The following formal degrees, executive education, graduate certificates, and industry certifications, reflect a 20+ year commitment to ongoing education in various technical and business domains. Only actively maintained certifications are listed.
5 postgraduate academic credentials.
4 undergraduate academic credentials.
36 actively maintained industry certifications.
15 U.S. Government professional ratings and certifications.
Formal academic degrees, certificates, diplomas, or other qualifications for which a first or bachelor's degree generally is required, are listed below.
5 postgraduate academic credentials have been achieved.
267 credit hours of academics focused on Global Networks, Operational
Assurance, Information Assurance, and Operational COMSEC.
The six-month program designed for executives with IT oversight responsibilities.
Carnegie Mellon University’s is consistently ranked #1 in Information and
Technology Management.
Study of breakthrough concepts that can help to identify, capture and deliver on great ideas and to successfully drive innovation throughout the organization. Learned new strategic approaches and tools for managing products, technology, and innovation, as well as for discovering new sources of profitability.
Building upon the Executive Certificate in Strategy and Innovation, the curriculum focused on core business competencies in marketing, finance, organizational processes, change management, and systems thinking.
Curriculumn addresses protection of an organization's cyberspace operations, covering the tools, techniques, and standards, required to prevent, detect, and counteract cyber attacks. The program not only focuses on keeping infrastructure safe but also the assurance of information covering subjects ranging from cryptography to business continuity planning.
Four classes (16 credits) remain as of February 2023. Estimated completion September 2023.
Postsecondary programs up to the level of a bachelor's degree are listed below.
4 undergraduate academic credentials have been achieved.
Designed to meet Department of Homeland Security (DHS), and National Security Agency (NSA) guidelines, the B.S. Cybersecurity and Information Assurance degree program covered topics such as networking and security, web security, cloud security, cryptography, digital forensics, cyber law, IT project management, and penetration testing.
A pathway to WGU’s bachelors of science programs, the MicroBachelors™ contained
coursework relating to computer networking, security, scripting, and programming skills.
Program strongly emphasized the people skills and real-world practices
required to successfully manage projects on time, on budget, and within
scope. Gained analytical frameworks, strategic planning skills, and
managerial insight to be a more effective project leader. The program
also addressed the role of project manager in cultivating and supporting
innovation in project teams.
Program examined emerging technologies that will transform how we obtain, distribute and
store energy. Targeted focus on sensor networks within nuclear-powered Smart Grid
infrastructures in support of data analytics and intelligence gathering.
Credential recognized by business and industry at the national or global levels are listed below.
36 industry certifications are actively maintained.
The CCSK is a web-based examination of an individual’s competency in key cloud security issues. Launched in 2010, the CCSK is a widely recognized standard of expertise and is the industry’s primary benchmark for measuring cloud security skillsets. The CCSK was recently lauded as the most valuable IT certification in terms of average salary by Certification Magazine.
Certification ID: 241455593941
The CCSK is a web-based examination of an individual’s competency in key cloud security issues. Launched in 2010, the CCSK is a widely recognized standard of expertise and is the industry’s primary benchmark for measuring cloud security skillsets. The CCSK was recently lauded as the most valuable IT certification in terms of average salary by Certification Magazine.
Certification ID: HxDsbXcPt8vK6fnxcAgNRZPH
Earners of the CompTIA A+ certification are proven problem solvers who are able to perform critical IT support tasks including device configuration, data backup and recovery, and operating system configuration. CompTIA A+ certified professionals have demonstrated baseline security skills for IT support roles and are able to detect and remove malware, address privacy concerns, and troubleshoot core service challenges.
Certification ID: COMP001021796426
Earners of the CompTIA CySA+ certification have the skills, knowledge, and ability
to address security analytics, intrusion detection and response. CompTIA
CySA+ analysts have demonstrated the ability to perform data analysis and
interpret the results to identify vulnerabilities, threats and risks to an
organization and the skills to secure and protect the systems.
Certification ID: COMP001021796426
Earners of the CompTIA IT Operations Specialist (CIOS) certification have the ability
to manage the flow of a workplace and optimize day-to-day activities. These IT
operations specialists have demonstrated the ability to analyze business operations
and identify customer needs.
Certification ID: COMP001021796426
Earners of the CompTIA Linux+ certification have the knowledge and skills required to succeed as a system administrator supporting Linux systems. CompTIA Linux+ administrators have demonstrated the ability to configure the system, navigate the command line, and use common package management systems.
Certification ID: COMP001021796426
Earners of the CompTIA Linux Network Professional (CLNP) certification are
Linux network professionals that are able to provide hands-on support and to
monitor critical internal and client systems.
Certification ID: COMP001021796426
Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.
Certification ID: COMP001021796426
Earners of the CompTIA Project+ certification understand the basic concepts to successfully manage small- to medium-sized projects. These business professionals have demonstrated the knowledge and skills required to manage a project lifecycle, ensure proper communication, manage resources and stakeholders and maintain project documentation.
Certification ID: COMP001021796426
Earners of the CompTIA Secure Infrastructure Specialist (CSIS) certification have the
knowledge and skill required to support hardware and software systems. These secure
infrastructure specialists will also be able to protect an organization’s assets
from internal and external threats.
Certification ID: COMP001021796426
Earners of the CompTIA Security+ certification have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.
Certification ID: COMP001021796426
Earners of the CompTIA Security Analytics Professional (CSAP) are security analytics
professional that have the ability to plan and carry out security measures to protect
an organization’s computer networks and systems.
Certification ID: COMP001021796426
Earners of the CompTIA Systems Support Specialist (CSSS) certification are systems support specialists responsible for all aspects of help desk support and technical assistance. These specialists have demonstrated the ability to address a variety of user issues, including troubleshooting software, hardware and networks.
Certification ID: COMP001021796426
CrowdStrike Certified Falcon Administrators effectively manage the Falcon platform based on the risk profile of your business, including effective user management, deploying and managing the Falcon sensor, configuring deployment and prevention policies based on business risk, configuring allowlists, blocklists, and file-path exclusions, and conducting administrative reporting.
Certification ID: CCFA-82287090
Develop an understanding of the DevOps lifecycle and how to increase customers’ operational efficiencies.
Certification ID: N/A
Credential covers Google Cloud and its products and services, how these products and services help customers digitally transform in today’s evolving business world, and how Google Cloud differs from its competitors in transforming companies. Completion of this learning path is part of the Google Cloud Partner Program credential requirements.
Certification ID: 144300303
Covered topics such as network protocols, cloud computing, Windows operating system, Linux command line, systems administration, encryption algorithms and techniques, and more.
Certification ID: N/A
The CISA certification is world-renowned as the standard of achievement for those who
audit, control, monitor and assess an organization’s information technology and
business systems.
Certification ID: 221698105
The management-focused CISM is the globally accepted standard for individuals who design,
build and manage enterprise information security programs.
Certification ID: 221698106
The vendor-neutral CAP credential confirms knowledge, skill, and experience required for authorizing and maintaining information systems within the new Risk Management Framework as outlined in NIST SP 800-37 Rev 1. CAP validates that an authorization professional has the competence to ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.
Certification ID: 470771
The vendor-neutral CGRC credential confirms the advanced technical skills and knowledge to understand and apply Governance, Risk and Compliance (GRC) and can authorize and maintain information systems utilizing various risk management frameworks, and best practices, policies and procedures. CGRC validates that an authorization professional has competence to ensure that information systems have security equivalent with the level of exposure to potential risk and damage to assets or individual.
Certification ID: 470771
The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard information security certification that assures information security leaders possess the breadth and depth of knowledge to establish holistic security programs that protect against threats in an increasingly complex cyber world.
Certification ID: 470771
The vendor-neutral CISSP-ISSAP credential confirms a CISSP’s specialized knowledge
and experience in designing security solutions and providing management with risk-based
guidance to meet organizational goals.
Certification ID: 470771
The vendor-neutral CISSP-ISSEP credential confirms a CISSP’s specialized knowledge
and experience in the practical application of systems engineering principles and
processes to develop secure systems.
Certification ID: 470771
The vendor-neutral CISSP-ISSMP credential confirms a CISSP’s specialized knowledge and experience in establishing, presenting, and governing information security programs and demonstrate management and leadership skills.
Certification ID: 470771
Validates the foundational skills to write more secure software and reduce
vulnerabilities and re-work. This certificate requires knowledge of secure
software concepts, secure software design, OWASP top 10, secure software
coding, and defending Java.
Certification ID: 470771
The vendor-neutral SSCP credential confirms deep technical knowledge and competency
in implementing, monitoring, and administering IT Infrastructure in accordance
with information security policies and requirements across the organization.
Certification ID: 470771
ITIL 4 provides a flexible foundation for organizations that need to integrate various
frameworks and approaches into their service management operating models. ITIL 4 aims
to help businesses navigate the new technological era of digital services.
Certification ID: 9980079617425315
Built and deployed deep learning applications for image classification and object detection, modifying neural networks to improve their accuracy and performance, and implementing learned techniques on a final project.
Certification ID: 5c7cf7a2c29e4c9bada9fa618d73a8c4
Earners of the globally-recognized PMI Agile Certified Practitioner (PMI-ACP) have demonstrated their knowledge and skills in agile practices, tools and techniques that are applicable across virtually any industry and methodology. Earners have demonstrated their knowledge and experience with agile principles and mindset, value-driven delivery, stakeholder engagement, team performance, adaptive planning, problem detection and resolution, and continuous improvement.
Certification ID: 2118663
Earners of the globally-recognized Project Management Professional (PMP) have demonstrated their extensive knowledge and mastery of project management concepts, tasks, and techniques that are applicable across virtually any industry and methodology. Earners are able to speak and understand the global language of project management. Individuals that earn this certification have demonstrated the knowledge and skills needed to initiate, plan, execute, monitor and control, and close a project.
Certification ID: 2118663
A Scrum Master is the Scrum team member tasked with fostering an effective and productive working environment and guiding others to understand Scrum values, principles and practices. Scrum Masters tend to be people-oriented, have a high level of emotional intelligence, and find joy in helping team members to grow.
Certification ID: 715553
A Certified Scrum Product Owner® is responsible for maximizing the value of the product resulting from work of the Development Team.
While the Scrum Master helps the Scrum Team work together to learn and implement Scrum, the Product Owner creates a product vision, order the product backlog, and makes sure the best possible job is done to delight the customers and other stakeholders.
Certification ID: 715553
The CSP is an advanced certification that indicates the recipient is both knowledgeable and
experienced in the practical and theoretical use of Scrum.
Certification ID: 715553
The Certified Scrum Professional-Product Owner (CSP-PO) certification demonstrates an understanding
of advanced stakeholder discussion; funding and financing; customer development; product launches;
and, advanced product discovery.
Certification ID: 715553
Certified Scrum Professional-Scrum Master represents the culmination of the
path to Certified Scrum Professional (CSP) program and the highest-level
accreditation that Scrum Alliance offers to become a Professional Scrum Master.
Certification ID: 715553
U.S. Federal Government workforce management requirements, such as DoD Directive 8570, enumerate requirements for Government ratings and certifications. Such ratings are often precursors to being listed as key personnel on government contracts (e.g. to be a "Principal Investigator").
15 U.S. Government professional ratings and certifications are being actively maintained.
IAT Level I personnel make computing environments less vulnerable by correcting flaws and implementing technical information assurance controls in the hardware or software installed within their operational systems.
IAT Level II personnel provide network environment and advanced compute environment support. They pay special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured. These positions focus on threats and vulnerabilities and improve the security of systems. IAT Level II personnel have mastery of the functions of the IAT Level I position.
IAT Level III personnel focus on the enclave environment and support, monitor, test, and troubleshoot hardware and software information assurance problems pertaining to the compute environment, network environment, and enclave environments. IAT Level III personnel have mastery of the functions of both the IAT Level I and IAT Level II positions.
IASAE Level I personnel are responsible for the design, development, implementation, and/or integration of a DoD Information Assurance architecture, system, or system component for use within their compute environment. Incumbents ensure that Information Assurance related Information Systems will be functional and secure within the Compute Environment.
IASAE Level II positions are responsible for the design, development, implementation, and/or integration of a DoD Information Assurance architecture, system, or system component for use within the network environment. Incumbents ensure that Information Assurance related Information Systems will be functional and secure within the Network Environment.
IASAE Level III positions are responsible for the design, development, implementation, and/or integration of a DoD Information Assurance architecture, system, or system component for use within Compute Environments, Network Environments, and enclave environments. They ensure that the architecture and design of DoD Information Systems are functional and secure. This may include designs for program of record systems and special purpose environments with platform IT interconnectivity. Incumbents may also be responsible for system or network designs that encompass multiple compute environments and/or network environments to include those with differing data protection/classification requirements.
IAM Level I personnel are responsible for the implementation and operation of a DoD Information System or system DoD Component within their compute environment. Incumbents ensure that information assurance related information systems are functional and secure within the compute environment.
IAM Level II personnel are responsible for the information assurance program for an information system within the network environment. Incumbents in these positions perform a variety of security related tasks, including the development and implementation of system information security standards and procedures. They ensure that information systems are functional and secure within the network environment.
IAM Level III personnel are responsible for ensuring that all enclave information systems are functional and secure. They determine the enclaves’ long term information assurance systems needs and acquisition requirements to accomplish operational directives. They also develop and implement information security standards and procedures through the DoD certification and accreditation process.
CND-A personnel use data collected from a variety of Computer Network Defense (CND) tools (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occure within their environment. Individuals within CND-SPs who collect and analyze event information or perform threat or target analysis duties within the CND-SP shall be considered CND-As.
CND-IS personnel test, implement, deploy, maintain, and administer the infrastructure systems which are required to effectively maintain the CND-SP network and resources. This may include, but is not limited to routers, firewalls, intrusion detection/prevention systems, and other Computer Network Defense (CND) tools as deployed within the Network Environment or enclave.
CND-IR personnel investigate and analyze all response activities related to cyber incidents within the network environment or enclave. These tasks include, but are not limited to: creating and maintaining incident tracking information; planning, coordating, and directing recovery activities; and incident analysis tasks, including examining all available information and supporting evidence or artifacts related to an incident or event.
CND-AU personnel perform assessments of systems and networks within the network environment or enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. CND-AUs achieve this through passive evaluations (compliance audits) and active evaluations (penetration tests and/or vulnerability assessments).
CND-SPMs oversee the CND-SP operations within their organization. CND-SPMs are responsible for producing guidance for their network environment or enclave, assisting with risk assessments and risk management for organizations within their network environment or enclave, and are responsible for managing the technical classifications within their organization.
The GSA Federal CIO designation was a graduate level programs that directly addressed federal executive core competencies in order to prepare business leaders for top IT jobs in government and private sector. The purpose of the CIO University was to improve the leadership of information technology in the federal government by enhancing the skills of its top executives.