BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Geauga Growth Partnership, Inc. - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Geauga Growth Partnership, Inc.
X-ORIGINAL-URL:https://geaugagrowthpartnership.com
X-WR-CALDESC:Events for Geauga Growth Partnership, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260226T170000
DTSTAMP:20260417T130621
CREATED:20260319T191340Z
LAST-MODIFIED:20260320T145447Z
UID:9008-1771837200-1772125200@geaugagrowthpartnership.com
SUMMARY:C)ISRM: Information Systems Risk Manager
DESCRIPTION:Description\nIn this course\, you will first learn to assess a system\, then implement risk controls. Finally\, you will be able to monitor and maintain risk procedures. With this training\, you will be able to identify risks associated with specific industries. After course completion\, you will be able to design\, implement\, monitor and maintain risk-based\, efficient and effective IS controls. \n \nObjectives\nUpon successful completion of this course\, students will be prepared to: \n\nPass the C)ISRM exam\n\n \nPre-Requisites\nC)SP \n \nCourse Details\nBrand: Mile2\nExam: Mile2 C)ISRM\nCEU Credits: 2.8\nCourse Hours: 28\nNumber of Days: 4\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cisrm-information-systems-risk-manager/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260227T170000
DTSTAMP:20260417T130621
CREATED:20260319T211309Z
LAST-MODIFIED:20260320T150335Z
UID:9012-1771837200-1772211600@geaugagrowthpartnership.com
SUMMARY:C)PTE: Penetration Testing Engineer
DESCRIPTION:Description\nIn this course you will cover 5 Key Elements of Pen Testing; Information Gathering\, Scanning\, Enumeration\, Exploitation and Reporting. Plus\, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Additionally\, you will learn more about the business skills needed to identify protection opportunities\, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. \n \nObjectives\nUpon successful completion of this course\, students will: \n\nHave solid knowledge of testing and reporting procedures which will prepare them for upper management roles within a cybersecurity system\nBe able to competently take the C)PTE exam\n\n \nPre-Requisites\n\nC)PEH or equivalent knowledge\n12 months of Networking Experience\nSound Knowledge of TCP/IP\nBasic Knowledge of Linux\nMicrosoft Security experience\n\n \nCourse Details\nBrand: Mile2\nExam: Mile2 C)PTE\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cpte-penetration-testing-engineer-4/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260227T170000
DTSTAMP:20260417T130621
CREATED:20260320T125027Z
LAST-MODIFIED:20260413T152834Z
UID:9000-1771837200-1772211600@geaugagrowthpartnership.com
SUMMARY:CompTIA: Security+
DESCRIPTION:Description\nIf you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination\, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of IT security. Today’s job market demands individuals with demonstrable skills\, and the information and activities in this course can help you build your cybersecurity skill set so that you can confidently perform your duties in any entry-level security role. \n  \nObjectives\nUpon successful completion of this course\, students will be able to: \n\nSummarize fundamental security concepts.\nCompare threat types.\nExplain appropriate cryptographic solutions.\nImplement identity and access management.\nSecure enterprise network architecture.\nSecure cloud network architecture.\nExplain resiliency and site security concepts.\nExplain vulnerability management.\nEvaluate network security capabilities.\nAssess endpoint security capabilities.\nEnhance application security capabilities.\nExplain incident response and monitoring concepts.\nAnalyze indicators of malicious activity\nSummarize security governance concepts.\nExplain risk management processes.\nSummarize data protection and compliance concepts\n\n  \nPre-Requisites\nTo ensure your success in this course\, you should have a minimum of two years of experience in IT administration with a focus on security\, hands-on experience with technical information security\, and a broad knowledge of security concepts. CompTIA A+ and CompTIA Network+\, or the equivalent knowledge\, is strongly recommended. \n\n\n                \n                        \n                            Virtual - CompTIA: Security+\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								04/13/2026 - 04/17/2026 | 09:00 AM - 05:00 PM\n							\n								\n								05/11/2026 - 05/15/2026 | 09:00 AM - 05:00 PM\n							\n								\n								06/22/2026 - 06/26/2026 | 09:00 AM - 05:00 PM\n							\n								\n								07/20/2026 - 07/24/2026 | 09:00 AM - 05:00 PM\n							\n								\n								09/14/2026 - 09/18/2026 | 09:00 AM - 05:00 PM\n							\n								\n								11/02/2026 - 11/06/2026 | 09:00 AM - 05:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: CompTIA\nExam: CompTIA Security+\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/comptia-security/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T090000
DTEND;TZID=America/New_York:20260227T170000
DTSTAMP:20260417T130621
CREATED:20260320T131039Z
LAST-MODIFIED:20260406T160422Z
UID:8990-1771837200-1772211600@geaugagrowthpartnership.com
SUMMARY:CyberSec First Responder (CFR)
DESCRIPTION:Description\nThis course covers network defense and incident response methods\, tactics\, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide)\, US-CERT’s National Cyber Incident Response Plan (NCIRP)\, and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks\, and for executing standardized responses to such incidents. The course introduces tools\, tactics\, and procedures to manage cybersecurity risks\, identify various types of common threats\, evaluate the organization’s security\, collect and analyze cybersecurity intelligence\, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. \n  \nPre-Requisites\nTo ensure your success in this course\, you should meet the following requirements: \n\nAt least two years (recommended) of experience or education in computer network security technology or a related field.\nThe ability or curiosity to recognize information security vulnerabilities and threats in the context of risk management.\nFoundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include\, but are not limited to\, firewalls\, intrusion prevention systems\, and VPNs.\nGeneral knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include\, but are not limited to\, basic authentication and authorization\, resource permissions\, and anti-malware mechanisms.\nFoundation-level skills with some of the common operating systems for computing environments.\nEntry-level understanding of some of the common concepts for network environments\, such as routing and switching.\nGeneral or practical knowledge of major TCP/IP networking protocols\, including\, but not limited to\, TCP\, IP\, UDP\, DNS\, HTTP\, ARP\, ICMP\, and DHCP.\n\n\n                \n                        \n                            Virtual - CyberSec First Responder (CFR)\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								04/06/2026 - 04/10/2026 | 09:00 AM - 05:00 PM\n							\n								\n								05/11/2026 - 05/15/2026 | 09:00 AM - 05:00 PM\n							\n								\n								06/15/2026 - 06/19/2026 | 09:00 AM - 05:00 PM\n							\n								\n								07/10/2026 - 07/14/2026 | 09:00 AM - 05:00 PM\n							\n								\n								08/24/2026 - 08/28/2026 | 09:00 AM - 05:00 PM\n							\n								\n								09/07/2026 - 09/11/2026 | 09:00 AM - 05:00 PM\n							\n								\n								10/05/2026 - 10/09/2026 | 09:00 AM - 05:00 PM\n							\n								\n								11/30/2026 - 12/04/2026 | 09:00 AM - 05:00 PM\n							\n								\n								01/04/2027 - 01/08/2027 | 09:00 AM - 05:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: CertNexus\nExam: CFR\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cybersec-first-responder-cfr/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260223T100000
DTEND;TZID=America/New_York:20260227T180000
DTSTAMP:20260417T130621
CREATED:20260320T140509Z
LAST-MODIFIED:20260413T160110Z
UID:9016-1771840800-1772215200@geaugagrowthpartnership.com
SUMMARY:Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
DESCRIPTION:Description\nDefining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies Understanding Incident Analysis in a Threat-Centric SOC Identifying Resources for Hunting Cyber Threats Understanding Event Correlation and Normalization Identifying Common Attack Vectors Identifying Malicious Activity Identifying Patterns of Suspicious Behavior Conducting Security Incident Investigations Using a Playbook Model to Organize Security Monitoring Understanding SOC Metrics Understanding SOC Workflow and Automation Describing Incident Response Understanding the Use of VERIS Understanding Windows Operating System Basics Understanding Linux Operating System Basics Lab outline Use NSM Tools to Analyze Data Categories Explore Cryptographic Technologies Explore TCP/IP Attacks Explore Endpoint Security Investigate Hacker Methodology Hunt Malicious Traffic Correlate Event Logs\, Packet Captures (PCAPs)\, and Alerts of an Attack Investigate Browser-Based Attacks Analyze Suspicious Domain Name System (DNS) Activity Explore Security Data for Analysis Investigate Suspicious Activity Using Security Onion Investigate Advanced Persistent Threats Explore SOC Playbooks Explore the Windows Operating System Explore the Linux Operating System. \n  \nObjectives\nAfter taking this course\, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst?s perspective. Explain Network Security Monitoring (NSM) tools that are available to the network security analyst. Explain the data that is available to the network security analyst. Describe the basic concepts and uses of cryptography. Describe security flaws in the TCP/IP protocol and how they can be used to attack networks and hosts. Understand common endpoint security technologies. Understand the kill chain and the diamond models for incident investigations\, and the use of exploit kits by threat actors. Identify resources for hunting cyber threats. Explain the need for event data normalization and event correlation. Identify the common attack vectors. Identify malicious activities. Identify patterns of suspicious behaviors. Conduct security incident investigations. Explain the use of a typical playbook in the SOC. Explain the use of SOC metrics to measure the effectiveness of the SOC. Explain the use of a workflow management system and automation to improve the effectiveness of the SOC. Describe a typical incident response plan and the functions of a typical Computer Security Incident Response Team (CSIRT). Explain the use of Vocabulary for Event Recording and Incident Sharing (VERIS) to document security incidents in a standard format. \n  \nPre-Requisites\nBefore taking this course\, you should have the following knowledge and skills: Familiarity with Ethernet and TCP/IP networking Working knowledge of the Windows and Linux operating systems Familiarity with the basics of networking security concepts The following Cisco course can help you gain the knowledge you need to prepare for this course: Implementing and Administering Cisco Solutions (CCN). \n\n                \n                        \n                            Virtual - Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								04/20/2026 - 04/24/2026 | 10:00 AM - 06:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: Cisco\nExam: CBROPS\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260225T090000
DTEND;TZID=America/New_York:20260227T170000
DTSTAMP:20260417T130621
CREATED:20260319T191325Z
LAST-MODIFIED:20260320T145403Z
UID:9026-1772010000-1772211600@geaugagrowthpartnership.com
SUMMARY:C)ISMS-LA: Certified ISMS Lead Auditor
DESCRIPTION:Description\nIn this course\, you will be prepared to conduct audits of information security management systems (“ISMS”) to ensure that they meet ISO/IEC 27001 standards in any organization. \nISMS ISO/IEC 27001 Audit Methodology:\nPlanning\nControl Evaluation\nSubstantive Testing\nCompletion\nThe C)ISMS-LA is perfect for those looking to perform an internal or external ISMS 1S0/IEC 27001 audit. \n \nObjectives\nUpon successful completion of this course students will be able to: \n\nCompetently take the C)ISMS-LA exam\nAcquire the necessary knowledge to manage an ISMS audit\n\n \nPre-Requisites\n\nExperience with Information Systems\nInterest in Auditing\n\n \nCourse Details\nBrand: Mile2\nExam: Mile2 C)ISMS-LA\nCEU Credits: 2.1\nCourse Hours: 21\nNumber of Days: 3\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cisms-la-certified-isms-lead-auditor/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260226T090000
DTEND;TZID=America/New_York:20260226T170000
DTSTAMP:20260417T130621
CREATED:20260128T170159Z
LAST-MODIFIED:20260128T170159Z
UID:8799-1772096400-1772125200@geaugagrowthpartnership.com
SUMMARY:Virtual – Excel 365 Level 3
DESCRIPTION:02/26/2026 @ 09:00 AM – 05:00 PM \nSimple Description: Master Excel 365 with advanced formulas\, macros\, and collaboration tools. \nGreat For: Advanced Excel users\, analysts\, professionals automating or sharing data. \nFull description: In this course\, you will cover how to create and work with Macros and VBA Programming\, as well as how to add Form Controls and assign a Macro to a Form Control. You will learn about formula auditing\, and will learn about common errors\, how to correct them\, and how to use the Watch Window to see changes in formulas. You will also work with creating and modifying hyperlinks\, getting data from the internet\, as well as saving workbooks\, worksheets\, charts\, and ranges as web pages. You will create custom styles and learn how to use advanced conditional formatting. Finally\, you will learn how to create and use a shared workbook\, including how to protect\, consolidate\, and resolve editing conflicts in a shared workbook. \nPrerequesites:\nTo ensure success\, students can take the following courses\, or should possess the equivalent skill level: \nMicrosoft® Excel® for Office 365™ (Desktop or Online): Part 1 \nMicrosoft® Excel® for Office 365™ (Desktop or Online): Part 2 \nCourse price: $299 \n\n                \n                        \n                            Virtual - Excel Level 3\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								Excel 365 Level 3 | 03/17/2026| 09:00 AM - 05:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n \nPlease contact the Geauga Growth Partnership (GGP) office if you have any questions.\n440-564-1060 or info@geaugagrowth.com.  \nThis course is TechCred eligible for reimbursement! Learn more and see if you qualify by clicking here: FAQ | TechCred \nRegistration closes one week before the class date. If you’re interested in registering within a week of the class\, please contact a member of the Geauga Growth Partnership team for availability. Contact information: 440-564-1060 | info@geaugagrowth.com  \nGeauga Growth Partnership Board of Directors is dedicated to providing a positive and respectful environment for all event and training participants. GGP employees\, members\, guests of members\, attendees\, speakers\, sponsors\, and volunteers are expected to observe high standards of behavior and personal ethics in their conduct at any GGP event or training.  \nAnyone engaging in inappropriate behavior during these events or trainings will be asked by a GGP representative to discontinue the offensive behavior immediately. Should the behavior continue or if the behavior is deemed severe enough\, the individual(s) will be removed from the event or training (without a refund) and may be denied entry to future events or trainings.  \n 
URL:https://geaugagrowthpartnership.com/event/virtual-excel-365-level-3-4/
LOCATION:OH
CATEGORIES:All GGP Events,Virtual Training,Workforce Development
END:VEVENT
END:VCALENDAR