• MSc Dissertation - Project management methodologies in mobile technology.

  • BSc Degree project - Microcomputer-based Capital Market System (CMS).

  • An analytic model concurrent transaction in a microcomputer-based system.

  • BI- Annual publication, of the computer technical committee of Nigerian Insurance Association, Nigeria Number 2 Sept. 2000 / 2001 on web authoring tools, securing the web / protecting web, Java security issues.

  • Diversities of Research Projects on Software Re-engineering and Application, Support & Networking wireless (Radio and Fiber optic cable transmission system microwave), cache server, IP networking, and Implementation .

  • Space communication systems – E-commerce, Internet Banking (Consultant)

  • Comprehensive Implementation on complete Insurance Business Application Software (CIBAS) which include both life, Non-life, Group life & pension, life valuation policy status, report analysis, life Route list, collection history, life policy holders Birthdays, policy listing >=100, 000 AND <=500,000, Death report list, Branch production listing, Accident policy renewal list, pension renewal list, policy schedule, production summary, Direct debit mandate (DDM), critical report, policy status (workmen compensation list), policy holders statement of account, investment linked valuation (lapse with credit), life Agency Commission.

  • Complete accounting System and Personnel Record system

  • X-Base Language methods on (NIA Nigeria)

  • Internet as Education Infrastructure

  • Tele – Education, Health Information, Tele-Medicine, and Deployment and Tele mailed system

  • Midsize – Enterprise IT strategy scenario

  • Web Best Practices: hearing from the Best of the Best

  • Supply chain management: Impact of E-Business on strategy & Business relationship.

  • Computerization processes of banks through the implementation of on-line, Real-time, state -of –the art, computer system

  • linking the bank branches to a wide area network (WAN) and E-banking.

  • Wireless Internet Access technology solutions

  • Analytic research development on capital market transaction

  • Pay roll & personnel system (comprehensive package implementation, net pay listing, Bank payment listing, cheque payment listing, tax tabulation report, pay advice, Exception report, emolument analysis report, Deduction analysis report.

  • Effective control of data encryption on wireless ad hoc Network performance.

  • High level holistic and reconfigurable transport layer protocol.

  • Adaptive fault tolerant routing in Star Graph.

  • IT Security snapshot varied open source platforms.

  • Esoteric IT Security Functions – 8 events encomium structures

  • Authentication Protocols – Kerberos, RADIUS, TACACS+, IP-Sec, L2F, L2TP, PPTP, SSH, SSL

  • Ensuring e-security using a private key cryptographic system

  • E-commerce security : vulnerability of a mobile payment system

  • An Architecture of an Intrusion detection system (IDS) & Intrusion prevention system (IPS)

  • Impact /cross examining RAID/Clustering/critical and high availability Technology

  • Heuristic based scheduling to maximize throughput of data intensive Grid Technology

  • Internet Security : Risk Analysis, Strategy and Firewalls

  • Public key Digital Signature Algorithm

  • Cross examining the proximity of IT Infrastructure: IT Security in a clustered environment.

  • IT Security lifecycle

  • Information Security Policy lifecycle

  • E-Policy guidelines – e-risk management policy, computer security , internet policy, software policy, email policy etc

  • Security & VPN - Network design, configuration, and maintenance and operation

  • IP Sec Regression Testing – AH/ESP

  • IP Sec / IKE VPN Connection

  • Cryptographic Algorithm – Best IT practices management

  • Pseudo Random sequences -stream Ciphers and generators

  • Quantifying the financial impact of IT Security breaches

  • Application of Information Security policies in large based Organization : an exploratory investigation

  • Security Architectures for Network clients

  • An intelligent approach to prevent distributed System

  • E-commerce practices: a Framework for understanding and overcoming the trust barrier.

  • Towards IS maturity criteria: 6 lessons learned from Software maturity criteria

  • The importance of Technology trust in Web Services Server security

  • Best Solution to Business continuity and disaster recovery solution Technology planning

  • IT Business & middle-ware Security Architecture (e.g. ERP, CRM, SAP)

  • Ten Best Defense Physical Security

  • IT & Data Centre operations Security

  • Seven Best Network Security practices

  • Public key cryptography standards (PKCS)

  • Telephone security device (TSD)

  • ISO Authentication framework processes

  • Theory of Block ciphers design – Lucifer, LOKI, IDEA, RC2, SAFER, 3 –WAY, CRAB, RC5, GOST, CAST etc

  • VPN & Virtualized Firewalls Design - Part1-4

  • Cross examining Topologies and their significant to Systems Security

  • RedHat Linux security platform

  • Specifying various Open source Security platforms -LINUX & UNIX/Solaris

  • Building Security into Network

  • Voice Technologies & Security

  • Various Weak authentication and their devices

  • Cryptographic protocols

  • Intrusion Detection and Side Channels Attack

  • Hyper elliptic Network device Security and defense

  • Securing encrypted VPN and Cryptographic tunneling protocols

  • Securing VPN protocols, cross implanting IPSec, SSL, PPTP,L2TP, L2TPV3,VPN-Q

  • VPN Security Dialogs

  • Wireless Security Technology

  • Pros and Cons of Internet Security Technology

  • The PIX Firewall Security

  • How to build Security into Routing Design

  • Security benefits of NAT

  • Business functionality of VPN

  • Multipurpose Firewall Configuration

  • Network security Infrastructure

  • Cluster Server and the best Security

  • Technology trust in Web Services Server Security platforms

  • A cyclic approach to Information & Systems Auditing

  • IT Applications development & privacy methodology

  • Multi-tiered strategy to Intrusion detection

  • Integrated Approach to Information System Security Management (ISSM)

  • FIVE Sigma process to Information Security Levels

  • Information Security management tool box

  • Biometric authentication Information

  • Patch Management Strategy essential?

  • SAN Architecture & Security platforms

  • Physical & Logical Design for Network Infrastructure Security

  • Multi Layered Methods of Securing your Active Directory Services

  • Managing IT Security Projects

  • SAN & Server Security

  • Network Backup Services Technology security

  • Security principles and  monitoring

  • Proximity security controls – smart cards, proximity readers, access abuses, IDS, emanation security

  • Environmental & Physical threats fundamentals

  • Implementing full integration Windows Server 2003 & 2008 Security

  • IT Physical Security requirements 

  • Comparing Multi-Core Processing for Server Security Virtualization

  • Building Trust Chains between Server and the enterprise applications

  • Remote Access Systems & Securing the devices

  • Strategic Challenges in Complex multi-layered Network design

  • Unified Communications & Security entities

  • IT Security budgets & how to implements

  • Active Directory Security and enforcement 

 DBMS Architecture and database warehousing vulnerabilities and threats 

  • Web Architectures Security - cross site scripting, session hijacking and code decompiling

  • Building and Securing Infrastructure components including VPN, IDS, Firewalls, IPS, Internet proxies, authentication Servers

  • Securing the Active directory, GPO’S, LDAP, Exchange, DNS, DHCP site architecture development, WINS, & integrating applications with AD as their source for authentication and authorization

  • Cryptography deployments (DES, Triple DES, SKIP, IKE, ISAKMP, IPSEC, PGP, SSL, and others)

  • Network Firewall Solutions (Raptor, ISS, Checkpoint FW-1, Gauntlet, Cisco PIX/ASA, etc)

  • Enforcing Security layer and tools by applying the Systems life Cycle and Systems development, programming languages and security software protection mechanisms and DBMS controls.

  • Firewall Management system, rule creation and Security evaluation 

  • Security Risk and Auditing  practices

  • Data Networks, Network protocols, Network threats and attacks, content filtering and inspection

  • Forensic investigation requirements and ethics

  • Internet/Extranet Security (Proxy, Firewalls, DMZ, Remote access)

  • Cloud Security Assessment, tools and Strategy

  • Access policy & management

  • Mid-range Security for Small Medium Enterprises (SME)

  • VO-IP Security enforcements

  • Security and Resilience

  • 10 Six Sigma aspects of Information System Security

  • Computer Crime and Securing Advanced IP Security issues

  • Information Security fundamentals and regulations

  • Development of detailed Security Architecture for Servers and workstations and application builds, compiling, releases, deployment

  • LAN/WAN/MAN projects and Firewall Technology multilayered approach to Security

  • Access control systems & methodology

  • Telecommunications Technology and Network Security

  • Best Security management practices approach, preventive cure to vulnerabilities

  • Cryptography and Security Architecture models

  • Website Development - Concept creation, concept generation, client documentation, website authoring.

  • Analytic research development on capital market transaction.

Others:

  • Deploying & implementing UNIX/Red Hat LINUX/SOLARIS 8-10 training, MS Server 2008, MS Win 2003(planning, implementation & maintenance), active directory infrastructure, Win XP workstation, Win 2000 Server & workstation Admin, OO Programming Skills, Shell scripting ,Marketing & promotions, Customer care, Operations research, , Total Quality management skills, Unix & Network Installing & Administration, Data modelling & design, Change management, Project management, Strategic planning, Database methodology, SQL+, Stock/inventory control system, Banking, Insurance, Stock broking, accounting enterprise system solution etc

AFFILIATED RESEARCH ORGANIZATION

  • (a) SOCIETY OF INDUSTRIAL LEADERS

  • (b) FORBES – CEO NETWORK

  • (c) University of Ibadan - Consultancy

  • (d) CLOSE MEMBERSHIP

  • (e) IT RESEARCH PANEL

  • (f) Data Center University by APC – Global Knowledge

  • (g) SUN OPEN SOLARIS for small & medium scale business

  • (h) MICROSOFT – Technical Community

  • (i) Linux on Power @ Peking University #1610

  • (j) Shell Live wire

  • (k) VMware World

  • (l) IT toolbox - Professional IT Community

  • (m) Oracle University

  • (n) Gerson Lerhman Group (Member of the Council of Technology Advisors)

  • (o) Guide-Point Global Advisors

  • (p) KTN-Cyber Security & Digital System(UK)

  • (q) The Chartered Institute for IT British Computer Society (990064310)

  • (r) Institute of Analysts & Programmers (21922)

  • (s) International Association Of Management Technology (1309)

  • (t) Independent Oracle Users Group (IOUG)

  • (u)VMware Partners University

  • (v)RedHat Partners University