Contact Address: Huntsville, Texas 77340
My Educational
Journey
My educational journey, tracing the different levels of my knowledge and skills in digital forensics from academic foundations to advanced doctoral studies.
My Educational
Journey
My educational journey, tracing the different levels of my knowledge and skills in digital forensics from academic foundations to advanced doctoral studies.
Relevant Coursework (MSC & PHD)
- Incident Response and Disaster Recovery
- Digital Forensics, analysis and Investigations
- A.I(Machine Learning)
- Advanced Mobile Forensics
- Network and Cloud Forensics
- Malware Forensics
- Malware Reverse Engineering
- Ethics of Digital Forensics
Education
A proven track record of academic excellence, research contributions, and a commitment to advancing knowledge in my field.
Sam Houston State University August 2021 - Present
Doctor of Philosophy - PhD, Digital and Cyber Forensics science [Jan 2021 - May 2024]
- Conducted digital forensics research that ranges from mobile device forensics, social media forensics, operating system forensics, and malware reverse engineering using idapro, to many other areas of digital forensics.
- I used a Python script to extract Twitter data with my Twitter developer account. This research involves using machine learning algorithms to analyze the data for possible crime-intent tweets.
- I set up a series of virtual machines, injected some malware, and extracted data using volatility for VolMemlyzer research - see reach experience.
- Conduct research on cyber forensic intelligence, including collecting and analyzing data related to cyber threats and attacks.
- Work with other researchers and analysts to develop and test new cyber forensic intelligence techniques and tools.
- Assist in the design and execution of research projects, including identifying research questions, designing experiments, and analyzing data.
- Collaborate with industry partners and other organizations to identify research needs and opportunities in the field of cyber forensic intelligence.
- Write reports and articles on research findings, and present research results at conferences and other professional development activities.
- Participate in the development and delivery of training programs and workshops related to cyber forensic intelligence.
- Provide technical support to faculty and other researchers in the Cyber Forensic Intelligence Center, including setting up and maintaining equipment and software used for research.
- Assist in the management and analysis of large data sets related to cyber forensic intelligence, and develop tools and techniques to facilitate data analysis.
- Collaborate with other graduate research assistants and faculty members to develop and implement research projects that address key issues in cyber forensic intelligence. Stay up-to-date with the latest developments in cyber forensic intelligence technology and industry trends, and contribute to the ongoing development of the Cyber Forensic Intelligence Center’s research
program. - Assist in the delivery of lectures and laboratory sessions on topics related to cyberforensic
intelligence to undergraduate and graduate students. - Assist in the preparation of course materials, including handouts, slides, and laboratory exercises.
- Conduct office hours and provide individual support and guidance to students, including answering questions, providing feedback on assignments, and helping students prepare for exams.
- Assist in grading assignments, exams, and other assessments related to cyber forensic intelligence.
- Stay up-to-date with the latest developments in cyber forensic intelligence technology and industry trends and incorporate this knowledge into course materials and teaching methods.
- Assist in the development and implementation of research projects related to cyber forensic intelligence, and provide technical support to faculty and other researchers in the Cyber Forensic Intelligence Center.
Auburn University at Montgomery August 2017 - August 2018
Master's degree, Cybersystems and Information Security [2017 - 2018]
- Item Install and configure VPN for remote access for clients.
- The remote access allowed me to gain access to personal and company PC to troubleshoot and fix any issues.
- Configured modems, monitors, routers, firewalls, and access points.
- Recreate a compromised or hacked computer from scratch.
- Provide technical support to end-users in person, over the phone, or through remote access tools.
- Install and configure software and hardware, including operating systems, applications, and peripheral devices such as printers and scanners.
- Troubleshoot and resolve hardware, software, and network issues, including diagnosing and repairing faulty equipment or replacing parts as needed.
- Perform routine maintenance tasks, such as backups and updates, to ensure optimal performance
and security of IT systems. - Set up and manage user accounts and permissions, and provide training and guidance to users
on how to use IT systems and applications. - Monitor and respond to security alerts and incidents, and implement appropriate security measures to protect against cyber threats.
- Maintain inventory of hardware and software and order new equipment as needed.
- Collaborate with other members of the IT team to implement new projects and initiatives and provide technical input and support as needed.
- Document and maintain records of IT systems, configurations, and procedures to ensure continuity and consistency in IT operations.
- Stay up-to-date with the latest developments in IT technology and provide input on new tools and techniques to improve the efficiency and effectiveness of IT operations
University of Alabama at Birmingham August 2014- April 2016
Bachelor's degree, Computer and Information Sciences and Support Services 2014 - 2016
- Install and configure VPN for remote access for clients.
- The remote access allowed me to gain access to personal and company PC to troubleshoot and fix any issues.
- Configured modems, monitors, routers, firewalls, and access points.
- Recreate a compromised or hacked computer from scratch
- Provide technical support to end-users in person, over the phone, or through remote access tools.
- Install and configure software and hardware, including operating systems, applications, and peripheral devices such as printers and scanners.
- Troubleshoot and resolve hardware, software, and network issues, including diagnosing and repairing faulty equipment or replacing parts as needed.
- Perform routine maintenance tasks, such as backups and updates, to ensure optimal performance and security of IT systems.
- Set up and manage user accounts and permissions, and provide training and guidance to users on how to use IT systems and applications.
- Monitor and respond to security alerts and incidents, and implement appropriate security measures to protect against cyber threats.
- Maintain inventory of hardware and software and order new equipment as needed.
- Collaborate with other members of the IT team to implement new projects and initiatives and provide technical input and support as needed.
- Document and maintain records of IT systems, configurations, and procedures to ensure continuity and consistency in IT operations.
- Stay up-to-date with the latest developments in IT technology and provide input on new tools and techniques to improve the efficiency and effectiveness of IT operations
Alabama Agricultural and Mechanical University
Computer Science and System Programming, Computer Software Engineering [2013 - 2014]
***Transferred to the University of Alabama Birmingham --Fall 2014
City and Guilds London Institute of Nigeria September 2010 - August 2013
Advanced Diploma in Information Communication Technology
- Installation of software and hard wares.
- Cloning of systems.
- System maintenance
- Troubleshooting errors and providing necessary solutions.
- Customer care assistance and online help desk assistance
Professional Memberships
- American Association of University Women at UAB (AAUW at UAB) — President
- The National Society of Leadership and Success (NSLS)
- Women in CyberSecurity
- The Institute of Electrical and Electronics Engineers (IEEE)
- The Association for Computing Machinery (ACM)
- Women Who code
- The American Association of University Women
- Information Systems Security Association(ISSA)
- Computer Science Society
- Association of Cyber Forensics and Threat Investigators (ACFTI)
- American Academy of Forensic Sciences (AAFS)
- Texas Association Of Licensed Investigators(TALI)
- Association For the Advancement of Artificial Intelligence(AAAI)
- Project Management Institute (PMI)
- High Technology Crime Investigation Association(HTCIA)
Licenses
Highlighting acquired licenses and certifications to validate my academic achievements but also signify my dedication to staying abreast of industry standards and best practices
Certification
Discover the professional certifications and qualifications I’ve earned throughout my academic and research journey, showcasing my expertise and dedication to excellence in my field.
Connect with Biodoumoye
Stay connected with Biodoumoye across social media platforms for updates, insights, and discussions on digital forensics and cybersecurity.