Author Name
Jacinto Luis Marques (Author)
Welcome to the Author Central Page of Jacinto Luis Marques, a cybersecurity expert whose academic accolades and industry certifications speak volumes of a lifelong commitment to information security and IT governance. With a robust educational background featuring a postgraduate degree in IT Governance, a Master's degree in Cybersecurity from the prestigious Webster University, and a distinguished completion of a cybersecurity master program earning them the title of Cybersecurity Master Expert, this author is not just a guardian of digital domains, but a sage in the ever-evolving landscape of cyber threats and defenses. With over 19 years of experience serving several business companies, our author has not only witnessed but also shaped the evolution of cybersecurity strategies. This hands-on expertise complements their academic prowess, ensuring that their insights are both theoretically sound and pragmatically proven. Their list of industry certifications is a testament to their relentless pursuit of excellence and continuous learning. As a Certified Information Security Manager (CISM), their leadership in the field of information security management is undeniable. The TOGAF and ITIL certifications underscore their mastery of enterprise architecture and IT service management, respectively. A holder of CompTIA's Security+ and CySA+ credentials, this author has a firm grasp of both foundational cybersecurity knowledge and the ability to apply behavioral analytics to networks and devices to prevent, detect, and combat cybersecurity threats. AWS certifications reveal their proficiency in the world's leading cloud platform, while the Threat Modeling and Threat Detection certifications showcase their expertise in identifying and mitigating potential security threats. ISO certification ensures that they are adept in international standards for information security management, while Microsoft certifications demonstrate a wide-ranging knowledge of Microsoft technologies and platforms.Amidst the already impressive array of certifications that decorate our author's professional biography, the Certified Ethical Hacker (CEH) certification stands out as a badge of honor, symbolizing a profound understanding of how to think and act like a hacker (but with a white hat firmly in place). This certification, governed by the EC-Council, is not merely a title; it's a testament to our author's ability to ethically penetrate and secure network systems, identifying vulnerabilities before they can be exploited by malicious entities. With the CEH credential, this author brings an insider's perspective to cybersecurity, equipping readers with the strategies and mindset needed to proactively defend against cyber adversaries. Their books delve into the tools, techniques, and thought processes of ethical hacking, offering invaluable insights that empower readers to fortify their digital environments against the most cunning of cyber threats. Specialized certifications such as the Technical Surveillance Counter Measures (TSCM) highlight their unique skills in protecting business owners from espionage by competitors, ensuring that corporate secrets and strategic information remain secure. This author is not only a repository of knowledge but also a beacon for those seeking to navigate the treacherous waters of cyberspace securely. Their books are a reflection of their expertise, offering readers practical advice, cutting-edge strategies, and a deep understanding of how to protect their digital assets in an age where cyber threats are as common as they are dangerous. Whether you are a professional in the field, a business owner looking to fortify your digital defenses, or a curious mind eager to understand the complexities of cybersecurity, the works of this distinguished author are an essential addition to your library. Embark on a journey through the digital landscape with a guide whose credentials are as impressive as their passion for safeguarding the cyber world. Discover the intricate art of cybersecurity through the lens of an expert and arm yourself with the knowledge that could be the difference between falling victim to cyber threats and rising above them.Read more about this authorRead less about this author
Read More