
Courses

Ethical Hacking: Mobile Platform, IoT, and OT Hacking
This Penetration Testing and Ethical Hacking course covers Mobile Platform, IoT, and OT Hacking.

Ethical Hacking: Wireless Network Hacking
This Penetration Testing and Ethical Hacking course covers Wireless Network Hacking.

Ethical Hacking: Web Application Hacking
This Penetration Testing and Ethical Hacking course covers Web Application Hacking which includes hacking web servers, hacking web applications, and SQL injection.

Ethical Hacking: Network and Perimeter Hacking
This Penetration Testing and Ethical Hacking course covers Network and Perimeter Hacking which includes sniffing, social engineering, denial-of-service, session hijacking, and evading IDS, firewalls, and honeypots.

Ethical Hacking: Reconnaissance Techniques
This Penetration Testing and Ethical Hacking course covers Reconnaissance Techniques including footprinting and reconnaissance, scanning networks and enumeration.

Ethical Hacking: Introduction to Ethical Hacking
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This breif course introduces the skills needed to prepare for related certification exams so you can prove your capabilities.

Ethical Hacking Course & Training
Our ethical hacking course and training seeks to assess the strength of your organization’s cybersecurity posture, whereby you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This ethical hacking course will give you those skills and prepare you for related certification exams so you can prove your capabilities.

CompTIA A+ Certification Training (220-1102)

CompTIA A+ Certification Course & Training
The CompTIA A+ certification reinforces and enhances your knowledge of everyday technology, hardware, and software in the workplace. This certification consists of two exams which are necessary to achieve the A+ certification. Core 1 focuses primarily on the hardware side of A+: configuring peripheral devices, repairing devices, and other elements that provide critical IT support. Core 2 focuses on the software side of A+: operating system support,
I help businesses secure their networks and offer a comprehensive approach to their IT posture. I have over 16 years of experience working with small and medium businesses and have worked with clients at the local, state, and federal level. Security is one of the key building blocks to any organization and with that approach I help businesses protect their networks against today’s cyber threats.