SlideShare a Scribd company logo
1 of 1
1625 W. Fountainhead Pkwy, Tempe, AZ 85282-2371 1.866.766.0766
July27, 2014
To Whom It May Concern:
ChristopherHope wasa studentinmyInformationSystemsEnterpriseSecurityclassduringJune-Julyof
2014. The focusof the classin onmanagerial andtechnical considerationsrelatedtodelivering
informationsecurityatanenterprise level. Thisis a fast pacedclassthat coverstopicsrangingfrom
technologyoptionstomanagerial approachesindevelopingandmanagingsecuritywithinan
organization.
Christopherwasanexcellentstudentandstrongparticipantinthe classdiscussions. He wasable toadd
value toeverykeytopicand consistentlydemonstratedaclearunderstandingof issuesandsolutions.
His workshowcasedsolidITskillsandknowledgethatwascombinedwithanexcellentunderstandingof
IT security. I am veryconfidentinChristopher’sability,skill andexperiencetoutilizetechnical optionsin
concert withmanagerial policestoeffectanoverall secure environment.
I am veryconfidentthatChristopherwill be avaluable ITsecurityprofessional inhisnextrole.
Lee Dordal
CertifiedAdvancedFacilitator
Universityof Phoenix
651-235-7479 Arizona
LeeD000@email.phoenix.edu(UOP)
Leedordal@gmail.com(Personal)

More Related Content

Similar to Lee Dordal Letter of Recommendation

Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research CSSaunders
 
Clients Recommendation Letter May Alwashmi 2
Clients Recommendation Letter May Alwashmi 2Clients Recommendation Letter May Alwashmi 2
Clients Recommendation Letter May Alwashmi 2May Alwashmi
 
AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2Anna Vysotskaya
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESSylvain Martinez
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingThinAir
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Seungjoo Kim
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity MarketingAlex Weishaupt
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBDavid Shipley
 
Data Socialization: Implementing the Next Big Thing in Data Analytics
Data Socialization: Implementing the Next Big Thing in Data Analytics Data Socialization: Implementing the Next Big Thing in Data Analytics
Data Socialization: Implementing the Next Big Thing in Data Analytics Career Communications Group
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Peter Spier Rochester
Peter Spier RochesterPeter Spier Rochester
Peter Spier Rochesterpeterspier
 
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...tduy0506
 

Similar to Lee Dordal Letter of Recommendation (20)

Christopher Jean
Christopher JeanChristopher Jean
Christopher Jean
 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
 
Clients Recommendation Letter May Alwashmi 2
Clients Recommendation Letter May Alwashmi 2Clients Recommendation Letter May Alwashmi 2
Clients Recommendation Letter May Alwashmi 2
 
AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2AnnaVysotskayaCybersecResume2
AnnaVysotskayaCybersecResume2
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
 
Chapman Cover Sheet
Chapman Cover SheetChapman Cover Sheet
Chapman Cover Sheet
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
cybersecurity jobs blog
cybersecurity jobs blogcybersecurity jobs blog
cybersecurity jobs blog
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Cybersecurity Marketing
Cybersecurity MarketingCybersecurity Marketing
Cybersecurity Marketing
 
IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016
 
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNBAtlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
Atlantic Security Conference 2015 (AtlSecCon) Presentation on IT Security @UNB
 
Data Socialization: Implementing the Next Big Thing in Data Analytics
Data Socialization: Implementing the Next Big Thing in Data Analytics Data Socialization: Implementing the Next Big Thing in Data Analytics
Data Socialization: Implementing the Next Big Thing in Data Analytics
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 
Peter Spier Rochester
Peter Spier RochesterPeter Spier Rochester
Peter Spier Rochester
 
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
Dang, D. (2014), “Predicting Insider’s Malicious Security Behaviours: A Gener...
 

More from Christopher Shaun Hope

'Microsoft Retail Sales Associate - Windows 8
'Microsoft Retail Sales Associate - Windows 8'Microsoft Retail Sales Associate - Windows 8
'Microsoft Retail Sales Associate - Windows 8Christopher Shaun Hope
 
Microsoft Accredited RetailPprofessional
Microsoft Accredited RetailPprofessionalMicrosoft Accredited RetailPprofessional
Microsoft Accredited RetailPprofessionalChristopher Shaun Hope
 
Surface accredited retail professional
Surface accredited retail professionalSurface accredited retail professional
Surface accredited retail professionalChristopher Shaun Hope
 
'Surface windows family associate accreditation
'Surface windows family associate accreditation'Surface windows family associate accreditation
'Surface windows family associate accreditationChristopher Shaun Hope
 
'Microsoft retail sales associate windows 8
'Microsoft retail sales associate   windows 8'Microsoft retail sales associate   windows 8
'Microsoft retail sales associate windows 8Christopher Shaun Hope
 
Pc aisle accreditation windows 10 launch
Pc aisle accreditation windows 10 launchPc aisle accreditation windows 10 launch
Pc aisle accreditation windows 10 launchChristopher Shaun Hope
 

More from Christopher Shaun Hope (20)

Capella Presidents List Spring 2017
Capella Presidents List Spring 2017Capella Presidents List Spring 2017
Capella Presidents List Spring 2017
 
'Microsoft Retail Sales Associate - Windows 8
'Microsoft Retail Sales Associate - Windows 8'Microsoft Retail Sales Associate - Windows 8
'Microsoft Retail Sales Associate - Windows 8
 
Audio test
Audio testAudio test
Audio test
 
Word 2013 skills test
Word 2013 skills testWord 2013 skills test
Word 2013 skills test
 
Basic computer skills test
Basic computer skills testBasic computer skills test
Basic computer skills test
 
Microsoft Accredited RetailPprofessional
Microsoft Accredited RetailPprofessionalMicrosoft Accredited RetailPprofessional
Microsoft Accredited RetailPprofessional
 
Surface accredited retail professional
Surface accredited retail professionalSurface accredited retail professional
Surface accredited retail professional
 
'Xbox one accreditation 2014
'Xbox one accreditation 2014'Xbox one accreditation 2014
'Xbox one accreditation 2014
 
Xbox 360 accreditation 2014
Xbox 360 accreditation 2014Xbox 360 accreditation 2014
Xbox 360 accreditation 2014
 
Windows apps achievement
Windows apps achievementWindows apps achievement
Windows apps achievement
 
Windows associate accreditation 2014
Windows associate accreditation 2014Windows associate accreditation 2014
Windows associate accreditation 2014
 
Windows 10 certificate
Windows 10 certificateWindows 10 certificate
Windows 10 certificate
 
'Surface windows family associate accreditation
'Surface windows family associate accreditation'Surface windows family associate accreditation
'Surface windows family associate accreditation
 
'Surface associate accreditation 2014
'Surface associate accreditation 2014'Surface associate accreditation 2014
'Surface associate accreditation 2014
 
'Office retail accreditation
'Office retail accreditation'Office retail accreditation
'Office retail accreditation
 
Office associate accreditation 2014
Office associate accreditation 2014Office associate accreditation 2014
Office associate accreditation 2014
 
'Microsoft retail sales associate windows 8
'Microsoft retail sales associate   windows 8'Microsoft retail sales associate   windows 8
'Microsoft retail sales associate windows 8
 
Pc aisle accreditation windows 10 launch
Pc aisle accreditation windows 10 launchPc aisle accreditation windows 10 launch
Pc aisle accreditation windows 10 launch
 
Word 2013 skills test
Word 2013 skills testWord 2013 skills test
Word 2013 skills test
 
Basic computer skills test
Basic computer skills testBasic computer skills test
Basic computer skills test
 

Lee Dordal Letter of Recommendation

  • 1. 1625 W. Fountainhead Pkwy, Tempe, AZ 85282-2371 1.866.766.0766 July27, 2014 To Whom It May Concern: ChristopherHope wasa studentinmyInformationSystemsEnterpriseSecurityclassduringJune-Julyof 2014. The focusof the classin onmanagerial andtechnical considerationsrelatedtodelivering informationsecurityatanenterprise level. Thisis a fast pacedclassthat coverstopicsrangingfrom technologyoptionstomanagerial approachesindevelopingandmanagingsecuritywithinan organization. Christopherwasanexcellentstudentandstrongparticipantinthe classdiscussions. He wasable toadd value toeverykeytopicand consistentlydemonstratedaclearunderstandingof issuesandsolutions. His workshowcasedsolidITskillsandknowledgethatwascombinedwithanexcellentunderstandingof IT security. I am veryconfidentinChristopher’sability,skill andexperiencetoutilizetechnical optionsin concert withmanagerial policestoeffectanoverall secure environment. I am veryconfidentthatChristopherwill be avaluable ITsecurityprofessional inhisnextrole. Lee Dordal CertifiedAdvancedFacilitator Universityof Phoenix 651-235-7479 Arizona LeeD000@email.phoenix.edu(UOP) Leedordal@gmail.com(Personal)