BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Geauga Growth Partnership, Inc. - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://geaugagrowthpartnership.com
X-WR-CALDESC:Events for Geauga Growth Partnership, Inc.
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20270314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20271107T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260330T090000
DTEND;TZID=America/New_York:20260401T170000
DTSTAMP:20260417T053346
CREATED:20260320T130553Z
LAST-MODIFIED:20260320T153121Z
UID:9128-1774861200-1775062800@geaugagrowthpartnership.com
SUMMARY:Cyber Secure Coder (CSC)
DESCRIPTION:Description\nThis course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security\, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration\, how to design software to deal with the human element in security\, and how to incorporate security into all phases of development. \n \nPre-Requisites\nThis course presents secure programming concepts that apply to many different types of software development projects. Although this course uses Python®\, HTML\, and JavaScript® to demonstrate various programming concepts\, you do not need to have experience in these languages to benefit from this course. However\, you should have some programming experience\, whether it be developing desktop\, mobile\, web\, or cloud applications. \n \nCourse Details\nBrand: CertNexus\nExam: CSC\nCEU Credits: 2.1\nCourse Hours: 21\nNumber of Days: 3\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cyber-secure-coder-csc/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260330T090000
DTEND;TZID=America/New_York:20260403T170000
DTSTAMP:20260417T053346
CREATED:20260319T191314Z
LAST-MODIFIED:20260320T145340Z
UID:9133-1774861200-1775235600@geaugagrowthpartnership.com
SUMMARY:C)IHE: Certified Incident Handling Engineer
DESCRIPTION:Description\nThis course will cover understanding how to plan\, create and utilize their systems. Prevent\, detect and respond to attacks through the use of hands-on labs in our exclusive Cyber Range. \n \nObjectives\nUpon successful completion of this course\, students will: \n\nHave knowledge to perform network forensic examinations\nBe able to accurately report on their findings\nBe ready to sit for the C)NFE exam\n\n \nPre-Requisites\n\n12 months network technologies\nSound knowledge of networking and TCP/IP\nLinux knowledge is essential\n\n \nCourse Details\nBrand: Mile2\nExam: Mile2 C)IHE\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cihe-certified-incident-handling-engineer/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260330T090000
DTEND;TZID=America/New_York:20260403T170000
DTSTAMP:20260417T053346
CREATED:20260319T191417Z
LAST-MODIFIED:20260320T145603Z
UID:9135-1774861200-1775235600@geaugagrowthpartnership.com
SUMMARY:C)NFE: Certified Network Forensics Examiner
DESCRIPTION:Description\nIn this course you will cover 20+ modules of network forensic topics. The C)NFE provides practical experience through our lab exercises that simulate real-world scenarios covering investigation and recovery of data in network. The C)NFE focuses on centralizing and investigating logging systems as well as network devices. \n \nObjectives\nUpon successful completion of this course\, students will: \n\nHave knowledge to perform network forensic examinations\nBe able to accurately report on their findings\, and\nBe ready to sit for the C)NFE exam\n\n \nPre-Requisites\n\n2 years networking experience\n2 years in IT Security\nWorking knowledge of TCPIP\n\n \nCourse Details\nBrand: Mile2\nExam: Mile2 C)NFE\nCEU Credits: 3.5\nCourse Hours: 35\nNumber of Days: 5\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cnfe-certified-network-forensics-examiner/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260331T080000
DTEND;TZID=America/New_York:20260331T120000
DTSTAMP:20260417T053346
CREATED:20260320T134239Z
LAST-MODIFIED:20260406T145915Z
UID:9141-1774944000-1774958400@geaugagrowthpartnership.com
SUMMARY:IoTBIZ: Internet of Things for Business Professionals
DESCRIPTION:Description\nThis 4-hour course and associated credential (IOZ-110) will validate a participant’s knowledge of IoT terminology\, their ability to understand the components of IoT infrastructure\, uncover challenges for consideration and the impact that IoT has on their organization. Successful participants will be able to identify what IoT can do for their organization and the various business and technical challenges to address. \n\n\n                \n                        \n                            Virtual - IoTBIZ: Internet of Things for Business Professionals\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								03/31/2026 | 08:00 AM - 12:00 PM\n							\n								\n								07/17/2026 | 01:00 PM - 05:00 PM\n							\n								\n								10/20/2026 | 01:00 PM - 05:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: CertNexus\nExam: IoTBIZ\nCEU Credits: 0.4\nCourse Hours: 4\nNumber of Days: 1\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/iotbiz-internet-of-things-for-business-professionals/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260331T090000
DTEND;TZID=America/New_York:20260331T130000
DTSTAMP:20260417T053346
CREATED:20260320T130832Z
LAST-MODIFIED:20260406T150303Z
UID:9138-1774947600-1774962000@geaugagrowthpartnership.com
SUMMARY:CyberSAFE
DESCRIPTION:Description\nIn this course\, you will cover what you can do to protect yourself and your organization from technology-related risks. This course will help you to: \n\nUnderstand both security and compliance needs and requirements.\nRecognize and avoid phishing and other social engineering attempts.\nRecognize and avoid viruses\, ransomware\, and other malware.\nHelp ensure data security on computers\, mobile devices\, networks\, the Internet\, and in the cloud.\n\nIn this course\, you will use discussions\, case studies\, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. \n  \nObjectives\nUpon successful completion of this course\, students should be able to: \n\nIdentify security compliance measures.\nAddress social engineering attempts.\nSecure devices such as desktops\, laptops\, tablets\, smartphones\, and more.\nUse the Internet securely.\n\n  \nPre-Requisites\nIt is recommended that you should have experience with the basic use of conventional computing technology\, including desktop\, laptop\, or tablet computers; mobile phones; and basic Internet functions\, such as web browsing and email. \n\n                \n                        \n                            Virtual - CyberSafe\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								08/07/2026 | 09:00 AM - 01:00 PM\n							\n								\n								10/20/2026 | 09:00 AM - 01:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nCourse Details\nBrand: CertNexus\nExam: CyberSAFE\nCEU Credits: 0.4\nCourse Hours: 4\nNumber of Days: 1\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cybersafe/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20260331T090000
DTEND;TZID=America/New_York:20260403T170000
DTSTAMP:20260417T053346
CREATED:20260319T211323Z
LAST-MODIFIED:20260406T150122Z
UID:9144-1774947600-1775235600@geaugagrowthpartnership.com
SUMMARY:C)PSH: Certified PowerShell Hacker
DESCRIPTION:Description\nIn this course you will cover the keys to being a Powershell hacker. Most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management. \nDid you know that a large percentage of hacks over the last year included PowerShell based attacks? Well\, they did. A Powershell Hacker can be a security risk\, or an asset to prevent breaches. Which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open-source code on Mac and Linux! The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques. You will leave with a real strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place! \n\n                \n                        \n                            Virtual - C)PSH: Certified PowerShell Hacker\n                             \n                        \n                        Attendee Name(Required)\n                            \n                            \n                                                    \n                                                    First\n                                                \n                            \n                            \n                                                    \n                                                    Last\n                                                \n                            \n                        Company Name(Required)Email(Required)\n                            \n                        Phone(Required)Select class registration (select one class):(Required)\n								\n								03/31/2026 - 04/03/2026 | 09:00 AM - 05:00 PM\n							\n								\n								11/02/2026 - 11/05/2026 | 09:00 AM - 05:00 PM\n							Are you a GGP Member?(Required)\n			\n					\n					Yes\n			\n			\n					\n					No\n			\n			\n					\n					Unknown\n			Comments - Please let us know what's on your mind. Have a question for GGP? Ask away!CAPTCHA\n          \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n            \n        \n                        \n                        \n\nObjectives\nUpon successful completion of this course students will be able to: \n\nCompetently take the C)PSH exam\nProtect a powershell system from attack\n\n  \nPre-Requisites\n\nC)PEH and C)PTE or equivalent knowledge\nUnderstanding of pen testing\nGeneral understanding of active directory\nGeneral understanding of scripting and programming\n\n  \nCourse Details\nBrand: Mile2\nExam: Mile2 C)PSH\nCEU Credits: 2.8\nCourse Hours: 28\nNumber of Days: 4\nCourse PDF
URL:https://geaugagrowthpartnership.com/event/cpsh-certified-powershell-hacker-2/
LOCATION:OH
CATEGORIES:All GGP Events,Workforce Development
END:VEVENT
END:VCALENDAR