Certifications and Training
(ISC)2 Certified Information Systems Security Professional (CISSP) #662488
Global Information Assurance Certification (SANS)
Scrum Alliance Certified Scrum Master #496674 Scaled Agile Certified SAFe Agilist ITIL Foundation IT Service Mgmt #GR750057279TM American Management Association Essentials of Project Management |
Check out my certifications on Credly
GIAC Certifications Profile
|
Full Certification History
Logo/Badge
|
Description, Date, & Link
|
Certificate
|
SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals
April 2024 SEC595 provides students with a crash-course introduction to practical data science, statistics, probability, machine learning, and AI. The course is structured as a series of short discussions with extensive hands-on labs that help students to develop useful intuitive understandings of how these concepts relate and can be used to solve real-world problems. The best analogy is that we are using an apprenticeship approach to bring you from beginner to journeyman in AI and related fields. If you've never done anything with data science or machine learning but want to use these AI techniques, this is definitely the course for you! 30 Hands-on Labs |
SANS Transformational Cybersecurity Leader
https://www.sans.org/cybersecurity-leadership/triads#coin_recipients March 2023
|
MGT521: Leading Cybersecurity Change: Building a Security-Based Culture
March 2023 Cybersecurity leadership is no longer just about technology. It is ultimately about organizational change - change not only in how people think about cybersecurity but in what they prioritize and how they act, from the Board of Directors to every corner of the organization. Students will learn how to build, manage, and measure a strong cybersecurity culture by leveraging the latest in organizational change models and real-world lessons learned. In addition, students will apply everything they learn through a series of 16 interactive labs and case studies. |
|
SEC540: Cloud Security and SecDevOps Automation
February 2022 Organizations are moving to the cloud to enable digital transformation and reap the benefits of cloud computing. However, security teams struggle to understand the DevOps toolchain and how to introduce security controls in their automated pipelines responsible for delivering changes to cloud-based systems. Without effective pipeline security controls, security teams lose visibility into the changes released into production environments. SEC540 provides security professionals with a methodology to secure modern Cloud and DevOps environments. By embracing the DevOps culture, students will walk away from SEC540 battle-tested and ready to build to their organization's Cloud & DevSecOps Security Program. 35 Unique, Immersive, Hands-On Labs 3 CI/CD security labs 16 AWS focused labs 16 Azure focused labs CloudWars Bonus Challenges |
|
Leading SAFe
March 2021 Leading SAFe® offers you an introduction to the foundations of SAFe, and provides the principles and practices to drive your Lean-Agile transformation with confidence. The course also offers the guidance and tools you need to lead effectively in remote environments with distributed teams. Take a Leading SAFe course to discover how companies can build business agility, and how to make SAFe work inside your organization. You’ll learn how SAFe helps you improve quality, productivity, employee engagement, and time-to-market. You’ll come away with an understanding of how to align your entire organization around the same clear objectives, and how to improve the flow of value and work from strategy to delivery. You’ll learn what makes companies more customer-centric and how to run key SAFe alignment and planning events, like PI planning. |
|
MGT514: Security Strategic Planning, Policy, and Leadership
February 2019 The next generation of security leadership must bridge the gap between security staff and senior leadership by strategically planning how to build and run effective security programs. Yet, creating a security strategy, executing a plan that includes sound policy coupled with top-notch leadership is hard for IT and security professionals because we spend so much time responding and reacting. We almost never do strategic planning until we get promoted to a senior position, and then we are not equipped with the skills we need to run with the pack. This information security course will provide you with the tools to build a cybersecurity strategic plan, an entire IT security policy, and lead your teams in the execution of your plan and policy. |
|
MGT512: Security Leadership Essentials for Managers
March 2019 Security leaders need both technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. This course empowers you to become an effective security leader and get up to speed quickly on information security issues and terminology. You won't just learn about security, you will learn how to lead security teams and manage programs by playing through twenty-three Cyber42 activities throughout the class, approximately 60-80 minutes daily. |
ACP-100 Jira Administration for Data Center and Server Certification
August 2018 A Certification in Jira Administration for Data Center and Server (ACP-JA) showcases those who:
|
|
About Certified Information Systems Security Professional Certification
April 2018 Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities. |
|
MGT414: SANS Training Program for the CISSP Certification
February 2018 MGT414: SANS Training Program for CISSP Certification is an accelerated review course designed to prepare you to pass the exam. The course prepares students to navigate all types of questions included on the new version of the exam. |
|
The GIAC Advisory Board is made up of GIAC certified professionals who wish to give back to the security community by taking an active role in the GIAC program. The GIAC Advisory Board provides a forum where IT Security professionals can exchange ideas and advice.
|
Certified Scrum Master
February 2016 A scrum master is the scrum team member tasked with fostering an effective and productive working environment and guiding others to understand scrum values, principles and practices. Scrum masters tend to be people-oriented, have a high level of emotional intelligence, and find joy in helping team members to grow. |
|
SEC575: Mobile Device Security and Ethical Hacking
May 2014 SEC575 will prepare you to effectively evaluate the security of mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. You will learn how to pen test the biggest attack surface in your organization; dive deep into evaluating mobile apps and operating systems and their associated infrastructure; and better defend your organization against the onslaught of mobile device attacks. |
Essentials of Project Management for the Non-Project Manager
June 2013 To work together effectively on any project, everyone on the team needs to use a common language and have a clear understanding of all expectations. This unique project manager training seminar is designed for individuals with little or no prior knowledge of project management who serve on project management teams, those who simply want to know more about PM or those who are making the transition to project management. In just two days, you’ll develop an understanding of essential terminology and apply basic PM tools and techniques to increase your effectiveness both on the team and in your own functional area. |
ITIL 4 Foundation - IT Service Management Certification
May 2013 ITIL 4 Foundation is for anyone who needs to understand the key concepts of IT and digital service delivery, and who is interested in helping their organization embrace the new service management culture. It is for professionals at the start of their ITIL 4 journey or people looking to update their existing ITIL knowledge. |
SEC546: IPv6 Essentials
April 2011 The course covers various security technologies like firewalls and Intrusion Detection and Prevention Systems (IDS/IPS). It also addresses the challenges in adequately configuring these systems and makes suggestions as to how apply existing best practices to IPv6. Upcoming IPv6 attacks are discussed using tools like the THC IPv6 attack suite and others as an example. |