Owlcrest Solutions
Owlcrest Solutions
  • Home
  • Credentials
  • Articles
  • About
  • More
    • Home
    • Credentials
    • Articles
    • About
  • Home
  • Credentials
  • Articles
  • About

Certifications That Speak Louder Than Buzzwords

 Every consultant claims excellence and experience—but in the IT world, there are ways to prove it. Below is a collection of certifications I’ve earned, am currently pursuing, or have planned. Each one reflects a commitment to staying current, building expertise, and delivering real-world results. 

My Qualifications

Education

In Progress

Bachelor of Science - Cybersecurity and Information Assurance

Estimated Completion: Fall 2026

This degree provides a comprehensive foundation in cybersecurity principles, including risk management, network and system security, ethical hacking, digital forensics, and compliance. It demonstrates a strong understanding of how to protect information systems and ensure data integrity in both corporate and cloud environments. 

Master of Business Administration, IT Management

Estimated Completion: Winter 2026

This degree integrates business strategy with technology leadership, focusing on areas like project management, operations, financial planning, and organizational leadership. It demonstrates the ability to align IT initiatives with business objectives, drive innovation, and lead cross-functional teams in dynamic, fast-paced environments. 

Master of Science - Cybersecurity and Information Assurance

Estimated Completion: Spring 2027

This graduate-level degree builds on core cybersecurity expertise with advanced knowledge in strategic risk management, secure systems design, threat mitigation, and governance. It reflects the ability to lead security initiatives, evaluate enterprise-wide vulnerabilities, and implement effective defense-in-depth strategies in complex environments.


Certifications

Current

Certified Executive Leader (CEL) – McAfee Institute

Focuses on executive-level leadership, strategic decision-making, and organizational development. This certification supports effective leadership in high-stakes environments and enhances professional growth in both business and cybersecurity contexts. 

Google Cybersecurity Certificate – Google / Coursera

Covers hands-on cybersecurity fundamentals including threat identification, network security, and incident response. Prepares professionals to assess risk, secure systems, and apply security principles across various environments. 

Certified in Cybersecurity (CC) – (ISC)²

An entry-level certification that validates foundational knowledge across key domains such as security principles, risk management, and incident response. Serves as a baseline credential for pursuing advanced cybersecurity roles and certifications. 

IT Professional Leadership Certificate – ServiceNow

Focuses on developing leadership capabilities within IT environments, including process optimization, cross-functional collaboration, and strategic planning. Prepares IT professionals to lead with impact and deliver business-aligned technology solutions. 


Current Skill Track

Estimated Completion: Oct 2025

Certified Information Systems Security Professional - (ISC)²

Widely regarded as the premier certification in cybersecurity, CISSP validates deep, practical expertise across eight domains, including security architecture, risk management, and incident response. It demonstrates advanced technical knowledge and leadership in securing complex environments—and is recognized globally as the benchmark for senior cybersecurity professionals. 

Microsoft 365

 

Courses in Progress:

  • MS-900 – Microsoft 365 Fundamentals
     
  • MD-102 – Endpoint Administrator
     
  • MS-102 – Microsoft 365 Administrator
     
  • SC-300 – Identity and Access Administrator (shared with Azure)
     

Skills Covered:

  • Microsoft 365 Admin Center
     
  • Exchange, SharePoint, Teams, OneDrive
     
  • Intune (Endpoint Manager) for device deployment
     
  • Identity and access management via Entra ID
     
  • Security, compliance, and governance for M365

Microsoft Azure

 

Courses in Progress:

  • AZ-900 – Azure Fundamentals
     
  • AZ-104 – Azure Administrator Associate
     
  • AZ-500 – Azure Security Engineer Associate
     
  • SC-300 – Identity and Access Administrator (shared with M365)
     

Skills Covered:

  • Azure resource deployment and management
     
  • Virtual networking, storage, and compute
     
  • Azure AD / Entra ID integration
     
  • Role-based access control (RBAC) and key security features
     
  • Threat protection and cloud compliance solutions


Future Certifications

By Dec 2027

Certified Information Security Manager (CISM) – ISACA

A globally respected credential for cybersecurity leaders, CISM focuses on managing and governing enterprise information security. It demonstrates expertise in aligning security programs with business objectives, overseeing risk and compliance, and leading incident response and recovery efforts—making it ideal for those in or pursuing executive security roles.  

ITIL® Foundation Certification – AXELOS

Focuses on IT service management best practices, providing a framework for aligning IT services with business needs through structured processes and continual improvement. 

SecurityX / CASP+ – CompTIA

An advanced-level certification validating expertise in enterprise security, risk management, research and collaboration, and integration of computing, communications, and business disciplines. 

PenTest+ – CompTIA

Focuses on penetration testing and vulnerability assessment. Demonstrates the ability to identify and exploit system weaknesses in a controlled, ethical manner. 

Certified Cloud Security Professional (CCSP) – (ISC)²

Designed for professionals securing cloud-based environments. Validates advanced technical skills and knowledge in cloud architecture, governance, compliance, and operations. 

Systems Security Certified Practitioner (SSCP) – (ISC)²

Technical certification for implementing and maintaining secure IT systems. Focuses on access controls, cryptography, incident response, and applying operational security best practices across enterprise environments. 

Copyright © 2025 Owlcrest Solutions - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept