C)IHE: Certified Incident Handling Engineer
Description This course will cover understanding how to plan, create and utilize their systems. Prevent, detect and respond to attacks through the use of hands-on labs in our exclusive Cyber […]
Description This course will cover understanding how to plan, create and utilize their systems. Prevent, detect and respond to attacks through the use of hands-on labs in our exclusive Cyber […]
Description In this course you will cover 20+ modules of network forensic topics. The C)NFE provides practical experience through our lab exercises that simulate real-world scenarios covering investigation and recovery […]
Description In this course you will cover the keys to being a Powershell hacker. Most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and […]
Description In this course, you will cover the process of certifying, reviewing and accrediting an information system(IS). What does it take to have a certified and accredited information system in […]
Join us for the April Geauga Economic Leadership (G.E.L.) breakfast on Friday, April 3, 2026, co-sponsored by Geauga Growth Partnership and Kent State University at Geauga. This monthly breakfast series […]
Description This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step […]
Description If you are look for the "gotta have it" cybersecurity course, then the Certified Information Systems Security Officer is for you. The C)ISSO will prepare you with a broad […]
Description Artificial intelligence (AI) and machine learning (ML) have become an essential part of the toolset for many organizations. When used effectively, these tools provide actionable insights that drive critical […]
Description This course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to […]
Description In this course, you will cover: This course provides a comprehensive guide to common tasks performed by system administrators, including installation, customization, and troubleshooting. Expanded coverage of networking and […]
Description In this course you will cover: different types of servers; identification of hardware and software components used in servers; installation of servers in a network environment; configuring servers and […]
Description This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's […]