Advisory regarding Southern California wildfires

Advisory regarding Southern California wildfires

On behalf of everyone at Thomas Edison State University, we hope that students affected by the wildfires in Southern California remain safe. The University is offering accommodations to students affected by the wildfires:

  • Students who are directly impacted by the fires and who are currently registered in courses for the November 2024, December 2024 and January 2025 terms have the option of receiving a free eight-week course extension without mentor approval; or, a 100% tuition credit for their course(s) to a future term. Affected students should submit a Request for Course Extension Form or a Request for Course Withdrawal Form indicating “Southern California wildfires” as the reason for the request. Please note that TECEP exams in these terms cannot be extended, nor credited for tuition after the exam has been taken.
  • Impacted students who are currently on a course extension for the September 2024 and October 2024 terms can request a second eight-week extension on their current term at no additional cost.

Request an Accommodation: Students affected by the wildfire and evacuations who need an accommodation should contact the Office of the Registrar by email at registration@tesu.edu or by phone at 609-777-5680. Accommodation requests should be submitted by January 24th. Requests after that date can be accommodated if the student provides documentation of the reason for the late request.

Thomas Edison Cyber Defense Center

The Cyber Defense Center (CDC) serves as the focal point of our cybersecurity efforts and provides a central hub for students and faculty, and public to learn about our programs, cybersecurity initiatives, news, and best practices. CDC tries to promote collaboration, increase awareness, and reach out to the external community through various communication channels.

Almost 15 million records were exposed worldwide during the third quarter of 2022. In the same year, 600 data breaches were reported in the U.S. alone with an average cost of $9.44M per breach. With the ever-increasing integration of smart devices along with the mass exodus of almost all services to online platforms, we only expect to see the numbers grow. That is why cybersecurity education and awareness become more important than ever before. For years, Thomas Edison State University has played a significant role on this front by offering a myriad of undergraduate and graduate cybersecurity degrees and certificates. For more information, please visit our Cybersecurity Academic Programs.

  • Cyber Programs

    Our Cyber Defense Program of Studies (CDPOS) provide theoretical and practical skills required for a wide range of cybersecurity positions through rigorous curricula. Learning objectives and programs’ details can be found here:

  • Meet The Team

    Mentors


    Some highlights of our mentors exceptional professional track record:

    Dr. Dale Cline

    • Founder and CEO of CYBERShark Inc, Marlton, NJ
    • Former President of the Americas, McAfee / Network Associates, NJ
    • Former President and CEO of NetForensics Inc, Edison, NJ
    • Former President of Global Knowledge, Morristown, NJ

    Dr. Susan Cole

    • CISSP, ISC2 Certification Number 309858,
    • CCSK (Certificate of Cloud Security Knowledge), 2012
    • C|EH (Certified Ethical Hacker)
    • C|NDA (Certified Network Defense Architect)
    • E|CIH (Certified Incident Handler), EC Council
    • Managed and mentored 9 full-time and two part-time ISSOs within the DC region over a period of 5 years

    Dr. Michael A. Silas

    • JP Morgan Chase Cyber Security Data Engineer and Data Scientist
    • US Government Data Scientist

    Dan Reddy

    • Former chair of Global Outreach and Standards Harmonization at Open Group’s Trusted Technology Provider Standard development (ISO/IEC-20243)
    • Institute for Defense Analysis. Consultant for Supply Chain Assurance
    • EMC Corp. Product Manager, Product Security Office, Director of Information Security and Assurance
    • Certified Secure Software Lifecycle Professional
    • Member of Association for Computing Machinery

    Dr. Larry Feldman

    • Certified Ethical Hacker
    • Microsoft Certified Systems Engineer (McSE)
    • Certified Information Systems Security Professional (CISSP)
    • Certified SCADA Security Architect (CSSA)
    • 15+ years of experience in Industrial Control System reliability and security research
    • 10+ years of experience support planning, designing, and implementing organizations’ cybersecurity program strategy and risk management
    • Involved in developing multi-domain risk management approaches to achieve trustworthiness of Internet of Things (IoT), Industrial IoT (IIoT), and Cyber-Physical Systems (CPS)
    • Involved in developing cybersecurity guidance/standards for public and private sectors (NIST, OASIS)

    Jelena Vucetic

    • President and Founder of Alpha Mission, Inc.
    • Former Principal Consultant of Syntek Systems Corp.
    • Former President and Founder of Dynamic Telecommunications, Inc.
    • Head of Software Engineering Section, Wireless Telecommunications Operations at Watkins-Johnson Corp
    • AWS Practitioner and Educator Certificate
    • CompTIA Cloud+ Certificate

    Selected Talks and Presentation by TESU mentors


    • “Automation and Artificial Intelligence (AI): The effect on future business” at Chattanooga PMI Lunch and Learn, August 2022
    • “Dark Web” at PMI Baltimore Chapter 2020 Virtual Professional Development Event, Sept 2020
    • Tech Careers at River Ridge Middle School’s Great American Teach In, Nov 2018
    • “Dark Web” at CENTCOM’s Cybersecurity Awareness Month Event, Oct 2018
    • “Security the Internet of Things (IoT)” at PMI PDE – Baltimore Conference, April 2017; cybergamut Technical Tuesday, Nov 2016; PMI Luncheon, Annapolis Junction Chapter, Dec 2016
    • “A History of Risk” at PMI PDE – Baltimore Conference, April 2016
    • “The Truth About Securing Your System” at cybergamut Technical Tuesday, June 2015; PMI PDE – Baltimore Conference, Apr 2015
    • “Cloud Security: Considerations and Concerns” at PMI Luncheon, Annapolis Junction Chapter, March 2014; PMI PDE – Baltimore Conference, March 2014; cybergamut Technical Tuesday, Feb 2013
    • “Cloud Security: Are We There Yet” at CAISSWG Meeting, Oct 2012; Grace Hopper Conference, Oct 2012; Exceptional Software’s TechTalk, Aug 2012
    • Cybersecurity in the Northeast Region Symposium (TESU)
    • UCONN Center for Hardware Assurance, Security and Engineering (CHASE) Conference
    • Trustworthy Suppliers Framework Forum (@ NIST, (Panel Member)
    • RSA Conference (NIST Cybersecurity Framework and Suppliers

    Selected Publications by TESU Mentors


    • K. Musa, J. Vucetic: " Secure Cloud Computing Services using Hyper Cloud Framework", Excelsior College, The Journal of Business and Technology, Vol. 4 No.1, August 2019
    • Posted to https://cybersentinel.tech/blog/ 2018 - 2019
      • The Importance of Continuous Monitoring; Women in Cybersecurity; CyberSurveillance; Is the Dark Web All Bad?; The Importance of PS-3 (Personnel Screening); Importance of Continuous Monitoring; Cybersecurity Stress; Mortgage Mayhem; Ethics and Technology; Technology and Privacy (co-written with Dr. Dana Hudnall)
    • Dan Reddy, Institute for Defense Analyses, Securely Using Software Assurance (SwA) Tools in the Software Development Environment (co-author with David A. Wheeler), 2018
    • Dan Reddy, Technovation, Special Issue on Supply Chain “Criticality Analysis and the Supply Chain: Leveraging Representational Assurance”, 2014
    • Dan ReddyCrossTalk, The Journal of Defense Software Engineering, “Collaborating Across the Supply Chain to Address Taint and Counterfeit”, 2014
    • NIST SP 800-221, Enterprise Impact of Information and Communications Technology Risk: Governing and Managing ICT Risk Programs Within an Enterprise Risk Portfolio, July 2022
    • NIST SP 800-221A, Information and Communications Technology (ICT) Risk Outcomes: Integrating ICT Risk Management Programs with the Enterprise 6 Risk Portfolio, July 2022
    • NISTIR 8286D, Using Business Impact Analysis to Inform Risk Prioritization and Response, June 2022
    • NISTIR 8286A, Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management (ERM), November 2021
    • NISTIR 8170, Approaches for Federal Agencies to Use the Cybersecurity Framework, March 2020
    • NIST Technical Note 2051, Cybersecurity Framework Smart Grid Profile, July 2019
    • NIST SP 500-325, Fog Computing Conceptual Model, March 2018
    • NISTIR 8060, Guidelines for the Creation of Interoperable Software Identification (SWID) Tags, April 2016.
    • NISTIR 7756, CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Model, January 2012
    • NISTIR 7799, Continuous Monitoring Reference Model Workflow, Subsystem, and Interface Specifications, January 201
  • Contact Us

    To learn more, please reach out to:

    Dr. Saeed Esmaili Sardari
    Associate Dean
    e: ssardari@tesu.edu
    p: (609) 874-0117

    Questions?

    General queries and questions can be sent to cdc@tesu.edu.

  • News and Resouces