Untitled

BLUNDEN & ASSOCIATES, LLC

Harden, Defend, Investigate, Recover, & Prosecute

  • Home

  • About

  • More

    Week One

    January 9, 2018 Welcome to the first class of Investing Cyber Terrorism (AJU 447 / 6647). This week we will review the syllabus and the...
    Week One

    Week Two

    January 16, 2018 We started off the week with ice, snow, and a day off. Unfortunately, we are going to have to play a little "catch-up."...
    Week Two

    Week Three

    January 23, 2018 This week we talked about the 16 Sectors of Critical Infrastructure defined by PPD-21. We also talked about the...
    Week Three

    Week Four

    February 6, 2018 Today we talked about what a cyber warrior looks like and the different types of cyber warriors. We also talked about...
    Week Four

    Week Five

    This week we talked about the process that a terrorist would use to conduct a cyber terrorism operation. We also talked about the 4th...
    Week Five

    Week Six

    February 20, 2018 Today, we looked at the types of electronic evidence that could be seized during the execution of a search warrant....
    Week Six

    Week Seven

    This week we talked about anti-forensics & counter-forensics. We also discussed how digital images are created and methods used to...
    Week Seven

    Mid-Term Review

    Yesterday we went over the mid-term study guide and we talked about the format of the exam. If you were not present for class (or even...
    Mid-Term Review

    Week Ten

    March 20, 2018 Welcome back from Spring Break. It was good to see everybody made it back safely. This week we talked about CYBERCOM,...
    Week Ten

    Week Eleven

    This week we talked about the ways that terrorist use the Internet. I also announced that there will be a quiz on March 29th. Also,...
    Week Eleven

    Week Twelve

    This week we discussed how individuals and small units should prepare for a cyber attack, and what they can do to assist cyber...
    Week Twelve

    Week Thirteen

    This week we talked about "Incident Response Teams" vs. "Cyber Threat Hunting." Unfortunately, the audio system died half-way through...
    Week Thirteen

    Week Fourteen

    April 17, 2018 Today we talked about the current cyber threat landscape and Symantec's 2018 Internet Security Threat Report released in...
    Week Fourteen

    Week Fifteen

    April 24, 2018 This was our final day of class. Today we reviewed the study guide for the final exam. The final exam is on May 1, 2018...
    Week Fifteen
    {"items":["5fdaa1792ab6780017e58999","5fdaa1792ab6780017e58997","5fdaa1792ab6780017e58995","5fdaa1792ab6780017e58998","5fdaa1792ab6780017e58994","5fdaa1792ab6780017e58993","5fdaa1792ab6780017e58996","5fdaa1792ab6780017e58992","5fdaa179cdcf3900174fea48","5fdaa179cdcf3900174fea47","5fdaa179cdcf3900174fea4a","5fdaa179cdcf3900174fea45","5fdaa179cdcf3900174fea49","5fdaa179cdcf3900174fea46"],"styles":{"galleryType":"Columns","groupSize":1,"showArrows":true,"cubeImages":true,"cubeType":"fill","cubeRatio":1.3333333333333333,"isVertical":true,"gallerySize":30,"collageAmount":0,"collageDensity":0,"groupTypes":"1","oneRow":false,"imageMargin":32,"galleryMargin":0,"scatter":0,"rotatingScatter":"","chooseBestGroup":true,"smartCrop":false,"hasThumbnails":false,"enableScroll":true,"isGrid":true,"isSlider":false,"isColumns":false,"isSlideshow":false,"cropOnlyFill":false,"fixedColumns":1,"enableInfiniteScroll":true,"isRTL":false,"minItemSize":50,"rotatingGroupTypes":"","rotatingCropRatios":"","columnWidths":"","gallerySliderImageRatio":1.7777777777777777,"numberOfImagesPerRow":1,"numberOfImagesPerCol":1,"groupsPerStrip":0,"borderRadius":0,"boxShadow":0,"gridStyle":1,"mobilePanorama":false,"placeGroupsLtr":true,"viewMode":"preview","thumbnailSpacings":4,"galleryThumbnailsAlignment":"bottom","isMasonry":false,"isAutoSlideshow":false,"slideshowLoop":false,"autoSlideshowInterval":4,"bottomInfoHeight":0,"titlePlacement":"SHOW_ON_THE_LEFT","galleryTextAlign":"center","scrollSnap":false,"itemClick":"nothing","fullscreen":true,"videoPlay":"hover","scrollAnimation":"NO_EFFECT","slideAnimation":"SCROLL","scrollDirection":0,"scrollDuration":400,"overlayAnimation":"FADE_IN","arrowsPosition":0,"arrowsSize":23,"watermarkOpacity":40,"watermarkSize":40,"useWatermark":true,"watermarkDock":{"top":"auto","left":"auto","right":0,"bottom":0,"transform":"translate3d(0,0,0)"},"loadMoreAmount":"all","defaultShowInfoExpand":1,"allowLinkExpand":true,"expandInfoPosition":0,"allowFullscreenExpand":true,"fullscreenLoop":false,"galleryAlignExpand":"left","addToCartBorderWidth":1,"addToCartButtonText":"","slideshowInfoSize":200,"playButtonForAutoSlideShow":false,"allowSlideshowCounter":false,"hoveringBehaviour":"NEVER_SHOW","thumbnailSize":120,"magicLayoutSeed":1,"imageHoverAnimation":"NO_EFFECT","imagePlacementAnimation":"NO_EFFECT","calculateTextBoxWidthMode":"PERCENT","textBoxHeight":0,"textBoxWidth":200,"textBoxWidthPercent":50,"textImageSpace":10,"textBoxBorderRadius":0,"textBoxBorderWidth":0,"loadMoreButtonText":"","loadMoreButtonBorderWidth":1,"loadMoreButtonBorderRadius":0,"imageInfoType":"ATTACHED_BACKGROUND","itemBorderWidth":0,"itemBorderRadius":0,"itemEnableShadow":false,"itemShadowBlur":20,"itemShadowDirection":135,"itemShadowSize":10,"imageLoadingMode":"BLUR","expandAnimation":"NO_EFFECT","imageQuality":90,"usmToggle":false,"usm_a":0,"usm_r":0,"usm_t":0,"videoSound":false,"videoSpeed":"1","videoLoop":true,"jsonStyleParams":"","gallerySizeType":"px","gallerySizePx":980,"allowTitle":true,"allowContextMenu":true,"textsHorizontalPadding":-30,"itemBorderColor":{"themeName":"color_15","value":"rgba(24,24,24,1)"},"showVideoPlayButton":true,"galleryLayout":2,"targetItemSize":980,"selectedLayout":"2|bottom|1|fill|true|0|true","layoutsVersion":2,"selectedLayoutV2":2,"isSlideshowFont":false,"externalInfoHeight":0,"externalInfoWidth":0.5},"container":{"width":980,"galleryWidth":1012,"galleryHeight":0,"scrollBase":0,"height":null}}

    info@blundentech.com

    P.O. Box 486, Madison, Mississippi, 39110

    ©2020 BLUNDEN & ASSOCIATES, LLC