Every consultant claims excellence and experience—but in the IT world, there are ways to prove it. Below is a collection of certifications I’ve earned, am currently pursuing, or have planned. Each one reflects a commitment to staying current, building expertise, and delivering real-world results.
In Progress
Estimated Completion: Fall 2026
This degree provides a comprehensive foundation in cybersecurity principles, including risk management, network and system security, ethical hacking, digital forensics, and compliance. It demonstrates a strong understanding of how to protect information systems and ensure data integrity in both corporate and cloud environments.
Estimated Completion: Winter 2026
This degree integrates business strategy with technology leadership, focusing on areas like project management, operations, financial planning, and organizational leadership. It demonstrates the ability to align IT initiatives with business objectives, drive innovation, and lead cross-functional teams in dynamic, fast-paced environments.
Estimated Completion: Spring 2027
This graduate-level degree builds on core cybersecurity expertise with advanced knowledge in strategic risk management, secure systems design, threat mitigation, and governance. It reflects the ability to lead security initiatives, evaluate enterprise-wide vulnerabilities, and implement effective defense-in-depth strategies in complex environments.
Current
Focuses on executive-level leadership, strategic decision-making, and organizational development. This certification supports effective leadership in high-stakes environments and enhances professional growth in both business and cybersecurity contexts.
Covers hands-on cybersecurity fundamentals including threat identification, network security, and incident response. Prepares professionals to assess risk, secure systems, and apply security principles across various environments.
An entry-level certification that validates foundational knowledge across key domains such as security principles, risk management, and incident response. Serves as a baseline credential for pursuing advanced cybersecurity roles and certifications.
Focuses on developing leadership capabilities within IT environments, including process optimization, cross-functional collaboration, and strategic planning. Prepares IT professionals to lead with impact and deliver business-aligned technology solutions.
Estimated Completion: Oct 2025
Widely regarded as the premier certification in cybersecurity, CISSP validates deep, practical expertise across eight domains, including security architecture, risk management, and incident response. It demonstrates advanced technical knowledge and leadership in securing complex environments—and is recognized globally as the benchmark for senior cybersecurity professionals.
Courses in Progress:
Skills Covered:
Courses in Progress:
Skills Covered:
By Dec 2027
A globally respected credential for cybersecurity leaders, CISM focuses on managing and governing enterprise information security. It demonstrates expertise in aligning security programs with business objectives, overseeing risk and compliance, and leading incident response and recovery efforts—making it ideal for those in or pursuing executive security roles.
Focuses on IT service management best practices, providing a framework for aligning IT services with business needs through structured processes and continual improvement.
An advanced-level certification validating expertise in enterprise security, risk management, research and collaboration, and integration of computing, communications, and business disciplines.
Focuses on penetration testing and vulnerability assessment. Demonstrates the ability to identify and exploit system weaknesses in a controlled, ethical manner.
Designed for professionals securing cloud-based environments. Validates advanced technical skills and knowledge in cloud architecture, governance, compliance, and operations.
Technical certification for implementing and maintaining secure IT systems. Focuses on access controls, cryptography, incident response, and applying operational security best practices across enterprise environments.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.