Meet Our Experts

Don Bowers

Don Bowers has been in the computer industry for over 36 years as a database programmer and an information systems and security analyst.  Don’s primary focus over the last 10 years has been in the area of information security and digital forensics.  Don currently serves as an Assistant Professor and the Program Chair for the Cybersecurity program at the College of Western Idaho.  As well as being an associate professor Don also holds the distinction of being a Certified EC-Council Instructor.  Don holds several industry certifications including MCITP Enterprise, MCSE + Security, CISSP, CISA, CEH, CHFI, ECSA (EC-Council Security Analysis), LPT (Licensed Penetration Tester) and ACE (AccessData Certified Examiner).


Security Analyst, Part 4 of 4: Configure Kali Linux

This course focuses on fully configuring Kali Linux to be the right tool for the job. It starts off with installing, which features to turn off and which tools to install. It covers using TOR, Linux commands, executing scripts and files as well a...

Ethical HackingSecurity

Security Analyst, Part 3 of 4: Penetration Testing

This course focuses on Penetration testing. It starts off with how to create a plan, and execute deliverables. Next, it covers the planning phase as well as developing a team of testers. Finally, it goes through the penetration testing checklist...

Ethical HackingSecurity

Security Analyst, Part 2 of 4: Penetration Testing Overview

There are many ways and methodologies designed to analyze the information security needs of a corporation or government entity. One of the best ways to analyze the security posture of an organization is through penetration testing. Examine the fundam...

Ethical HackingSecurity

Security Analyst, Part 1 of 4: Security Analyst Overview

There is a lot of confusion, even amongst security professionals, as to what makes a security analyst. Explore what it really means to be a security analyst by examining what CBK (Common Body of Knowledge) a security analyst might possess, as well as...

Ethical HackingSecurity

Explore Our Blogs, Courses and Webinars