CompTIA: Security+
Description If you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination, this course can be a significant part of your preparation. But certification is not the only key […]
Description If you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination, this course can be a significant part of your preparation. But certification is not the only key […]
Description In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern […]
Description In this course, students will learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud […]
Description In this course, you will cover how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement […]
Description This course provides students with the knowledge and skills to administer a SQL Server database infrastructure for cloud, on-premises, and hybrid relational databases and who work with the Microsoft […]
Join us for breakfast! The Nonprofit Forum is designed to bring together local business owners, leaders, and entrepreneurs for meaningful conversations, shared learning, and practical insights that support growth and […]
Description This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The […]
Join us for the November Geauga Economic Leadership (G.E.L.) breakfast on Friday, November 6, 2026, co-sponsored by Geauga Growth Partnership and Kent State University at Geauga. This monthly breakfast series […]
Description In this course, you will cover incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential […]
Description This course will provide you something you will not find in other class! The Cloud is being widely adopted today for a diverse set of reasons. However, many are […]
Description In this course you will cover 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers […]
Description In this course, you will learn the value of vulnerability assessments. Then, you will discover how to use those assessments to make powerful changes in an information system's security. […]