Splunk Certfications
DOD Mandatory Controlled Unclassified Information Training
AWS Academy Cloud Foundations
Identity and Access Management
Lab AWS IAM
Built a VPC and launched a Web Server
Lab Amazon EC2
Lab Built a Database Server
Servicenow
Servicenow Fundamentals
Hands-on labs
Security+
Attacks, Threats, and Vulnerabilities
Operations and Incident Response
Architecture and Design
Governance, Risk, and Compliance
Implementation
Cybersecurity Bootcamp for Women
NIST Framework
Overall grade 98%
Fundamentals of cyber security
Governance, Risk, and Compliance
Roles within cybersecurity
Vulnerabilty Management
Received hands-on lab training.
Six phases of the Vulnerability Management lifecycle
Create a custom list of QIDs from the Qualys KnowledgeBase
Create and use Asset Groups to manage host assets in your subscription
Create and use Asset Tags to manage host assets in your subscription
Create and use report templates and discover the different source, filter, and display options within a template
Create and edit user accounts and work with Business Unit
Identify the essential components of a Remediation Policy
Security+
- Help identify attacks and vulnerabilities to mitigate them before they infiltrate IS
- Understand secure virtualization, secure application deployment, and automation concepts
- Identify and implement the best protocols and encryption
- Understand the importance of compliance
Mastercard Virtual Experience
Design a phishing email simulation
Interpret phishing simulation results
SAP Virtual Internship
Password Management
Industry Analysis/Impact Analysis
Principles of Defense
Windows Hardening Techniques (Windows Server 2019)
Compliance
Network+
- Design and implement networks
- Support the creation of virtualized networks
- Configure, manage and maintain network devices
- Use devices, such as switches and routers, to segment network traffic and create resilient networks
- Troubleshoot network problems
- Identify the benefits and drawbacks of existing network configurations
- Implement network security, standards, and protocols
IBM Cybersecurity Analyst
Completed 8 courses.
Achieved a 98%
Completed a case study on cybersecurity data breaches
Lean Six Sigma Green Belt
Understanding approaches to process mapping
Identifying areas for improvement
Reduce waste in their business processes
Improve quality and efficiency
Lean Six Sigma Yellow Belt
Provide Customer Ssatisfaction
Employee Satisfaction
Better Collaborations
Customer Loyalty
Jira
Agile and scrum management
Issue management
Customizable
Confluence
Break down team silos
Create meeting notes
Collaborate and document
Organize ideas, and content
Project Management
Organizational Culture
Career Development
Strategic Thinking Change Management
Project Management
ITIL
Framework- Political Factors, Economic Factors, Legal Factors, and Technological Factors
Elements- Plan, Improve, Engage, Design/Transition, Obtain/Build, and Deliver/support
Better management of business risk and service disruption