Stuart Holland CISSP, IET, MCS, BSc

Stuart Holland CISSP, IET, MCS, BSc

Apprentice

Followers of Stuart Holland CISSP, IET, MCS, BSc55 followers
location of Stuart Holland CISSP, IET, MCS, BScWaikato, New Zealand

Connect with Stuart Holland CISSP, IET, MCS, BSc to Send Message

Connect

Connect with Stuart Holland CISSP, IET, MCS, BSc to Send Message

Connect
  • Timeline

  • About me

    Systems & Production Manager at Ocean Scientific International Ltd

  • Education

    • ISC2 (International Information System Security Certification Consortium)

      2021 - 2021
      DoS Attacks and Defense Course Cybersecurity Passed - 2 CPE's

      Denial of Service (DoS) attacks are increasing in regularity and sophistication. These attacks can have massive negative impacts to an organization. As this threat vector continues to grow, it is important to understand how they work, and the tools and processes needed to keep your organization safe. DoS attacks can result in loss of revenue, brand damage, and a loss of customer trust. Security practitioners need to be able to build effective defense solutions. This hands-on lab is designed to… Show more Denial of Service (DoS) attacks are increasing in regularity and sophistication. These attacks can have massive negative impacts to an organization. As this threat vector continues to grow, it is important to understand how they work, and the tools and processes needed to keep your organization safe. DoS attacks can result in loss of revenue, brand damage, and a loss of customer trust. Security practitioners need to be able to build effective defense solutions. This hands-on lab is designed to help you better understand how these attacks work, how they are deployed and the mechanisms you can implement to protect your organization.Modules: Launch and Detect a TCP SYN Flood Attack Mitigate a TCP SYN Flood Attack Application Layer DoS Attack Mitigating Slowloris Attacks DNS Amplification Attacks Show less

    • ISC2 (International Information System Security Certification Consortium)

      2021 - 2021
      CPE - Assessing Application Security Course Cybersecurity Passed - 4 CPE's

      Practical methods and processes in assessing and developing protocols to in apply in cybersecurity policies.

    • ISC2 (International Information System Security Certification Consortium)

      2021 - 2021
      CPE -Firewall Configuration with pfSense Cybersecurity Passed - 2 CPE's

      Practical training in the use of pfSense

    • ISC2 (International Information System Security Certification Consortium)

      2021 - 2021
      CPE - Security Analysis with SPARTA Course Completion Cybersecurity Passed - 2 CPE's

      Activities and Societies: Activities: Analysis of a Subnet, Gain Access to MySQL, Brute-Force Access to a Machine, Analyze Nikto Results, Access and Close Backdoor Shell, Mount Remote NFS Share SPARTA’s design automates many common vulnerability assessment tasks and is commonly used for network infrastructure penetration and security testing. Primarily focused on aiding security testers and researchers during the scanning and enumeration phase of an engagement. Saves the tester time by automating and providing point-and-click access to output generated by SPARTA.

    • ISC2 (International Information System Security Certification Consortium)

      2021 - 2021
      Conducting Practical Risk Analysis Cybersecurity Passed - 4 CPE's

      Risks and security-related issues represent an ongoing concern of any business. Assessing and analyzing risks and issues should be a continuous and comprehensive exercise in any organization. During this course, you will gain practical experience working through risk assessment, analysis, mitigation, remediation, and communication. Throughout the course, security professionals acquire skills needed to holistically examine operational risk management, learn to work cross-functionally, determine… Show more Risks and security-related issues represent an ongoing concern of any business. Assessing and analyzing risks and issues should be a continuous and comprehensive exercise in any organization. During this course, you will gain practical experience working through risk assessment, analysis, mitigation, remediation, and communication. Throughout the course, security professionals acquire skills needed to holistically examine operational risk management, learn to work cross-functionally, determine how to use risk data effectively, and disseminate actionable information and findings.Modules: Discovering Risk Organizing Risk Eliciting Risk Analyzing Risk Communicating Risk Show less

    • ISC2 (International Information System Security Certification Consortium)

      2020 - 2020
      Introduction to Memory Analysis with Rekall Course Cybersecurity Passed - 2 CPE's
    • ISC2 (International Information System Security Certification Consortium)

      2020 - 2020
      CPE - Introductory File Systems Forensics Course Cybersecurity Passed - 2 CPE's
    • ISC2 (International Information System Security Certification Consortium)

      2019 - 2019
      CPE - Live Forensics Using GRR Cybersecurity Passed - 2 CPE's

      Activities and Societies: Activities: Analysis of a Subnet, Gain Access to MySQL, Brute-Force Access to a Machine, Analyze Nikto Results, Access and Close Backdoor Shell, Mount Remote NFS Share SPARTA’s design automates many common vulnerability assessment tasks and is commonly used for network infrastructure penetration and security testing. Primarily focused on aiding security testers and researchers during the scanning and enumeration phase of an engagement. Saves the tester time by automating and providing point-and-click access to output generated by SPARTA.

    • ISC2 (International Information System Security Certification Consortium)

      2019 - 2019
      CPE - Introductory File Systems Forensics Course Cybersecurity Passed - 2 CPE's

      Data forensics is used to recover and investigate digital evidence to be used in court for crimes including fraud, espionage, cyberstalking, data theft or violent crimes. Digital forensics evidence is held to the same standards as physical evidence, which means that it must be authentic, admissible and reliably obtained. It is critical that security professionals understand the technical, legal and administrative challenges facing data forensics in order to protect the information gathered… Show more Data forensics is used to recover and investigate digital evidence to be used in court for crimes including fraud, espionage, cyberstalking, data theft or violent crimes. Digital forensics evidence is held to the same standards as physical evidence, which means that it must be authentic, admissible and reliably obtained. It is critical that security professionals understand the technical, legal and administrative challenges facing data forensics in order to protect the information gathered prior to it being turned over for analysis to ensure the evidence holds up in a court of law. This course explains the digital forensics scientific process, data acquisition methods, digital evidence handling and preservation principles.Modules: Digital Forensics and Cybercrime Evidence Data Acquisition and Preservation Show less

    • Brooklands Technical College, Uk

      1979 - 1984
      HNC in General Engineering Mechanical and Electical Engineering 1

      Activities and Societies: Windsurfing

    • University of Surrey

      1984 - 1987
      BSc Honours Degree in Engineering & Business Management General Engineering and Electronics 2:2

      Activities and Societies: Windsurfing A course specialising in a varity of engineering subjects, including management. My degree allowed various engineering pathways. I chose to specialise in electronics and mechanical design. I also took courses in project management, business and marketing skills.

    • The University of Waikato

      2016 - 2018
      MCS (Masters in Cyber Security) - COMPUTER AND INFORMATION SCIENCES AND SUPPORT SERVICES 1st Class Honours

      Activities and Societies: Surfing Kitesurfing Course covered: Defensive and Offensive Security, along with Preventive Security including Cryptography, Cloud Computing Technologies and Security. Topics in Networking and Legal Aspects of Cybersecurity.Final Thesis dissertation entitled "An Investigation in to Improved Security of Blockchain" looking at attribute encryption of key documents and their decentralised storage on permissioned IPFS blockchain networks and storage on to the Mijin blockchain.

  • Experience

    • Evershed Power-Optics

      Sept 1979 - Aug 1983
      Apprentice

      Awarded top apprentice from a group of approximately 250 after completing a years off the job training at the Hounslow Engineering Group Training Association (HEGTA).

    • Evershed Power-Optics Ltd

      Aug 1983 - Aug 1984
      Mechanical Designer

      Assisted in the development of servo controlled tracking systems.

    • ERA Technology Ltd

      Jan 1987 - Aug 1991

      I worked in the EMC (electromagnetic compatibility) division based at Farnborough airbase. I gained experience in testing different types of equipment both in-house and on trials, using: Low Level Swept Coupling (LLSC) and Bulk Current Injection (BCI) Techniques. Research work was undertaken to investigate whether the frequency range of LLSC could be increased, and methods to simulate indirect lightning effects. Undertook market research for customer companies in engineering.

      • EMC research and testing Engineer

        Oct 1987 - Aug 1991
      • Market Research Analyst

        Jan 1987 - Oct 1987
    • Wheaton Scientific Instruments Ltd

      Oct 1992 - Jun 2001

      I was responsible for the day-to-day management of the company as well as being a key member of the technical development team (electro-mechanical design and testing). However due to the small size of the company, and being a director, I was actively involved with almost all aspects of the day-to-day, and technical running of the company:1/ Responsible for production control of the Company’s line of laboratory fluorimeters, involved in two major oceanographic instruments: ZAPS, a deep water (6000 metre) Manganese Detector, and an in-situ fluorimeter.2/ I had sole responsibility for overseeing the management of projects, purchasing, 3D technical drafting (using TurboCAD), company accounts, and client/agent liaison.3/ I represented the company at trade shows and conferences, and in a variety of ‘field’ settings, including extended 6 week deployment on a research ship owned by the National Oceanographic Centre, undertaking testing and development of a novel new sensor used for detecting subsea volcanic vents.4/ I gained experience in electronic circuit design, instrumentation, and software development.5/ I have coordinated several research bids (Framework 5, EUREKA) liasing with other commercial and academic partners in the UK and abroad. Show less

      • Director & Company Secretary

        Sept 1999 - Jun 2001
      • Development Engineer and Partner

        Oct 1992 - Sept 1999
    • Ocean Scientific International Ltd

      Jun 2001 - Dec 2014
      Systems & Production Manager

      Ocean Scientific International Ltd (OSIL), was founded from the National Oceanographic Centre, formally IOS in the UK, when the production licence for standard seawater was sold off. Since then the company has marketed instrumentation and manufactured other licensed products for use mainly in the oceanographic industry.My principle roll was to oversee the systems and production departments managing the production process from costing and manufacturing to implementation. I provided electrical & mechanical technical advice to the sales team, establish and maintain relationships with customers and sub-contractors, oversee the assembly, testing and installation of the projects, either at OSIL or customer premises, and produce documentation for quality assurance procedures.I coordinated a range of projects using the talents of staff within the company, and suitable sub-contractors. Examples of recent projects include: project management of several networked buoy systems including sensors to measure CTD, Water quality, MET wave & current and CO2 to name a few, including installation trips to Malta, France, Benin, Qatar, Venezuela, Kenya, South Korea and Israel. One buoy was installed at the recent Concordia ground incident in Italy.Products manufactured: scientific trawl nets; deep ocean camera systems (video and still); undulating towed body system integration; turbidity, flow monitoring, oil pollution monitoring at a petroleum refineries; manufacture of sea-bed coring devices such as a high powered Vibrocorer and various sized piston corers; installation of a harbour tidal and weather system for P&O at Mostyn, North Wales; atmospheric CO2 and H2O flux measurement system; manufacture of heat flux systems and installations in Benin, Africa. These projects used communication techniques such as, UHF, GSM, SDI-12, etc. Use and programming of Campbell Scientific loggers and sensors.Undertook Helicopter Underwater Escape Training (HUET) taken in Aberdeen. Show less

    • Raglan Cybersecurity Network Protection

      Apr 2019 - now
      Self-employed

      Currently developing a cheaper alternative for small to medium enterprises (shops, partnerships, and self-employed), to monitor and control their internal networks. Current software and hardware are mainly focused on big organizations and enterprises, paying large sums to undertake this. Due to COVID, many employees are working from home, but still, need protection, and it's from this requirement I'm currently developing a cheaper solution.

  • Licenses & Certifications

    • Certified Information Systems Security Professional (CISSP)

      (ISC)²
      Oct 2019