Below is a redacted SAMPLE of some of my Qualifications/PD (Excluding Case Studies/Experience/Appointments). It is relevant to note that Cyber-Threats in my view is the new world war. New hacking methods are created, and smarter e-Crime is committed day by day. There is not one degree one could do without the knowledge of such degree being expired at conclusion. eVestigator® has a magnitude of Nationally Accredited and Professional Development (Some endorsed by Charles Sturt University) to maintain currency. I grew up with the birth of the internet and every day cases bring new threats that may not have existed yesterday. My work and customer feedback speaks for itself. Please find below a sample of some of the official Qualifications and PD I have undertaken. Mostly, I teach others Cyber-Security trends, and this is something that is popular in America but lacking in Australia's training system. Children should be taught about current cyber risks in primary school as (from experience) the exposure with social networking is so open, people do not realise how much intelligence someone like myself could gain from merely a Facebook profile. This is something we are working on, in educating Australia. There will be more on this shortly.
Professional development is often maintained via world renowned Udemy platform. Udemy has been discussed in The New York Times, The China Post, Fast Company, the BBC and TechCrunch, with
much of its coursework originating from Stanford
University Expert material noting "Udemy offers an experience that rivals the real classroom, and should prove to be a useful utility for teachers and students of all subject matters.
Since I was just an 11yr boy I have been programming in almost every language on every platform available. My brothers played games, I made them! Aside from the 25+ years of HANDS ON major computer programming and cyber security experience, I developed many applications. From web servers, mail servers, my own protocols, all low level, design - pixel by pixel, code line by line, nothing like the 'wizard' and 'open source' attempts of lazy coder attempts today. At 19, whilst employed as an Analyst Programmer and working on integration with a VERY WELL KNOWN commercial accounting package for our CRM software, I found a major security flaw in the raw binary of their database exposing credit card numbers, that's where my interest for cyber security investigative 'programming' developed. Having already becoming a growing expert my commercial experience was like facing a truck head on. As at the same time, after VCE I was in the top 3% in Australia in my VCE (Common Assessment Tasks) for Information Systems and Technology (4 A+++), then after a short stint flying through High Distinctions at first year Uni, I was hand picked and employed immediately to work for real projects as an Analyst Programmer, then Senior Analyst Programmer, and later became a CEO, Assessor, CIO and CSIO, PI, and Forensic Investigator/Expert Witness. In those earlier days in addition to working as an Analyst Programmer I was in demand by Swinburne University as one of the very few who could teach the all new .NET advanced programming suite sessionally and did so for a period of about 4 years after hours. I shortly opened my own international businesses in the Voice Analysis/VOIP medico-legal industries. I programmed handheld devices, multi-million dollar corporate software and
systems widely used by physicians overseas to dictate via Windows CE Pocket PC's (way before the iPhone and Android existed) that interacted with custom typist equipment for dictation and transcription.
Since then I built some of Australia's largest IT companies and educational institutes and gained
recognition of my expertise both before, during and after my practical experience - calling from the golden principles of expertise from what you cannot learn at school - but what was embedded in me since 11 years old - first programming on an Amstrad CPC 464 64kb tape deck machine. I have seen the entire life cycle of today's computer systems file systems and further, from the perspective of the consumer birth of the internet and have shared this knowledge and lead teams of up to 50 people, developed major commercial applications, built 2 of Australia's largest training institutes, a Computer Implemented Software Patent, and am considered a master in programming principles and reverse ethical hacking. From understanding the roots of programming, something that is not taught these days, I understand client needs, and can understand the full dynamics of source code layers (as they have evolved), enabling me to have an
investigative advantage in any matter relating to computer crime or computer related fraud.
especially useful in white collar crimes, cyber stalking, cyber
harassment, and reverse IP tracing. Much of the API programming tools I have created over the years are used by millions of people all over the world by 'other programmers' as software
plug-ins for Microsoft (IE/Spartan/Edge/Surface Pro/Windows Phone), Apple (iPhone/iPad/iTunes), VLC,
Real One, and other major vendors. I have always been the programmer for programmers. I have been asked to give expert opinion in cases involving IP theft and high-tech crime requiring analysis code line by line and contracts involving disputes over source code theft and disputes, and I that is one of the reasons why I can attain forensic data that many cannot when it comes to situations where most people give up when they cannot get an IP address on a silver platter. I have succeeded in many cases, because there are many more ways to locate a person who wishes to remain anonymous who is damaging a reputation or company.
Memberships, Affiliations & Appointments...
Victoria Police Licensed Individual Private Investigator (PI) - Simon Joseph Smith
Nationally Accredited Mediatior (NAM)
Commonwealth Appointed Family Dispute Resolution Practitioner (FDRP) and Assessor of Grad.Dip FDRP - Family Court Mediations
Victoria Society for Computers and Law (VSCL)
Information Systems Security Association, Inc (ISSA)
DEFCON® member and cyber intelligence supplier and contributor
International Association of Software Architects (IASA) - Member
Commonwealth Appointed Marriage Celebrant, Family Law Division - Attorney-General's Department
20 years+ industry experience as a Master Computer programmer covering all areas plus...
Certified White Hat Hacker (CWHH), Clickjacking,
Cross Site Request Forgery,
Cross-Site Request Forgery (CSRF),
Cross-site Scripting (XSS),
Documentation - Oracle VM VirtualBox,
Google Hacking Database, GHDB, Google Dorks,
How to do Cookie Stealing with Cross site Scripting Vulnerability : XSS Tutorials| Learn How to Hack| Ethical Hacking,
Intro To Web Apps,
Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution.,
Offline Windows pw & reg-editor, bootdisk,
Password crackers - SecTools Top Network Security Tools,
Remote File Inclusion,
Sandbox (computer security) - Wikipedia, the free encyclopedia,
Session hijacking attack,
SHODAN - Computer Search Engine,
Social Engineering: What It Is and How to Help Protect Yourself,
Step-by-step tutorial to install Kon-Boot on USB,
Web App Pentesting,
What Are Web Applications?,
What is Phishing | Phishing Scams | Report Phishing Scams,
WHOIS Search, Domain Name, Website, and IP Tools - Who.is,
Wifi Packet Capturing / Session Hijacking Using Wireshark Packet Storm,
Google Hacking Theory,
Google Hacking Practical,
Deep Dark Web,
Sandboxing and Virtual Machines PDF,
Sandboxie - Part 2,
Information Gathering Theory,
Virtual Machines Practical,
Virtual Box - Introduction,
Virtual Box - Part 2,
What is a Web Application,
Web Application Pentesting,
Sql Injection Theory,
Sql Injection Practical,
Click Jacking Theory,
Information Gathering Practical,
Click Jacking Practical,
File Inclusion Theory,
File Inclusion Practical (LFI),
File Inclusion Practical (RFI),
XSS Practical (Reflected),
XSS Practical (Stored),
Kali Basics Theory,
Kali Basics Practical,
Password Cracking Theory,
Phishing Practical Part 1,
Phishing Practical Part 2,
Windows Hacking Theory,
Windows Hacking Practical (Konboot),
Windows Hacking Practical (Offline Windows Password & Registry Editor),
Defending against ARP Poisoning(Wifi) on Windows Machine,
Defending against ARP Poisoning attack on Win Machine(XARP Tool),
Defending against ARP poisoning-WIFI attack(on Android Mobile),
Password Cracking Practical,
Linux passwd cracking - John the ripper,
Session Hijacking Theory,
Session Hijacking Using XSS,
Session Hijacking Using Wireshark,
Deep Dark Web,
Intercepting Wifi with Mobile/Computer - ARP Poisoining,
Password Cracking Techniques,
Sandboxing and Virtual Machines.
Certified Forensic Hi-Tech Investigator (CFHI) - McAfee Institute
McAfee Institute Inc. provides certification of the Most Elite Computer and Mobile Forensic Investigators that are trained in advanced and state of the art methodologies designed to help identify, investigate and prosecute the most sophisticated types of computer crimes known to man. This Certification program focuses on enhancing skill sets as a "Hi-Tech Forensic Expert" which takes a blended learning approach of self-study, live interactions, and instructor led labs that will help you to learn how to conduct successful computer forensic investigations with powerful new concepts to prosecute the guilty.
Taking over 25 years of hands-on experience of conducting forensic investigations, cyber-investigations from the private, public, and government sectors around the world and sharing insights into what contributes to success and failures. The CFHI Supports the National Cyber-Security Workforce Framework (Homeland Security). The National Cybersecurity Workforce Framework supports the nation's cybersecurity workforce development efforts. The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors. The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.
Certified Cyber Investigative Expert (CCIE) - McAfee Institute - Expert Level
McAfee Institute Inc. provides certification in the areas of cyber investigations, law enforcement, loss prevention, fraud investigations, deception detection, and leadership. The McAfee Institute has partnered with the Dept of Homeland Securities National Initiative for Cybersecurity Careers and Studies (NICCS) and is listed on their site as a provider of professional certifications in this space. The company was one of the 101 Chicago’s Best & Brightest companies to work for in 2014. On the list of Inc. 500 Fastest Growing Companies, McAfee Institute was ranked 34th overall – 1st in education and 1st in Illinois – in the year 2013 and was ranked 213th overall, 5th in education, and 10th in Illinois in the year 2014.
Certified Social Media Intelligence Expert (CSMIE) - McAfee Institute
McAfee Institute Inc. provides certification in the areas of cyber investigations, law enforcement, loss prevention, fraud investigations, deception detection, and leadership. The McAfee Institute has partnered with the Dept of Homeland Securities National Initiative for Cybersecurity Careers and Studies (NICCS) and is one of the most respected and influential leaders and resources for professionals in the loss prevention, law enforcement, and intelligence industries. This unique program is unmatched in the industry and delivers the most concise and up-to-date social media intelligence and investigations training that provide the real-world knowledge and expertise needed to effectively conduct online investigations.
Certified Cyber Threat Analyst (CCTA) - McAfee Institute
A Cyber Counterintelligence Analyst works at all levels of the federal government which include FBI, NSA, CIA, USS, DOD, and DEA. CCTA's also work at large multi-national corporations as well protecting organisatons from the theft of proprietary information, trade secrets, assets, merchandise, customer information and more. Those completing this certification will not only have the ability to track down cyber criminals and glean intelligence from the cyber landscape but they will also become known as an industry expert in conducting quick and effective cyber counterintelligence investigations.
Advanced Diploma of Integrated Risk Management
Diploma of Database Design and Development
Advanced Diploma of Public Safety (Community Safety)
UNSW Global Pty. Ltd - Expert Witness Training Certificate
Diploma of Website Development
Graduate Certificate in Digital Education