Cybersecurity Training & Mentoring

Clear, practical instruction grounded in real-world experience.

Many professionals need targeted support—whether preparing for certification, strengthening weak areas, or building a clearer understanding of core concepts.

What This Includes

This list of topics is not all the material found when preparing for these certifications. Contact me if you want to enroll in the full course for any of these certifications.

Outcome

Stronger understanding, clearer thinking, and greater confidence in applying cybersecurity principles in challenging certification exams and real-world scenarios.

Access

If you attended a course that I have previously delivered, please enter the credentials (username and password) that I gave you in the course, to access that course information on the Members page.

Experience

At Algonquin College I developed and led five courses, including SQL and Programming. Over the past six years I have delivered 50 training sessions on certificate courses such as those mentioned below, and 10 other sessions on non-certificate courses. The About page illustrates my deep reservoir of technical knowledge and a rich tapestry of industry experiences.

Testimonials

...in a future draft

 

Courses

Introductory offerWriting Audit Reports
This course is free, while I am setting up my new business.

Legend: Key Topic    Overview    Not Applicable
Status: Available    Pending   

Topics Status CISSP CISA CISM CCSP CCNA
Writing Audit Reports
ITAF & IPPD
COBIT & DTEF
Cisco Packet Tracer
Architecture & Design Status CISSP CISA CISM CCSP CCNA
Secure System Design Principles
Defense in Depth
Zero Trust Architecture
Security Models
Trusted Computing Base
Hardware Security (TPM, HSM)
Embedded / IoT Security
Secure Boot / Firmware
Network & Infrastructure Status CISSP CISA CISM CCSP CCNA
Network Segmentation
VLANs and Trunking
Network Access Control
VPN Technologies
Wireless Security
Firewalls
IDS / IPS
Network Monitoring
DNS Security
DDoS Mitigation
Cryptography Status CISSP CISA CISM CCSP CCNA
Symmetric
Key Management
Hashing / Salting
Asymmetric
Digital Certificates
Public Key Infrastructure
Cryptographic Attacks
Quantum Impact
Identity & Access Status CISSP CISA CISM CCSP CCNA
Identity Governance
Single Sign-On
Federation, Delegated
Adaptive Authentication
Privileged Access Management
Security Operations Status CISSP CISA CISM CCSP CCNA
SIEM
SOAR
Threat Intelligence
Threat Hunting
Logging & Monitoring
Digital Forensics
Governance & Risk Status CISSP CISA CISM CCSP CCNA
Governance vs Management
Policies & Standards
Regulatory Frameworks
Business Impact Analysis
Control Types
Assurance vs Audit
Vendor Risk Management
Cloud Security Status CISSP CISA CISM CCSP CCNA
Shared Responsibility Model
Cloud Service Models
Cloud Deployment Models
Cloud Data Security
Cloud IAM
Containers & Kubernetes
Cloud Logging
Application Security Status CISSP CISA CISM CCSP CCNA
Secure SDLC