Stephen Pearson – Faculty Blogger

Author Photo: headshot image of faculty blogger Stephen Pearson

Adjunct Lecturer
Program: MS Cybersecurity

Stephen Pearson combines more than twenty-nine years of law enforcement experience with in-depth expertise in today's most pervasive Internet and computer technologies. During his tenure in federal and civilian law enforcement agencies, Stephen has been involved in all facets of computer crime investigations.

With over 20 years of experience, Stephen has used his technology skills on numerous cases, one of which led to the safe recovery of an abducted child during a joint FBI and Sheriff’s department investigation. Stephen is recognized by the Federal government as an expert witness in DOS file structures and has been consulted on numerous high profile investigations. He developed the ground-breaking Cyber Squire Internet child safety program for the United States Army at Ft Leonard Wood which has become a standard program for the local school system for child Internet safety. He has also implemented Computer Crime and Forensics training for the United States Armed Forces in Iraq and Afghanistan. Stephen has written 6 computer crime books including the Computer Crime Workbook and co-author of the book Digital Triage Forensics: A Battlefield Guide to Digital Forensic Collection (ISBN: 978-1-59749-596-7).

Stephen has been awarded numerous decorations, including the Military Police Corps Order of the Marechaussee (Bronze), the highest peace time Military Police award, for his superior performance and dedication to training excellence.

He holds a Masters of Business Administration and a Bachelor’s degree in Computer Information Science (Magna Cum Laude) and an Associate’s Degree in Administration of Justice and Computer Information Science. He is currently working on a Doctorate of Business Administration from Keiser University. Additionally, Stephen holds the Microsoft Certified System Engineer certificate (+Internet) and is also an Army Master Instructor.

In the cyber security industry, it is a well-known fact that the greatest threat to corporate documents comes from the inside as employees are given access to the internal network. Cyber security professionals have learned from the past, and today the Trojan attack is something most are familiar with and something that is routinely protected against. So hackers have changed the formula slightly. Instead of a program or device sneaking in, now an intruder is legitimately let in by the company. Here are two types of employee intruders to look out for. Read More

Students in application degrees, such as the Master of Science (MS) in Cybersecurity program, tend to forget that the program at its heart is still an academic program. What does this mean? Read More

In academic work, the student is constantly doing homework and looking up information. Many students produce written works based on things that they lookup. Guess what? You have been doing research! Many students hear the word research and think of scientists in a lab working on experiments. This is not always the case. As you progress through your higher education path, here are some ways your work can support your research needs at the next level. Read More