Cyber Secure Coder (CSC)
Description This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify […]
Description This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify […]
Description In today’s competitive job market, the Certified Scrum Developer credential can set you apart from the pack. A successful Scrum Developer is committed to continuous improvement. The coursework and […]
Description In this course, you will cover the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. This course distills ethical theory, public regulations, […]
Description In this course you will cover 20+ modules of network forensic topics. The C)NFE provides practical experience through our lab exercises that simulate real-world scenarios covering investigation and recovery […]
Description CompTIA A+ Core 1 is the first of two exams required to earn the industry-standard A+ certification, designed to launch your tech career. This exam focuses on foundational skills […]
Description This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's […]
Join us for the December Geauga Economic Leadership (G.E.L.) breakfast on Friday, December 4, 2026, co-sponsored by Geauga Growth Partnership and Kent State University at Geauga. This monthly breakfast series […]
Description In this course, you will cover the process of certifying, reviewing and accrediting an information system(IS). What does it take to have a certified and accredited information system in […]
Description If you are look for the "gotta have it" cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad […]
Description Artificial intelligence (AI) and machine learning (ML) have become an essential part of the toolset for many organizations. When used effectively, these tools provide actionable insights that drive critical […]
Description PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks. Pre-Requisites CompTIA: Security+ or equivalent […]
Description This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The […]