Cyber Secure Coder (CSC)
Description This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify […]
Description This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify […]
Description This course will cover understanding how to plan, create and utilize their systems. Prevent, detect and respond to attacks through the use of hands-on labs in our exclusive Cyber […]
Description In this course you will cover 20+ modules of network forensic topics. The C)NFE provides practical experience through our lab exercises that simulate real-world scenarios covering investigation and recovery […]
Description In this course you will cover the keys to being a Powershell hacker. Most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and […]
Description In this course, you will cover the process of certifying, reviewing and accrediting an information system(IS). What does it take to have a certified and accredited information system in […]
We are delighted to invite you to the 2026 Geauga Growth Partnership Annual Meeting, where we’ll come together as a business community to reflect on the year behind us, celebrate […]
Join us for the April Geauga Economic Leadership (G.E.L.) breakfast on Friday, April 3, 2026, co-sponsored by Geauga Growth Partnership and Kent State University at Geauga. This monthly breakfast series […]
Description This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step […]
Description If you are look for the "gotta have it" cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad […]
Description Artificial intelligence (AI) and machine learning (ML) have become an essential part of the toolset for many organizations. When used effectively, these tools provide actionable insights that drive critical […]
Description This course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to […]
Description In this course, you will cover: This course provides a comprehensive guide to common tasks performed by system administrators, including installation, customization, and troubleshooting. Expanded coverage of networking and […]