Ongoing Continuing Education

2020-Current

Information Security:

  • Implementing an Information Security Program

  • Building an ISO 27001-Compliant Cybersecurity Program - Getting Started

  • Implementing the NIST Risk Management Framework

  • Implementing the NIST Privacy Framework

  • Implementing an Information Security Program

  • The Cybersecurity Threat Landscape

  • Leaning Threat Modeling for Security Professionals

  • Learning Security Frameworks

  • IT Security: Key Policies and Resources

  • DevOps for Managers

  • Cybersecurity Awareness: Cloud Security

  • Security Architecture and Engineering

  • Cloud Security Architecture for the Enterprise

  • Identifying the Proper Balance of Internal Controls

  • Understanding and Prioritizing Data Privacy

  • Security Framework Fundamentals

  • HIPAA Training

  • Cloud Security Architecture for the Enterprise

  • Cybersecurity Exposure Management Course

  • Advanced Threat Intelligence

  • GDPR Compliance: Essential Training

Certification Exam Preparation:

  • SSCP Cert Prep The Basics

  • CRISC Cert Prep 1 Governance

  • CRISC Cert Prep 2 IT Risk Assessment

  • CRISC Cert Prep 3 Risk Response and Reporting

  • CCSP Cert Prep 6 Legal Risk and Compliance

  • CISSP Cert Prep: 3 Security Architecture and Engineering

Audit and Project Management:

  • Cyber and IT Audit Planning

  • Preparing for an Audit

  • Performing a Technical Security Audit and Assessment

  • Introduction to Project Management

  • Project Management Risk

  • Project Management: Preventing Scope Creep

  • Leveraging Generative AI for Project Management

Leadership:

  • Human Leadership

  • Coaching Skills for Leaders and Managers

  • Disagreeing with Someone Senior to You

  • How to Lead and Inspire Change

  • How to Think Strategically

  • Leadership Mindsets

  • Leading Your Team Through Change

  • Think Like a Lawyer to Make Decisions and Solve Problems

  • Managing UP, Down, and Across the Organization

Security Testing:

  • OWASP Top 10 7 XSS and 8 Insecure Deserialization

  • OWASP Top 10 9 Components with Known Vulnerabilities and 10 Insufficient Logging and Monitoring

  • API Testing Foundations

Current Work In Progress