Sep 2018

      • Taught and re-developed courses at the Graduate level. • Courses taught include: Operating System and Computer Systems Security Web and Data Security SCADA Architecture SCADA Risk Management and Auditing Business Intelligence Action Research Fieldwork Field Experience/Internship • Taught and re-developed courses at the Graduate level. • Courses taught include: Operating System and Computer Systems Security Web and Data Security SCADA Architecture SCADA Risk Management and Auditing Business Intelligence Action Research Fieldwork Field Experience/Internship

    • United States
    • Higher Education
    • 1 - 100 Employee
    • Professor of Practice, Cybersecurity
      • 2013 - May 2018

      • Taught and re-developed courses in both the Graduate and Undergraduate level. • Courses taught and re-developed during this period include: Foundations of Computing for Cybersecurity Principles of Cybersecurity Cyber Counterintelligence Cybercrime Investigations and Forensics II Systems Vulnerability Assessments Information System Threats, Attacks and Defenses Network Forensics Cyber Intelligence Critical National Infrastructures and National Security Tactics, Techniques, and Procedures Principles of Cybercrime Investigations Computer Hardware and Peripherals Computer Network Investigations • Helped to develop the plan for, laid the ground work for, and continue to play a role in the building of the Open Source Validation and Testing Center (OSVAT) at Utica College. OSVAT which is still in the development stages is planned to be a joint effort between Utica College, the North East Forensic Center, and the National White Collar Crime Center (NWC3). OSVAT’s principal mission is to become a trusted source for supplying vetted and validated open source forensic tools for use in digital investigations. Show less

    • France
    • Information Technology & Services
    • 1 - 100 Employee
    • CEO
      • Mar 2010 - Dec 2016

      • Held key responsibility in this company for not only running the day to day aspects of the company but also handled the role of being one of its principals. • Successfully led the development of a free open source Forensic tool called All-In-USB. • Worked on multiple projects encompassing everything from simple websites to more complex projects such as a resource scheduling system for a light manufacturing company that runs their entire facility. • Personally handled almost all security related projects from simple website defacements to a case involving the online slandering of a nationally recognized football team. • Developed a new hardware keylogger chip for use by corporate and government groups. • Developing a series of mini computers that can be used for everything from network monitoring to penetration testing to battlefield forensics. Show less

    • Development Lead
      • Sep 2005 - Feb 2010

      • Managed the work order, software development cycle, and overall office workflow. • Worked with senior leadership and programming departments of CyberSports and partner companies in the development, marketing, and sales of products in the video market. • Acted as a programmer, including developing and writing specifications for all major projects and then assist in the coding and delivery of those projects. • Acted as the third and final tier tech support for the company. • Developed and rolled out a server farm that hosts CyberXtreme, CyberSport’s web based recruiting. Show less

    • United Kingdom
    • Retail
    • Manager of Information Systems
      • Jul 2003 - Sep 2005

Education

  • Capital Technology University
    Doctor of Science, Cybersecurity
    2015 - 2018
  • Utica College
    Master's Degree, Cybersecurity Intelligence and Forensics
    2011 - 2013
  • University of Pittsburgh
    Bachelor of Arts (B.A.), Political Science and Government
    1996 - 2000

Community

You need to have a working account to view this content. Click here to join now