Certifications & Credentials
Professional certifications, completed training, and active study paths in cybersecurity and IT infrastructure.
CISSP
The gold standard in cybersecurity certification covering eight CISSP domains: Security & Risk Management, Asset Security, Security Architecture, Network Security, Identity & Access Management, Security Assessment, Security Operations, and Software Development Security.
- 8-domain framework covering enterprise security architecture
- Risk management, GRC, and policy development
- Cryptography, IAM, and network security
- Incident response and security operations
Security+
Industry-standard baseline certification validating core cybersecurity skills including threat detection, risk management, incident response, and security architecture.
- Threats, attacks, and vulnerabilities
- Security architecture and design
- Implementation of secure protocols and controls
- Governance, risk, and compliance
Network+
Validates the core networking skills required of IT professionals — covering infrastructure, operations, security, and troubleshooting.
- Network architecture and topology design
- Network operations and troubleshooting
- Network security fundamentals
- Cloud and virtualization networking
A+
Foundation-level certification covering hardware, operating systems, networking, and troubleshooting across Windows, macOS, and Linux environments.
- Hardware installation, configuration, and maintenance
- OS installation and cross-platform support
- Network connectivity and security fundamentals
- Operational procedures and troubleshooting
Cyber Security 101
Comprehensive learning path covering foundational and intermediate cybersecurity skills across offensive and defensive domains.
- Computer networking and cryptography fundamentals
- Linux, Windows, and Active Directory basics
- Offensive security techniques and tooling
- Defensive security and SOC fundamentals
NIST Risk Management Framework
Implementation of the NIST RMF across the full lifecycle — categorize, select, implement, assess, authorize, and monitor.
SOC 2 Compliance Essential Training
Trust Service Criteria, audit preparation, control design, and evidence collection for SOC 2 Type I and Type II engagements.
Threat Modeling: DoS & Expansion of Authority
STRIDE-based threat modeling focused on denial of service and privilege escalation threat categories.
Threat Modeling: Tampering in Depth
Advanced threat modeling techniques covering data and system tampering, integrity controls, and countermeasures.
MDR Fundamentals
MDR program architecture, vendor evaluation, SOC integration, and threat detection workflows.
IT & Cybersecurity Risk Management
Risk identification, analysis, treatment, and monitoring across IT and cybersecurity domains.
Complete Guide to IAM for Network Engineers
Identity and access management architecture, directory services, SSO, MFA, and zero-trust principles for network practitioners.
Microsoft 365: Administration
M365 tenant management, Exchange Online, Teams, SharePoint, compliance center, and identity administration.
Mitigating Cybersecurity Vulnerabilities
Vulnerability management lifecycle, prioritization frameworks, patch management strategy, and compensating controls.
Active practitioner on TryHackMe working through offensive and defensive security learning paths — covering penetration testing methodology, network security, web application attacks, SOC fundamentals, and threat hunting.