Academics & Certifications

The following formal degrees, executive education, graduate certificates, and industry certifications, reflect a 20+ year commitment to ongoing education in various technical and business domains. Only actively maintained certifications are listed.

Postgraduate

Formal academic degrees, certificates, diplomas, or other qualifications for which a first or bachelor's degree generally is required, are listed below.

5 postgraduate academic credentials have been achieved.


  • Classified and Unclassified Graduate and Doctoral-level Academics

    NATIONAL CRYPTOGRAPHIC SCHOOL (NCS)
    National Cryptographic School (NCS) Logo

    267 credit hours of academics focused on Global Networks, Operational Assurance, Information Assurance, and Operational COMSEC.




  • Chief Information Officer (CIO) Certificate

    CARNEGIE MELLON UNIVERSITY, HEINZ COLLEGE
    Carnegie Mellon University, Heinz College Logo

    The six-month program designed for executives with IT oversight responsibilities. Carnegie Mellon University’s is consistently ranked #1 in Information and Technology Management.

  • Executive Certificate in Strategy and Innovation

    MIT, SLOAN SCHOOL OF MANAGEMENT
    MIT, Sloan School of Management Logo

    Study of breakthrough concepts that can help to identify, capture and deliver on great ideas and to successfully drive innovation throughout the organization. Learned new strategic approaches and tools for managing products, technology, and innovation, as well as for discovering new sources of profitability.

  • Executive Certificate in Management and Leadership

    MIT, SLOAN SCHOOL OF MANAGEMENT
    MIT, Sloan School of Management Logo

    Building upon the Executive Certificate in Strategy and Innovation, the curriculum focused on core business competencies in marketing, finance, organizational processes, change management, and systems thinking.

  • [IN PROGRESS] Master of Science, Cybersecurity and Information Assurance

    WESTERN GOVERNORS UNIVERSITY (WGU)
    Western Governors University (WGU) Logo

    Curriculumn addresses protection of an organization's cyberspace operations, covering the tools, techniques, and standards, required to prevent, detect, and counteract cyber attacks. The program not only focuses on keeping infrastructure safe but also the assurance of information covering subjects ranging from cryptography to business continuity planning.

    Four classes (16 credits) remain as of February 2023. Estimated completion September 2023.


Undergraduate

Postsecondary programs up to the level of a bachelor's degree are listed below.

4 undergraduate academic credentials have been achieved.


  • B.S. Cybersecurity and Information Assurance

    WESTERN GOVERNORS UNIVERSITY (WGU)
    Western Governors University (WGU) Logo

    Designed to meet Department of Homeland Security (DHS), and National Security Agency (NSA) guidelines, the B.S. Cybersecurity and Information Assurance degree program covered topics such as networking and security, web security, cloud security, cryptography, digital forensics, cyber law, IT project management, and penetration testing.


  • MicroBachelors™, Information Technology

    WESTERN GOVERNORS UNIVERSITY (WGU)
    Western Governors University (WGU) Logo

    A pathway to WGU’s bachelors of science programs, the MicroBachelors™ contained coursework relating to computer networking, security, scripting, and programming skills.



  • Certificate in Project Management

    GEORGETOWN UNIVERSITY, SCHOOL OF CONTINUING STUDIES
    Georgetown University, School of Continuing Studies Logo

    Program strongly emphasized the people skills and real-world practices required to successfully manage projects on time, on budget, and within scope. Gained analytical frameworks, strategic planning skills, and managerial insight to be a more effective project leader. The program also addressed the role of project manager in cultivating and supporting innovation in project teams.


  • Energy Innovation and Emerging Technologies Certificate

    STANFORD UNIVERSITY, CENTER FOR PROFESSIONAL DEVELOPMENT
    Stanford University, Center for Professional Development Logo

    Program examined emerging technologies that will transform how we obtain, distribute and store energy. Targeted focus on sensor networks within nuclear-powered Smart Grid infrastructures in support of data analytics and intelligence gathering.






Industry Certifications

Credential recognized by business and industry at the national or global levels are listed below.

36 industry certifications are actively maintained.


  • Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge v3 (CCSKv3)

    Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge v3 (CCSKv3) Logo

    The CCSK is a web-based examination of an individual’s competency in key cloud security issues. Launched in 2010, the CCSK is a widely recognized standard of expertise and is the industry’s primary benchmark for measuring cloud security skillsets. The CCSK was recently lauded as the most valuable IT certification in terms of average salary by Certification Magazine.

    Certification ID: 241455593941

  • Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge v4 (CCSKv4)

    Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge v4 (CCSKv4) Logo

    The CCSK is a web-based examination of an individual’s competency in key cloud security issues. Launched in 2010, the CCSK is a widely recognized standard of expertise and is the industry’s primary benchmark for measuring cloud security skillsets. The CCSK was recently lauded as the most valuable IT certification in terms of average salary by Certification Magazine.

    Certification ID: HxDsbXcPt8vK6fnxcAgNRZPH

  • CompTIA A+

    CompTIA A+ Logo

    Earners of the CompTIA A+ certification are proven problem solvers who are able to perform critical IT support tasks including device configuration, data backup and recovery, and operating system configuration. CompTIA A+ certified professionals have demonstrated baseline security skills for IT support roles and are able to detect and remove malware, address privacy concerns, and troubleshoot core service challenges.

    Certification ID: COMP001021796426

  • CompTIA Cybersecurity Analyst (CySA+)

    CompTIA Cybersecurity Analyst (CySA+) Logo

    Earners of the CompTIA CySA+ certification have the skills, knowledge, and ability to address security analytics, intrusion detection and response. CompTIA CySA+ analysts have demonstrated the ability to perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization and the skills to secure and protect the systems.

    Certification ID: COMP001021796426

  • CompTIA IT Operations Specialist (CIOS)

    CompTIA IT Operations Specialist (CIOS) Logo

    Earners of the CompTIA IT Operations Specialist (CIOS) certification have the ability to manage the flow of a workplace and optimize day-to-day activities. These IT operations specialists have demonstrated the ability to analyze business operations and identify customer needs.

    Certification ID: COMP001021796426

  • CompTIA Linux+

    CompTIA Linux+ Logo

    Earners of the CompTIA Linux+ certification have the knowledge and skills required to succeed as a system administrator supporting Linux systems. CompTIA Linux+ administrators have demonstrated the ability to configure the system, navigate the command line, and use common package management systems.

    Certification ID: COMP001021796426

  • CompTIA Linux Network Professional (CLNP)

    CompTIA Linux Network Professional (CLNP) Logo

    Earners of the CompTIA Linux Network Professional (CLNP) certification are Linux network professionals that are able to provide hands-on support and to monitor critical internal and client systems.

    Certification ID: COMP001021796426

  • CompTIA Network+

    CompTIA Network+ Logo

    Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.

    Certification ID: COMP001021796426

  • CompTIA Project+

    CompTIA Project+ Logo

    Earners of the CompTIA Project+ certification understand the basic concepts to successfully manage small- to medium-sized projects. These business professionals have demonstrated the knowledge and skills required to manage a project lifecycle, ensure proper communication, manage resources and stakeholders and maintain project documentation.

    Certification ID: COMP001021796426

  • CompTIA Secure Infrastructure Specialist (CSIS)

    CompTIA Secure Infrastructure Specialist (CSIS) Logo

    Earners of the CompTIA Secure Infrastructure Specialist (CSIS) certification have the knowledge and skill required to support hardware and software systems. These secure infrastructure specialists will also be able to protect an organization’s assets from internal and external threats.

    Certification ID: COMP001021796426

  • CompTIA Security+

    CompTIA Security+ Logo

    Earners of the CompTIA Security+ certification have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.

    Certification ID: COMP001021796426

  • CompTIA Security Analytics Professional (CSAP)

    CompTIA Security Analytics Professional (CSAP) Logo

    Earners of the CompTIA Security Analytics Professional (CSAP) are security analytics professional that have the ability to plan and carry out security measures to protect an organization’s computer networks and systems.

    Certification ID: COMP001021796426

  • CompTIA Systems Support Specialist (CSSS)

    CompTIA Systems Support Specialist (CSSS) Logo

    Earners of the CompTIA Systems Support Specialist (CSSS) certification are systems support specialists responsible for all aspects of help desk support and technical assistance. These specialists have demonstrated the ability to address a variety of user issues, including troubleshooting software, hardware and networks.

    Certification ID: COMP001021796426

  • CrowdStrike Certified Falcon Administrator (CCFA)

    CrowdStrike Certified Falcon Administrator (CCFA) Logo

    CrowdStrike Certified Falcon Administrators effectively manage the Falcon platform based on the risk profile of your business, including effective user management, deploying and managing the Falcon sensor, configuring deployment and prevention policies based on business risk, configuring allowlists, blocklists, and file-path exclusions, and conducting administrative reporting.

    Certification ID: CCFA-82287090

  • GitLab DevOps Platform Sales Specialist

    GitLab DevOps Platform Sales Specialist Logo

    Develop an understanding of the DevOps lifecycle and how to increase customers’ operational efficiencies.



    Certification ID: N/A

  • Google Cloud Sales Credential

    Google Cloud Sales Credential Logo

    Credential covers Google Cloud and its products and services, how these products and services help customers digitally transform in today’s evolving business world, and how Google Cloud differs from its competitors in transforming companies. Completion of this learning path is part of the Google Cloud Partner Program credential requirements.

    Certification ID: 144300303

  • Google IT Support Professional Certificate

    Google IT Support Professional Certificate Logo

    Covered topics such as network protocols, cloud computing, Windows operating system, Linux command line, systems administration, encryption algorithms and techniques, and more.

    Certification ID: N/A

  • ISACA Certified Information Systems Auditor (CISA)

    ISACA Certified Information Systems Auditor (CISA) Logo

    The CISA certification is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems.

    Certification ID: 221698105

  • ISACA Certified Information Systems Manager (CISM)

    ISACA Certified Information Systems Manager (CISM) Logo

    The management-focused CISM is the globally accepted standard for individuals who design, build and manage enterprise information security programs.

    Certification ID: 221698106

  • ISC2 Certified Authorization Professional (CAP)

    ISC2 Certified Authorization Professional (CAP) Logo

    The vendor-neutral CAP credential confirms knowledge, skill, and experience required for authorizing and maintaining information systems within the new Risk Management Framework as outlined in NIST SP 800-37 Rev 1. CAP validates that an authorization professional has the competence to ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.

    Certification ID: 470771

  • ISC2 Certified in Governance, Risk and Compliance (CGRC)

    ISC2 Certified in Governance, Risk and Compliance (CGRC) Logo

    The vendor-neutral CGRC credential confirms the advanced technical skills and knowledge to understand and apply Governance, Risk and Compliance (GRC) and can authorize and maintain information systems utilizing various risk management frameworks, and best practices, policies and procedures. CGRC validates that an authorization professional has competence to ensure that information systems have security equivalent with the level of exposure to potential risk and damage to assets or individual.

    Certification ID: 470771

  • ISC2 Certified Information Systems Security Professional (CISSP)

    ISC2 Certified Information Systems Security Professional (CISSP) Logo

    The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard information security certification that assures information security leaders possess the breadth and depth of knowledge to establish holistic security programs that protect against threats in an increasingly complex cyber world.

    Certification ID: 470771

  • ISC2 Information Systems Security Architecture Professional (CISSP-ISSAP)

    ISC2 Information Systems Security Architecture Professional (CISSP-ISSAP) Logo

    The vendor-neutral CISSP-ISSAP credential confirms a CISSP’s specialized knowledge and experience in designing security solutions and providing management with risk-based guidance to meet organizational goals.



    Certification ID: 470771

  • ISC2 Information Systems Security Engineering Professional (CISSP-ISSEP)

    ISC2 Information Systems Security Engineering Professional (CISSP-ISSEP) Logo

    The vendor-neutral CISSP-ISSEP credential confirms a CISSP’s specialized knowledge and experience in the practical application of systems engineering principles and processes to develop secure systems.



    Certification ID: 470771

  • ISC2 Information Systems Security Management Professional (CISSP-ISSMP)

    ISC2 Information Systems Security Management Professional (CISSP-ISSMP) Logo

    The vendor-neutral CISSP-ISSMP credential confirms a CISSP’s specialized knowledge and experience in establishing, presenting, and governing information security programs and demonstrate management and leadership skills.



    Certification ID: 470771

  • ISC2 Secure Software Practitioner - Java

    ISC2 Secure Software Practitioner - Java Logo

    Validates the foundational skills to write more secure software and reduce vulnerabilities and re-work. This certificate requires knowledge of secure software concepts, secure software design, OWASP top 10, secure software coding, and defending Java.


    Certification ID: 470771

  • ISC2 Systems Security Certified Practitioner (SSCP)

    ISC2 Systems Security Certified Practitioner (SSCP) Logo

    The vendor-neutral SSCP credential confirms deep technical knowledge and competency in implementing, monitoring, and administering IT Infrastructure in accordance with information security policies and requirements across the organization.


    Certification ID: 470771

  • ITIL 4 Foundation

    ITIL 4 Foundation Logo

    ITIL 4 provides a flexible foundation for organizations that need to integrate various frameworks and approaches into their service management operating models. ITIL 4 aims to help businesses navigate the new technological era of digital services.


    Certification ID: 9980079617425315

  • NVIDIA Certificate of Competency, Fundamentals of Deep Learning for Computer Vision

    NVIDIA Certificate of Competency, Fundamentals of Deep Learning for Computer Vision Logo

    Built and deployed deep learning applications for image classification and object detection, modifying neural networks to improve their accuracy and performance, and implementing learned techniques on a final project.

    Certification ID: 5c7cf7a2c29e4c9bada9fa618d73a8c4

  • PMI Agile Certified Practitioner (PMI-ACP)

    PMI Agile Certified Practitioner (PMI-ACP) Logo

    Earners of the globally-recognized PMI Agile Certified Practitioner (PMI-ACP) have demonstrated their knowledge and skills in agile practices, tools and techniques that are applicable across virtually any industry and methodology. Earners have demonstrated their knowledge and experience with agile principles and mindset, value-driven delivery, stakeholder engagement, team performance, adaptive planning, problem detection and resolution, and continuous improvement.

    Certification ID: 2118663

  • PMI Project Management Professional (PMP)

    PMI Project Management Professional (PMP) Logo

    Earners of the globally-recognized Project Management Professional (PMP) have demonstrated their extensive knowledge and mastery of project management concepts, tasks, and techniques that are applicable across virtually any industry and methodology. Earners are able to speak and understand the global language of project management. Individuals that earn this certification have demonstrated the knowledge and skills needed to initiate, plan, execute, monitor and control, and close a project.

    Certification ID: 2118663

  • ScrumAlliance Certified Scrum Master (CSM)

    ScrumAlliance Certified Scrum Master (CSM) Logo

    A Scrum Master is the Scrum team member tasked with fostering an effective and productive working environment and guiding others to understand Scrum values, principles and practices. Scrum Masters tend to be people-oriented, have a high level of emotional intelligence, and find joy in helping team members to grow.

    Certification ID: 715553

  • ScrumAlliance Certified Scrum Product Owner (CSPO)

    ScrumAlliance Certified Scrum Product Owner (CSPO) Logo

    A Certified Scrum Product Owner® is responsible for maximizing the value of the product resulting from work of the Development Team.

    While the Scrum Master helps the Scrum Team work together to learn and implement Scrum, the Product Owner creates a product vision, order the product backlog, and makes sure the best possible job is done to delight the customers and other stakeholders.

    Certification ID: 715553

  • ScrumAlliance Certified Scrum Professional (CSP)

    ScrumAlliance Certified Scrum Professional (CSP) Logo

    The CSP is an advanced certification that indicates the recipient is both knowledgeable and experienced in the practical and theoretical use of Scrum.

    Certification ID: 715553

  • ScrumAlliance Certified Scrum Professional - Product Owner (CSP-PO)

    ScrumAlliance Certified Scrum Professional - Product Owner (CSP-PO) Logo

    The Certified Scrum Professional-Product Owner (CSP-PO) certification demonstrates an understanding of advanced stakeholder discussion; funding and financing; customer development; product launches; and, advanced product discovery.

    Certification ID: 715553

  • ScrumAlliance Certified Scrum Professional - Scrum Master (CSP-SM)

    ScrumAlliance Certified Scrum Professional - Scrum Master (CSP-SM) Logo

    Certified Scrum Professional-Scrum Master represents the culmination of the path to Certified Scrum Professional (CSP) program and the highest-level accreditation that Scrum Alliance offers to become a Professional Scrum Master.

    Certification ID: 715553

U.S. Government Ratings

U.S. Federal Government workforce management requirements, such as DoD Directive 8570, enumerate requirements for Government ratings and certifications. Such ratings are often precursors to being listed as key personnel on government contracts (e.g. to be a "Principal Investigator").

15 U.S. Government professional ratings and certifications are being actively maintained.


  • DoD Information Assurance Technical Level I (IAT-I)

    DoD Information Assurance Technical Level I (IAT-I) Logo

    IAT Level I personnel make computing environments less vulnerable by correcting flaws and implementing technical information assurance controls in the hardware or software installed within their operational systems.



  • DoD Information Assurance Technical Level II (IAT-II)

    DoD Information Assurance Technical Level II (IAT-II) Logo

    IAT Level II personnel provide network environment and advanced compute environment support. They pay special attention to intrusion detection, finding and fixing unprotected vulnerabilities, and ensuring that remote access points are well secured. These positions focus on threats and vulnerabilities and improve the security of systems. IAT Level II personnel have mastery of the functions of the IAT Level I position.



  • DoD Information Assurance Technical Level III (IAT-III)

    DoD Information Assurance Technical Level III (IAT-III) Logo

    IAT Level III personnel focus on the enclave environment and support, monitor, test, and troubleshoot hardware and software information assurance problems pertaining to the compute environment, network environment, and enclave environments. IAT Level III personnel have mastery of the functions of both the IAT Level I and IAT Level II positions.



  • DoD Information Assurance Workforce System Architect and Engineer Level I (IASAE-I)

    DoD Information Assurance Workforce System Architect and Engineer Level I (IASAE-I) Logo

    IASAE Level I personnel are responsible for the design, development, implementation, and/or integration of a DoD Information Assurance architecture, system, or system component for use within their compute environment. Incumbents ensure that Information Assurance related Information Systems will be functional and secure within the Compute Environment.



  • DoD Information Assurance Workforce System Architect and Engineer Level II (IASAE-II)

    DoD Information Assurance Workforce System Architect and Engineer Level II (IASAE-II) Logo

    IASAE Level II positions are responsible for the design, development, implementation, and/or integration of a DoD Information Assurance architecture, system, or system component for use within the network environment. Incumbents ensure that Information Assurance related Information Systems will be functional and secure within the Network Environment.



  • DoD Information Assurance Workforce System Architect and Engineer Level III (IASAE-III)

    DoD Information Assurance Workforce System Architect and Engineer Level III (IASAE-III) Logo

    IASAE Level III positions are responsible for the design, development, implementation, and/or integration of a DoD Information Assurance architecture, system, or system component for use within Compute Environments, Network Environments, and enclave environments. They ensure that the architecture and design of DoD Information Systems are functional and secure. This may include designs for program of record systems and special purpose environments with platform IT interconnectivity. Incumbents may also be responsible for system or network designs that encompass multiple compute environments and/or network environments to include those with differing data protection/classification requirements.



  • DoD Information Assurance Management Level I (IAM-I)

    DoD Information Assurance Management Level I (IAM-I) Logo

    IAM Level I personnel are responsible for the implementation and operation of a DoD Information System or system DoD Component within their compute environment. Incumbents ensure that information assurance related information systems are functional and secure within the compute environment.



  • DoD Information Assurance Management Level II (IAM-II)

    DoD Information Assurance Management Level II (IAM-II) Logo

    IAM Level II personnel are responsible for the information assurance program for an information system within the network environment. Incumbents in these positions perform a variety of security related tasks, including the development and implementation of system information security standards and procedures. They ensure that information systems are functional and secure within the network environment.



  • DoD Information Assurance Management Level III (IAM-III)

    DoD Information Assurance Management Level III (IAM-III) Logo

    IAM Level III personnel are responsible for ensuring that all enclave information systems are functional and secure. They determine the enclaves’ long term information assurance systems needs and acquisition requirements to accomplish operational directives. They also develop and implement information security standards and procedures through the DoD certification and accreditation process.



  • Computer Network Defense Analyst (CND-A)

    Computer Network Defense Analyst (CND-A) Logo

    CND-A personnel use data collected from a variety of Computer Network Defense (CND) tools (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occure within their environment. Individuals within CND-SPs who collect and analyze event information or perform threat or target analysis duties within the CND-SP shall be considered CND-As.



  • Computer Network Defense Infrastructure Support (CND-IS)

    Computer Network Defense Infrastructure Support (CND-IS) Logo

    CND-IS personnel test, implement, deploy, maintain, and administer the infrastructure systems which are required to effectively maintain the CND-SP network and resources. This may include, but is not limited to routers, firewalls, intrusion detection/prevention systems, and other Computer Network Defense (CND) tools as deployed within the Network Environment or enclave.



  • Computer Network Defense Incident Responder (CND-IR)

    Computer Network Defense Incident Responder (CND-IR) Logo

    CND-IR personnel investigate and analyze all response activities related to cyber incidents within the network environment or enclave. These tasks include, but are not limited to: creating and maintaining incident tracking information; planning, coordating, and directing recovery activities; and incident analysis tasks, including examining all available information and supporting evidence or artifacts related to an incident or event.



  • Computer Network Defense Auditor (CND-AU)

    Computer Network Defense Auditor (CND-AU) Logo

    CND-AU personnel perform assessments of systems and networks within the network environment or enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. CND-AUs achieve this through passive evaluations (compliance audits) and active evaluations (penetration tests and/or vulnerability assessments).



  • Computer Network Defense Service Provider Manager (CND-SPM)

    Computer Network Defense Service Provider Manager (CND-SPM) Logo

    CND-SPMs oversee the CND-SP operations within their organization. CND-SPMs are responsible for producing guidance for their network environment or enclave, assisting with risk assessments and risk management for organizations within their network environment or enclave, and are responsible for managing the technical classifications within their organization.



  • Federal Executive Chief Information Officer (Federal CIO)

    Federal Executive Chief Information Officer (Federal CIO) Logo

    The GSA Federal CIO designation was a graduate level programs that directly addressed federal executive core competencies in order to prepare business leaders for top IT jobs in government and private sector. The purpose of the CIO University was to improve the leadership of information technology in the federal government by enhancing the skills of its top executives.