Meet the ISC2 Instructor Chun Choi, CISSP, CGRC
Meet ISC2 Instructor Chun Choi, CISSP, CGRC
Chun has over 30 years of working experience in different areas of IT and cybersecurity. He started his career in application development and later broadened himself into areas of IT network design. Network protocols such as OSPF, IS-IS, BGP, DiffServ, etc. are not unfamiliar to him. His non-stop learning attitude keeps him up with the fast pace of technology change. Starting some twenty years ago, he has paved cybersecurity as part of his venture. Capitalizing on what has been learnt and experienced, he always thoughtfully applies and stays in tune with the cutting edge cybersecurity applications such as AI/Deep Learning in modernization of SecOps, and Blockchain and Quantum Computing in encryption.
Chun is a CISSP and CGRC where he academically holds B.Sc.(Eng.) degree of Electrical and Electronics Engineering and a MBA degree. He is now a security solutions architect of a tier 1 service provider in his day time job and also contributes himself as the trainer for cyber certification courses in ISC2. As a technical architect, he needs to understand customer challenges, articulate solution concepts, architect different solutions that may require to follow zero trust principles, and that may also have a secured wide area network capability requirements (SD-WAN and SASE). In particular, advanced security solution and service design for modern threat detection and response capabilities (SIEM and SOAR) in SOC are some of the key discussion areas in his engagement. On the other hand, he is also equipped with privacy information system assessment certification and has many projects experience in organizational security assessment and consultancy based advisory services which includes penetration testing, Red/Purple teaming and methodologies of adopting secure design.
Chun has been a trainer in cybersecurity and technology areas for many years, for he is good at articulating complicated concepts to different levels of people. Learners come from different intellectual backgrounds where they may not have deep technical origins. What Chun envisions in cybersecurity learning such as CISSP is that you could not fully grasp the principles if you do not have a tiny background in application development, networking, and nonetheless cloud computing and AI. That does not mean you need one or more technical degrees to be a practitioner in cybersecurity. More importantly, you need to acquire knowledge from experienced and know-the-details practitioners in order to be able to comprehend and further on your knowledge. This is what Chun believes he can convey. In terms of pedagogy, he believes in visual explanation with real life examples, where it helps learners to understand advanced concepts such as SSL and IPSec, etc.