I am advancing my expertise in cybersecurity through a comprehensive education, and as part of this commitment,
I have leveraged the resources offered by Infosec Institute.
By enrolling in classes from industry-leading organizations like Infosec, NIST, ISACA, and (ISC)2,
I am continuously enhancing my knowledge and skills in the field of cybersecurity and privacy.
Since November 2022, I have diligently pursued my cybersecurity education, earning a remarkable collection of continued education certificates issued by Infosec.
My journey has led me through 82 learning paths (70 Displayed), where I have engaged with over 585 hours of videos, assessments, and exams.
These learning experiences have not only deepened my understanding but have also honed my practical abilities, enabling me to excel in the ever-evolving landscape of cybersecurity.
With each milestone achieved, I have embraced the challenges with enthusiasm and a determination to stay ahead in the field.
My unwavering commitment to continuous learning demonstrates my passion for cybersecurity and my dedication to being at the forefront of the industry's best practices.
1) Advanced Intrusion Detection
2) AWS Certified Security Specialist
3) Azure Secure Engineer Associate
4) Certificate of Cloud Security Knowledge (CCSK)
5) Certified Authorization Professional (CAP)
6) Certified CMMC Professional
7) Certified in Risk and Information Systems Control (CRISC)
8) Certified Information Privacy Manager (CIPM)
9) Certified Information Security Manager (CISM)
10) Certified Information Systems Security Professional (CISSP)
11) Certified Security Awareness Practitioner
12) CISSP ISSEP
13) CISSP ISSMP
14) Cloud Security Architecture
15) Cloud Security Management
16) Corporate Security Policies
17) Cyber Threat Hunting (2024)
18) Cybersecurity Administration
19) Cybersecurity Audit Fundamentals
20) Cybersecurity Data Science
21) Cybersecurity Leadership And Management
22) Cybersecurity Management
23) Cybersecurity Soft Skills
24) Database Security
25) DevSecOps
26) Digital Forensics Concepts
27) Endpoint Protection
28) Enterprise Security Risk Management
29) Forensic File System Artifacts
30) Fundamentals of Privacy Laws and Acts
31) Fundamentals of Zero Trust
32) Guide to Risk Assessments NIST 800-30 Rev1
33) HIPAA
34) HIPAA/HITECH
35) How to do Application Security Right
36) HTML5 Security
37) IAPP CIPP/E
38) IAPP CIPP/US
39) IAPP CIPT
40) Incident Response
41) Information Privacy Essentials
42) Introduction to MITRE ATT&CK
43) Introduction to PowerShell
44) ISACA Certified in the Governance of Enterprise IT (CGEIT)
45) ISACA Certified Information Systems Auditor (CISA)
46) ISO 27001 Audits
47) ITIL 4 Foundation
48) Leveraging ChatGPT for security operations center (SOC)
49) Machine Learning for Red Team Hackers
50) Microsoft Windows and Virtualization Fundamentals
51) Mobile Web Application Penetration Testing
52) Network Security Fundamentals
53) NIST - SP 800-171
54) NIST - SP 800-53
55) NIST CSF 2.0 (2024)
56) NIST DoD RMF
57) Operational Technology (OT) Security
58) PCI DSS for Developers
59) Project Management Professional (PMP)
60) Securing Cloud-based Applications
61) Securing Legacy Operational Technology
62) Security Architecture
63) Security Engineering
64) Software Security Testing
65) Systems Security Certified Practitioner (SSCP)
66) Threat Intelligence
67) Threat Modeling
68) Windows 10 Host Security
69) Windows 11 Host Security
70) Windows Server Security 2022