C)PSH: Certified PowerShell Hacker
Description In this course you will cover the keys to being a Powershell hacker. Most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and […]
Description In this course you will cover the keys to being a Powershell hacker. Most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and […]
Description In this course you will cover electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. Students will be taught […]
Description In this course you will cover current significant threats, threat actors, and identification procedures so that cyber-security professionals can implement the best policies and procures for their organizational security […]
Description If you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination, this course can be a significant part of your preparation. But certification is not the only key […]
Description In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern […]
Description In this course, students will learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud […]
Description In this course, you will cover how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement […]
Description This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises, and hybrid relational databases and who work with the Microsoft […]
Join us for breakfast! The Nonprofit Forum is designed to bring together local business owners, leaders, and entrepreneurs for meaningful conversations, shared learning, and practical insights that support growth and […]
Description This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The […]
Join us for the November Geauga Economic Leadership (G.E.L.) breakfast on Friday, November 6, 2026, co-sponsored by Geauga Growth Partnership and Kent State University at Geauga. This monthly breakfast series […]
Description In this course, you will cover incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential […]