
Courses

A+ Core 2: Operational Procedures
In this course, you will learn about documentation and support management, communication and professionalism, and scripting basics.

A+ Core 2: Software Troubleshooting
In this course, you will learn about Windows OS problems, malware removal, and mobile OS issues.

A+ Core 2: Security
In this course, you will learn about malware, social engineering and basic Windows OS security.

A+ Core 2: Operating Systems
In this course, you will learn about the Windows control panel, Windows settings, and Windows networking.

A+ Core 1: Hardware and Network Troubleshooting
This A+ Core 1: Hardware and Network Troubleshooting course will cover motherboard, RAM, CPU, and power problems, mobile devices, and printers.

A+ Core 1: Virtualization and Cloud Computing
In this A+ Core 1: Virtualization and Cloud Computing course you will learn about cloud computing concepts and client-side virtualization.

A+ Core 1: Hardware
This A+ Core 1: Hardware course will cover basic cable types, storage devices, and printers and multifunction devices.

A+ Core 1: Networking
This A+ Core 1: Networking Technology course will cover common networking hardware, wireless standards, and common network configuration concepts.

A+ Core 1: Mobile Devices
This A+ Core 1: Mobile Devices course covers laptop hardware and display components, mobile device accessories, ports, connectivity and application.

Ethical Hacking: System Hacking Phases and Attack Techniques
This Penetration Testing and Ethical Hacking course covers System Hacking Phases and Attack Techniques which includes vulnerability analysis, system hacking, and malware threats.
I help businesses secure their networks and offer a comprehensive approach to their IT posture. I have over 16 years of experience working with small and medium businesses and have worked with clients at the local, state, and federal level. Security is one of the key building blocks to any organization and with that approach I help businesses protect their networks against today’s cyber threats.