BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Geauga Growth Partnership, Inc. - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Geauga Growth Partnership, Inc.
X-ORIGINAL-URL:https://geaugagrowthpartnership.com
X-WR-CALDESC:Events for Geauga Growth Partnership, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260226T170000
DTSTAMP:20260417T130651
CREATED:20260319T191340Z
LAST-MODIFIED:20260320T145447Z
UID:9008-1771837200-1772125200@geaugagrowthpartnership.com
SUMMARY:C)ISRM: Information Systems Risk Manager
DESCRIPTION:Description\nIn this course\, you will first learn to assess a system\, then implement risk controls. Finally\, you will be able to monitor and maintain risk procedures. With this training\, you will be able to identify risks associated with specific industries. After course completion\, you will be able to design\, implement\, monitor and maintain risk-based\, efficient and effective IS controls. \n \nObjectives\nUpon successful completion of this course\, students will be prepared to: \n\nPass the C)ISRM exam\n\n \nPre-Requisites\nC)SP \n \nCourse Details\nBrand: Mile2\nExam: Mile2 C)ISRM\nCEU Credits: 2.8\nCourse Hours: 28\nNumber of Days: 4\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cisrm-information-systems-risk-manager/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260227T170000
DTSTAMP:20260417T130651
CREATED:20260319T211309Z
LAST-MODIFIED:20260320T150335Z
UID:9012-1771837200-1772211600@geaugagrowthpartnership.com
SUMMARY:C)PTE: Penetration Testing Engineer
DESCRIPTION:Description\nIn this course you will cover 5 Key Elements of Pen Testing; Information Gathering\, Scanning\, Enumeration\, Exploitation and Reporting. Plus\, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally\, you will learn more about the business skills needed to identify protection opportunities\, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. \n \nObjectives\nUpon successful completion of this course\, students will: \n\nHave solid knowledge of testing and reporting procedures which will prepare them for upper management roles within a cybersecurity system\nBe able to competently take the C)PTE exam\n\n \nPre-Requisites\n\nC)PEH or equivalent knowledge\n12 months of Networking Experience\nSound Knowledge of TCP/IP\nBasic Knowledge of Linux\nMicrosoft Security experience\n\n \nCourse Details\nBrand: Mile2\nExam: Mile2 C)PTE\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cpte-penetration-testing-engineer-4/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260227T170000
DTSTAMP:20260417T130651
CREATED:20260320T125027Z
LAST-MODIFIED:20260413T152834Z
UID:9000-1771837200-1772211600@geaugagrowthpartnership.com
SUMMARY:CompTIA: Security+
DESCRIPTION:Description\nIf you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination\, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of IT security. Today’s job market demands individuals with demonstrable skills\, and the information and activities in this course can help you build your cybersecurity skill set so that you can confidently perform your duties in any entry-level security role. \n  \nObjectives\nUpon successful completion of this course\, students will be able to: \n\nSummarize fundamental security concepts.\nCompare threat types.\nExplain appropriate cryptographic solutions.\nImplement identity and access management.\nSecure enterprise network architecture.\nSecure cloud network architecture.\nExplain resiliency and site security concepts.\nExplain vulnerability management.\nEvaluate network security capabilities.\nAssess endpoint security capabilities.\nEnhance application security capabilities.\nExplain incident response and monitoring concepts.\nAnalyze indicators of malicious activity\nSummarize security governance concepts.\nExplain risk management processes.\nSummarize data protection and compliance concepts\n\n  \nPre-Requisites\nTo ensure your success in this course\, you should have a minimum of two years of experience in IT administration with a focus on security\, hands-on experience with technical information security\, and a broad knowledge of security concepts. CompTIA A+ and CompTIA Network+\, or the equivalent knowledge\, is strongly recommended. \n\n\n                \n                        \n                            Virtual - CompTIA: Security+\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								04/13/2026 - 04/17/2026 | 09:00 AM - 05:00 PM\n							\n								\n								05/11/2026 - 05/15/2026 | 09:00 AM - 05:00 PM\n							\n								\n								06/22/2026 - 06/26/2026 | 09:00 AM - 05:00 PM\n							\n								\n								07/20/2026 - 07/24/2026 | 09:00 AM - 05:00 PM\n							\n								\n								09/14/2026 - 09/18/2026 | 09:00 AM - 05:00 PM\n							\n								\n								11/02/2026 - 11/06/2026 | 09:00 AM - 05:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: CompTIA\nExam: CompTIA Security+\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/comptia-security/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260227T170000
DTSTAMP:20260417T130651
CREATED:20260320T131039Z
LAST-MODIFIED:20260406T160422Z
UID:8990-1771837200-1772211600@geaugagrowthpartnership.com
SUMMARY:CyberSec First Responder (CFR)
DESCRIPTION:Description\nThis course covers network defense and incident response methods\, tactics\, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide)\, US-CERT’s National Cyber Incident Response Plan (NCIRP)\, and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks\, and for executing standardized responses to such incidents. The course introduces tools\, tactics\, and procedures to manage cybersecurity risks\, identify various types of common threats\, evaluate the organization’s security\, collect and analyze cybersecurity intelligence\, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. \n  \nPre-Requisites\nTo ensure your success in this course\, you should meet the following requirements: \n\nAt least two years (recommended) of experience or education in computer network security technology or a related field.\nThe ability or curiosity to recognize information security vulnerabilities and threats in the context of risk management.\nFoundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include\, but are not limited to\, firewalls\, intrusion prevention systems\, and VPNs.\nGeneral knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include\, but are not limited to\, basic authentication and authorization\, resource permissions\, and anti-malware mechanisms.\nFoundation-level skills with some of the common operating systems for computing environments.\nEntry-level understanding of some of the common concepts for network environments\, such as routing and switching.\nGeneral or practical knowledge of major TCP/IP networking protocols\, including\, but not limited to\, TCP\, IP\, UDP\, DNS\, HTTP\, ARP\, ICMP\, and DHCP.\n\n\n                \n                        \n                            Virtual - CyberSec First Responder (CFR)\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								04/06/2026 - 04/10/2026 | 09:00 AM - 05:00 PM\n							\n								\n								05/11/2026 - 05/15/2026 | 09:00 AM - 05:00 PM\n							\n								\n								06/15/2026 - 06/19/2026 | 09:00 AM - 05:00 PM\n							\n								\n								07/10/2026 - 07/14/2026 | 09:00 AM - 05:00 PM\n							\n								\n								08/24/2026 - 08/28/2026 | 09:00 AM - 05:00 PM\n							\n								\n								09/07/2026 - 09/11/2026 | 09:00 AM - 05:00 PM\n							\n								\n								10/05/2026 - 10/09/2026 | 09:00 AM - 05:00 PM\n							\n								\n								11/30/2026 - 12/04/2026 | 09:00 AM - 05:00 PM\n							\n								\n								01/04/2027 - 01/08/2027 | 09:00 AM - 05:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: CertNexus\nExam: CFR\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cybersec-first-responder-cfr/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T100000
DTEND;TZID=America/New_York:20260227T180000
DTSTAMP:20260417T130651
CREATED:20260320T140509Z
LAST-MODIFIED:20260413T160110Z
UID:9016-1771840800-1772215200@geaugagrowthpartnership.com
SUMMARY:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
DESCRIPTION:Description\nDefining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Lab outline Use NSM Tools to Analyze Data Categories Explore Cryptographic Technologies Explore TCP/IP Attacks Explore Endpoint Security Investigate Hacker Methodology Hunt Malicious Traffic Correlate Event Logs\, Packet Captures (PCAPs)\, and Alerts of an Attack Investigate Browser-Based Attacks Analyze Suspicious Domain Name System (DNS) Activity Explore Security Data for Analysis Investigate Suspicious Activity Using Security Onion Investigate Advanced Persistent Threats Explore SOC Playbooks Explore the Windows Operating System Explore the Linux Operating System. \n  \nObjectives\nAfter taking this course\, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst?s perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations\, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. \n  \nPre-Requisites\nBefore taking this course\, you should have the following knowledge and skills: Familiarity with Ethernet and TCP/IP networking Working knowledge of the Windows and Linux operating systems Familiarity with the basics of networking security concepts The following Cisco course can help you gain the knowledge you need to prepare for this course: Implementing and Administering Cisco Solutions (CCN). \n\n                \n                        \n                            Virtual - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								04/20/2026 - 04/24/2026 | 10:00 AM - 06:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: Cisco\nExam: CBROPS\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
END:VCALENDAR