Current Certifications From Our Staff & Mentors

Global Information Assurance Certification

Certified Intrusion Analyst (GCIA)

The GIAC Intrusion Analyst certification validates a practitioner's knowledge of network and host monitoring, traffic analysis, and intrusion detection. GCIA certification holders have the skills needed to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.

Areas covered in this certification include Fundamentals of Traffic Analysis and Application Protocols, Open-Source Intrusion Detection Systems (IDS), and Network Traffic Forensics and Monitoring.

Learn More >

Certification & Conformity


CMMC stands for “Cybersecurity Maturity Model Certification” and is a unifying standard for the implementation of cybersecurity across the Defense Industrial Base (DIB). The CMMC framework includes a comprehensive and scalable certification element to verify the implementation of processes and practices associated with the achievement of a cybersecurity maturity level.

CMMC is designed to provide increased assurance to the Department that a DIB company can adequately protect sensitive unclassified information, accounting for information flow down to subcontractors in a multi-tier supply chain.

Learn More >


Certified Educator Level 1

  • How technology can benefit teaching and learning
  • Why and how technology can support the work you currently do
  • How you can use technology to prepare for the future
  • What tools are available in the Google Workspace for Education Fundamentals
  • How to pick the right tool for your objective
  • How you can help your students behave responsibly online.

Successfully integrating technology into the classroom doesn’t just happen - it takes careful planning and preparation. Knowing why it’s important and what tools are available are solid first steps. Start with what you already do well in your class, then see where technology may be able to help you. This unit will help you get started.

Learn More >


Certified Educator Level 2

  • The importance of support
  • Types of support models
  • How to choose a support model
  • How to use curation and sharing tools
  • How to use Drive as a lesson repository
  • How to use tutorials and webinars

Teachers need support and recognition to successfully integrate technology into their classrooms. While schools might provide varying levels of support, teachers can do a good deal of professional learning on their own.

Learn More >


Certified Trainer

Google for Education Certified Trainers are education professionals who help other teachers effectively incorporate technology into their classrooms.

Being a Google Certified Trainer allows one to build leadership, training, and teaching skills, all while mastering the resources Google provides.

Learn More >


Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system.

Ethical hackers are employed by organizations to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities

Learn More >

Ethical hackers are employed by organizations to penetrate :p

The International Information System Security Certification Consortium (ISC)²

Certified Information System Security Professional (CISSP)

CISSP was created to demonstrate that a security professional is able to design, engineer, implement, and run an information security program.

CISSP is one of the most sought after professional certifications available in the security industry.

Learn More >

The International Information System Security Certification Consortium (ISC)²

Certified Information System Security Architect Professional (CISSP-ISSAP)

CISSP-ISSAP is a concentration of the CISSP certification. This security architect certification proves ones expertise in developing, designing and analyzing security solutions.

These specialized credentials build upon the CISSP certification. CISSP concentrations are optional pursuits that prove one's subject matter mastery, and they are used to highlight one's evolving expertise in Information Security.

Learn More >

The International Information System Security Certification Consortium (ISC)²

Certified Authorization Professional (CAP)

The CAP certification shows ones advanced technical skills and knowledge to understand Governance, Risk and Compliance (GRC) and can authorize and maintain information systems utilizing various risk management frameworks, as well as best practices, policies and procedures.

CAP is the only certification that maps to the NIST Risk Management Framework.

Learn More >

Information System Audit and Control Association (ISACA)

Certified Information Security Manager (CISM)

ISACA's Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management.

Learn More >

Project Management Institute (PMI)

Project Management Professional (PMP)

The Project Management Professional (PMP) is the world's leading project management certification. PMP provides project leadership experience and expertise

Project Management Professional certification is the top project management certification in North America because it demonstrates ones specific skills employers seek, dedication to excellence and the capacity to perform at the highest level.

Learn More >

Commercial & Industrial Security Corporation (CISCO)

Cisco Certifications

  • Cisco Certified Network Associate (CCNA)
  • Cisco Certified Design Associate (CCDA)
  • Cisco Certified Entry Networking technician
  • Cisco Certified Network Associate Routing and Switching
  • Cisco Certified Network Associate Security

Learn More >

Microsoft Corporation

Microsoft Certifications

  • Microsoft Certified Systems Engineer & Solutions Expert
  • Microsoft Certified IT Professional
  • Microsoft Certified Solutions Associate & Architect
  • Microsoft Certified Systems Administrator
  • Microsoft Certified Technology Specialist & Professional

Learn More >


Information Technology Infrastructure Library (ITIL) Certified

ITIL 4 Foundation introduces an end-to-end operating model for the creation, delivery, and continual improvement of technology-enabled products and services.

ITIL is for anyone who needs to understand the key concepts of IT and digital service delivery, and for those who are interested in helping their organization embrace the new service management culture.

Learn More >

The Computing Technology Industry Association (CompTIA)

CompTIA Certifications

  • CompTIA Security + CE
  • CompTIA A+ Hardware & Software
  • CompTIA Network +

CompTIA is an American non-profit trade association, issuing professional certifications for the Information Technology industry.

CompTIA is considered one of the IT industry's top trade associations.

Learn More >


Apple Certified Help Desk and Support & OSX Server

Apple Help Desk and Support Certification covers the tools, services, and best practices used by a help desk professional, technical coordinator, or service provider for an organization's Mac, iPhone, and iPad users.

Certification verifies an understanding of MacOS X core functionality and the ability to configure key services, perform basic troubleshooting, and assist end users with essential Mac OS X capabilities.

Learn More >

Amazon Web Services (AWS)

Amazon Web Service Solutions Architect

This credential helps organizations identify and develop talent with critical skills for implementing cloud initiatives. Earning AWS Certified Solutions Architect - Associate validates the ability to design and implement distributed systems on AWS

Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud platform offering over 200 fully featured services from data centers globally.

Learn More >