Michael G. Solomon

IT consultant

Michael G. Solomon, Ph.D., CISSP, PMP, CISM, is a security, privacy, blockchain, and data science author, consultant, and speaker who specializes in leading teams in achieving and maintaining secure and effective IT environments. Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to over 20 books and numerous served training courses.

From 1998 until 2001, he a Computer Science instructor in the Kennesaw State University’s Computer Science and Information Sciences (CSIS) department, is a Professor of Cyber Security and IT at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University.

Content from Michael G. Solomon

CompTIA CySA+
Learning Path
CompTIA CySA+

CompTIA CySA+

The CompTIA Cybersecurity Analyst (CySA+) CS0-002 certification path teaches you how to use behavioral analytics to prevent, detect and combat cyber threats. You'll learn how to configure and use threat detection tools, perform data analysis to identify threats and secure applications and systems.

The Importance of Threat Data and Intelligence
Course
The Importance of Threat Data and Intelligence

The Importance of Threat Data and Intelligence

This course discusses intelligence sources and confidence levels and introduces other important threat analysis concepts, such as threat indicators and threat trends.

Threat Intelligence in Support of Organizational Security
Course
Threat Intelligence in Support of Organizational Security

Threat Intelligence in Support of Organizational Security

This course explains how threat intelligence contributes to organizational security. It covers the use of attack frameworks, threat research, and threat modeling.

Vulnerability Management Activities
Course
Vulnerability Management Activities

Vulnerability Management Activities

This course walks through the vulnerability management process, from vulnerability identification and scanning to validation and remediation.

Vulnerability Assessment Tools
Course
Vulnerability Assessment Tools

Vulnerability Assessment Tools

This course discusses different types and uses of vulnerability assessment tools, including Web application scanners, wireless and cloud assessment tools, and tools related to preventative measures.

Threats and Vulnerabilities Associated with Specialized Technology
Course
Threats and Vulnerabilities Associated with Specialized Technology

Threats and Vulnerabilities Associated with Specialized Technology

This course discusses intelligence sources and confidence levels and introduces other important threat analysis concepts, such as threat indicators and threat trends.

Threats and Vulnerabilities Associated with Operating in the Cloud
Course
Threats and Vulnerabilities Associated with Operating in the Cloud

Threats and Vulnerabilities Associated with Operating in the Cloud

This course discusses intelligence sources and confidence levels and introduces other important threat analysis concepts, such as threat indicators and threat trends.

Mitigating Controls for Attacks and Software Vulnerabilities
Course
Mitigating Controls for Attacks and Software Vulnerabilities

Mitigating Controls for Attacks and Software Vulnerabilities

This course provides an overview of common attacks on applications, including injection and overflow attacks, and explains effective mitigation strategies.

Security Solutions for Infrastructure Management
Course
Security Solutions for Infrastructure Management

Security Solutions for Infrastructure Management

This course covers important infrastructure security topics, including secure network architecture, physical security, identity and access management, and more.

Software Assurance Best Practices
Course
Software Assurance Best Practices

Software Assurance Best Practices

This course describes common software architecture types, introduces the concept of DevSecOps, and provides and overview of secure software development process and secure coding practices.

Hardware Assurance Best Practices
Course
Hardware Assurance Best Practices

Hardware Assurance Best Practices

This course discusses important topics related to hardware security, including trusted hardware, hardware encryption, secure processing, trusted foundry, and anti-tamper techniques.

Data Analysis in Security Monitoring Activities
Course
Data Analysis in Security Monitoring Activities

Data Analysis in Security Monitoring Activities

This course goes into detail on security data sources, collection tools, and analysis techniques.

Implement Configuration Changes to Existing Controls to Improve Security
Course
Implement Configuration Changes to Existing Controls to Improve Security

Implement Configuration Changes to Existing Controls to Improve Security

This course provides an overview of best practices for configuring file and resource permissions, firewalls and intrusion prevention systems, and endpoint security solutions.

The Importance of Proactive Threat Hunting
Course
The Importance of Proactive Threat Hunting

The Importance of Proactive Threat Hunting

This course explains the concept of threat hunting and walks through the process and effective application of the results.

Compare and Contrast Automation Concepts and Technologies
Course
Compare and Contrast Automation Concepts and Technologies

Compare and Contrast Automation Concepts and Technologies

This course explains the importance of automation in security and explains its common uses, including malware signature creation, analyzing threat feeds, and others.

The Importance of the Incident Response Process
Course
The Importance of the Incident Response Process

The Importance of the Incident Response Process

This course highlights the importance of Incident Response, explaining roles and responsibilities and active preparation.

Appropriate Incident Response Procedures
Course
Appropriate Incident Response Procedures

Appropriate Incident Response Procedures

This course walks through the phases of Incident Response and highlights the three key components: communication, analysis, and reporting.

Analyze Potential Indicators of Compromise
Course
Analyze Potential Indicators of Compromise

Analyze Potential Indicators of Compromise

This course explores the common network, host, and application symptoms that may indicate a compromise.

Utilize Basic Digital Forensic Techniques
Course
Utilize Basic Digital Forensic Techniques

Utilize Basic Digital Forensic Techniques

This course discusses digital forensics, from the key principles, procedures and tools to the process of forensic analysis and mobile and cloud forensics.

The Importance of Data Privacy and Protection
Course
The Importance of Data Privacy and Protection

The Importance of Data Privacy and Protection

This course explains the concept of data privacy and provides an overview of common technical and non-technical data security controls.

Security Concepts in Support of Organizational Risk Mitigation
Course
Security Concepts in Support of Organizational Risk Mitigation

Security Concepts in Support of Organizational Risk Mitigation

This course explains important risk management topics, including Business Impact Analysis (BIA), risk identification, and the role of training and supply chain assessment.

The Importance of Frameworks, Policies, Procedures, and Controls
Course
The Importance of Frameworks, Policies, Procedures, and Controls

The Importance of Frameworks, Policies, Procedures, and Controls

This course provides an overview of common cybersecurity frameworks, explains different types of security policies, procedures, and controls.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.