Courses

A+ Core 1: Mobile Devices
This A+ Core 1: Mobile Devices course covers laptop hardware and display components, mobile device accessories, ports, connectivity and application.

Ethical Hacking: System Hacking Phases and Attack Techniques
This Penetration Testing and Ethical Hacking course covers System Hacking Phases and Attack Techniques which includes vulnerability analysis, system hacking, and malware threats.

Ethical Hacking: Cryptography
This Penetration Testing and Ethical Hacking course covers Cryptography.

Ethical Hacking: Cloud Computing
This Penetration Testing and Ethical Hacking course covers Cloud Computing.

Ethical Hacking: Mobile Platform, IoT, and OT Hacking
This Penetration Testing and Ethical Hacking course covers Mobile Platform, IoT, and OT Hacking.

Ethical Hacking: Wireless Network Hacking
This Penetration Testing and Ethical Hacking course covers Wireless Network Hacking.
I help businesses secure their networks and offer a comprehensive approach to their IT posture. I have over 16 years of experience working with small and medium businesses and have worked with clients at the local, state, and federal level. Security is one of the key building blocks to any organization and with that approach I help businesses protect their networks against today’s cyber threats.
