Courses and Certifications that I have taking over the years. Knowledge is the key.

If you are interested in any just send me an email if you want information about them. This is mostly a reference page to other bloggposts.

  • Linux Privilege Escalation for Beginners 2021-01-06
  • Windows Privilege Escalation for Beginners 2021-01-05
  • Practical Ethical Hacking – The Complete Course 2021-01-04
  • Modern C2 and Data Exfiltration 2021-12-16
  • Post Breach FSOS-False Sense of Survival 2021-12-15
  • Intro to Ransomware and Industrial Contol Systems 2021-12-09
  • Ed Therory for Hackers What a Teacher Wants Infosec to know 2021-12-08
  • December 2021 Roundup byWild West Hackin Fest Purple Team 2021-12-02
  • CyberSecurity Festival 2 2021-11-09
  • Sensors 2.0 With Bill Stearns & Jim Ducroiset 2021-11-03
  • Hack for show, Report for Dough 2021-10-28
  • Lord of the Pings Implications of ICMP from a Security Standpoint 2021-10-06
  • Wild West Hackin Fest Deadwood 2021 2021-10-23
  • Password Cracking 101 + 1 2021-09-02
  • Atomic Red Team Hands-on Getting Started Guide with Carrie and Darin Roberts 2021-08-19
  • ELK – Tips, Tricks, and Lessons Learned 2021-08-18
  • The Roundup by Wild West Hackin Fest: Red Team Corey Overstreet 2021-08-12
  • Pure Storage Certified Architect Professional FlashBlade 2021-10-08
  • The Updated Cyber Rosetta Stone with Johan Strand and Kelli Tarala 2021-08-05
  • Pure Storage Certified Implementation Associate 2021-07-30
  • Pure Storage Certified Architect Associate 2021-07-30
  • Pure Storage Certified Architect Professional FlashArray 2021-07-09
  • Pure Storage Implementation Professional FlashArray 2021-07-07
  • Attack Tactics 8 – Poison the Well Jordan Drysdale and David Fletcher 2021-07-01
  • Atomic Red Team Hands-on Getting Started Guide w/ Carrie & Darin Roberts 2021-06-03
  • This traffic looks Suspicious what shall I do? 2021-06-02
  • Regular Expressions, Your New Lifestyle with Joff Thyer 2021-05-25
  • Shellcode Execution with GoLang w Joff Thyer 2021-05-20
  • What2Log.com: Making your life a bit easier 2021-05-19
  • The Quest for the Kill chain Kille Continues 2020-05-13
  • OK, Lets talk about ransomware 2020-05-11
  • WebApp Pentesting 2020-05-07
  • Pentesting in the Cloud 2021-04-27
  • Why a Security Awareness Program Isnt Enough to Secure Your Network 2021-04-27
  • Uncovering Secrets and Simplify your lif with cyberchef 2021-04-22
  • Why Basics are hard AWS Cloud Security 2021-04-21
  • No SPAN port? No Tap? No Problem! With John Strand 2021-04-15
  • How to Build a Phishing Engagement – Coding TTPs with Ralph May 2021-04-01
  • Interviewee Field Manual Hack the Interview with Doug Brush 2021-03-31
  • Cyber Threat Hunting Level 1 With Chris Brenton 2021-03-23
  • Active Defens & Cyber Deception with John Strand 2021-03-19
  • Security DDTTX – Intro to Tabletop Exercises | Amanda Berlin & Jeremy Mio 2021-03-17
  • SiegeCast Pen Test Process Part 3 2021-03-16
  • A Look at Espy 2021-03-11
  • Hackin’ Your Career – Top 10 Ways to Stand Out in Your Cyber Career 2021-03-10
  • PenTest Process Part 2 – The Method 2021-03-09
  • Your Free and Open Source EDR Options with John Strand 2021-03-04
  • Are Becons Evil With bill stearns and Keith Chew 2021-03-03
  • Pen Test Process Part 1 The Start 2021-03-02
  • Lets Git OT Cyber-Physical Secured with Matthew Luallen 2021-02-24
  • Cyber Threat Hunting Level 1 with Chris Brenton 2021-02-23
  • OPSEC Fundamentals for Remote Red Teams with Michael Allen 2021-02-18
  • The Dirty Truth Behind Getting Into Cybersecurity 2021-02-17
  • Sacred Cash Cow Tipping 2021 2021-02-11
  • How to Analyze Encrypted Traffic on Your Network 2021-02-04
  • You Don’t Have To Be Crazy to work here with Doug Brush 2021-01-27
  • Web API Weaknesses 2021-01-19
  • Releasing Your First Python Open Source Project to the Masses 2021-01-13
  • Ethical Hacking: Sql Injections 2020-01-04
  • Upping Your Defense and Detections 2020-12-17
  • SOC Core Skills with John Strand 2020-12-17
  • Unpacking The Packet 2020-12-15
  • SE_ Converged Infrastructure Credential 2020 certificate 2020-12-13
  • SE_ Hyper-Converged Infrastructure Credential 2020 certificate 2020-12-13
  • SE_ MidRange Storage Credential 2020 certificate 2020-12-13
  • SE_ Unstructured Storage Credential 2020 certificate 2020-12-13
  • Infosec Marketing in 2021 with Jon Barnes & Jason Blanchard 4-Hours.pdf 2020-12-09
  • SE_ High-end Storage Credential 2020 certificate 2020-12-07
  • Certified Internet of things Practitioner 2020-12-04
  • Move Aside Script Kiddies Malware Execution in the Age of Advanced Defenses with Joff Thyer 2020-12-03
  • Getting Started with Burp Suite & Webapp Pentesting with BB King 2020-11-12
  • How to cover C&C in The Mitre ATT&CK Matrix With John Strand 2020-11-11
  • High Impact Simple Hacks 2020-11-10
  • Pretty Little Python Secrets Ep 2 Making Pyhton Develpment & Packaging as Beautiful as a Poem with Marcello 2020-10-29
  • The Secret Thoghts of a Successfull Hacker With Nadean Tanner 2020-10-28
  • Cyber Threat Hunting with Chris Brenton 2020-10-24
  • The October Roundup by Wild West Hackin Fest Adversary Emulation with Jorge Orchilles 2020-10-22
  • The SOC Age Or a Young SOC Analysts Illustrated Primer with John Strand 2020-10-15
  • Buffer Overflow 101 2020-10-13
  • The Swag Bag Lan and Hardware Hacking with Rick Wiser 2020-10-14
  • Infosec Mentoring How to find and be a Mentor or Mentee with John Strand ans Jason Blanchard 2020-10-08
  • Passer Effortless Network Knowledge With Bill Stearns 2020-10-07
  • Kerberos & Attack 101 2020-09-15
  • Getting Started with RITA with Chris Brenton 2020-09-09
  • Linux Forensics Magical Mystery Tour II Its All About the Logs WithHal Pomeranz 2020-09-02
  • How to Present Secrets of a retired SANS Instructor with John Strand 2020-08-27
  • Keynote Roundtable with Paul Vixie Lelsly Carhart Marcus J Carey and John Strand 2020-08-20
  • Improve Your security Posture with TrustedSec with Ben Ten & Larry Spohn 2020-08-19
  • Assumed Breach Part 2 2020-08-18
  • Workshop Linux and Security Basics Hands-On with Bill Stearns 2020-08-18
  • Pretty Little Python Secrets 2020-08-13
  • Intro to Tabletop Exercises with Amanda Berlin & Jeremy Mio 2020-08-12
  • Cyber Threat Hunting with Chris Brenton 2020-08-11
  • Ethical Hacking: Hacking Webapplications 2020-08-06
  • Hacking Rita With Lisa Woody 2020-08-05
  • Ethical Hacking: Hacking web Servers 2020-08-05
  • Ethical Hacking: Evading IDS, Firewalls and Honeypots 2020-08-05
  • Ethical Hacking: Session Hijacking 2020-08-03
  • Ethical Hacking: Denial of Service 2020-07-31
  • Ethical Hacking: Social Engineering 2020-07-31
  • Ethical Hacking: Sniffing 2020-07-30
  • Ethical Hacking: Malware Threats 2020-07-30
  • Ethical Hacking: System Hacking 2020-07-30
  • Ethical Hacking: Vulnerability Analysis 2020-07-30
  • Ethical Hacking: Enumeration 2020-07-30
  • Ethical Hacking: Scanning Networks 2020-07-30
  • Ethical Hacking: Reconnaissance/Footprinting 2020-07-30
  • Ethical Hacking: Understanding Ethical Hacking 2020-07-30
  • Selecting the Right Tool(s) for Your Red Team Operation 2020-07-30
  • Advanced Web Application Penetration Testing with Burp Suite 2020-07-30
  • Getting Started in Security with BHIS and Mitre ATT&CK With John Strand 2020-07-30
  • OPSEC for Penetration Tester 2020-07-29
  • Wireless Network Penetration Testing Advanced Techniques 2020-07-29
  • Assumed Breach Par 1 2020-07-28
  • Writing Penetrations Testing Reports 2020-07-28
  • IPv6 Introduction to the protocol 2020-07-27
  • Windows Privilege Escalation for Beginners 2020-07-24
  • Linux Privilege Escalation for Beginners 2020-07-22
  • Practical Ethical Hacking – The complete Course 2020-07-22
  • Atomic Purple Team Framework and life Cycle With Kent Ickler and Jordan Drysdale 2020-07-16
  • Microsoft Azure Fundamentals 2020-07-11
  • What Can Docker Do For Me With Ethan Robish 2020-07-02
  • Exploring BeaKer WithJohn Strand & Chris Brenton 2020-07-01
  • Be Your Enemy 2020-06-30
  • What About Ransomware With John Strand 2020-06-26
  • Zoom isnt Insecure-So Why is it so Insecure with Doc Blackburn 2020-06-25
  • Modern Webapp Pentesting – How to Attack a JWT 2020-06-18
  • How to Give Technical Talks With Bill Stearns 2020-06-17
  • IPv6 How To Securely Start Deploying 2020-06-11
  • Develop Technical Recall Skill Spaced Repetition with Anki 2020-06-10
  • Applied Purple Teaming Infrastructure Threat Optics and Continuous Improvement with Kent and Jordan 2020-06-06
  • Durable Versus Ephemeral Threat Intel With John Strand 2020-06-04
  • Introduction to writing nmap NSE scripts 2020-06-02
  • Breaching the Cloud Perimeter With Beau Bullock 2020-05-28
  • How to See security to C-Levels with Chris Brenton 2020-05-20
  • A Blue Team’s Perceptive on Red Team Hack Tools 2020-05-14
  • Cyber Threat Hunting with Chris Brenton 2020-05-12
  • Kerberos & Attacks 101 2020-04-30
  • SANS Top New Attacks and Threat Repost 2020-04-28
  • How To Build a Home Lab 2020-04-16
  • Purple Team Tactics A Technical Look at Windows 10 Exploits Mitigations 2020-04-15
  • 2020 SANS Cyber Threat Intelligence (CTI) Survey Panel Discussion 2020-02-13
  • Top Five Vulnerability Management Failures and Best Practices 2020-02-11
  • Hyper-Converged Infrastructure Credential 2019 2020-01-16
  • High-End Storage Credential 2019 2020-01-16
  • Converged Infrastructure Credential 2019 2020-01-16
  • MidRange Storage Credential 2019 2020-01-15
  • Licensed Penetration Tester Master 2020-01-02
  • Vmware Expert 2020 2020-01-01
  • 10 Visibility Gaps Every CISO Must Fill 2019-12-13
  • You have to see the criminal to catch the criminal. The most relevant data to monitor ranked 2019-12-06
  • How to Build a Threat Hunting Capability in AWS 2019-12-05
  • Cloud Storage Forensics Endpoint Evidence 2019-12-03
  • Six Steps to Effective ICS Threat Hunting 2019-11-22
  • A Blueprint for Designing a New Security Perimeter 2019-11-18
  • SANS Dark Web Solutions Forum – Illuminating the Dark Web Harvesting and Using OSINT Data from Dark Web Resources 2019-11-15
  • How to Perform a Security Investigation in AWS 2019-11-14
  • Taming Linux for Enterprise Security 2019-11-13
  • Evaluating Network Traffic Analysis Systems – Requirements and Challenges 2019-11-06
  • Top 10 SD-WAN Features that Transform an Enterprise Network 2019-10-29
  • Successful Infosec Consulting 101 2019-10-24
  • Windows User Enumeration Living off the land 2019-10-21
  • HPE Accredited Technical Professional Hybrid IT Solutions V1 2019-10-09
  • Red, Blue and Purple Teams Combining Your Security Capabilities for the Best Outcome 2019-10-03
  • Easing Into Consulting Consulting on The Side & Other Approaches 2019-09-20
  • Micro-Segmentation for Network Security – Strategy to Execution 2019-09-19
  • Advanced Zeek Usage Scripting and Framework 2019-09-10
  • Building HPE Hybrid IT Solutions 2019-09-09
  • How to accelerate your cyber security career 2019-09-05
  • Getting the Knack of ATT&CK 2019-09-03
  • Penetration Testing Setting the Scope and Rules of Engagement 2019-08-24
  • Purple Teaming The Pen-Test Grows Up 2019-08-22
  • Kerberos & Attacks 101 2019-08-21
  • Understanding and Implementing Logging with Microsoft Azure Active Directory 2019-08-12
  • SANS Introduction to Python Course 2019-08-08
  • How to Protect Enterprise Systems with Cloud-Based Firewalls 2019-08-08
  • eLearnSecurity Junior Penetration Tester 2019-08-07
  • Introduction to HPE SMB Hybrid IT Architectures Rev 18.41 2019-08-06
  • Security Inside the Perimeter with Vmware 2019-08-05
  • JumpStart Guide to Cloud-Based Firewalls in AWS 2019-07-31
  • Why Traditional EDR Is Not Working and What to Do About It 2019-07-28
  • A BEAST and a POODLE celebrating SWEET32 2019-07-25
  • Cloud Data Protection 2019-07-25
  • Tips Tricks and Cheats Gathered from Red vs Blue Team-Based Training 2019-07-23
  • Common and Best Practices for Security Operations Centers Results of the 2019 SOC Survey 2019-07-10
  • Authentication It Is All About the User Experience 2019-06-13
  • How to Build a Data Protection Strategy in AWS 2019-06-13
  • SANS 2019 State of OT ICS Cybersecurity Survey 2019-06-12
  • Cybersecurity Frameworks for CISOs 2019-06-12
  • The 20 Critical Security Controls From Framework to Operational to Implementation 2019-06-11
  • The Future of Authentication How Two Factor Authentication is Dying and What’s Next 2019-06-04
  • Fileless Malware Fun 2019-05-28
  • Cloud Security Automation Monitoring and Operations 2019-05-28
  • What Real-World Attacks Look Like and How to Stop Them in Their Tracks 2019-05-23
  • Passive Isnt Good Enough Moving into Active EDR 2019-05-21
  • Everything You Wanted to Know..But Where Too Proud to Ask The Memory Pod 2019-05-19
  • Web application defense – Use headers to make pentesters job difficult 2019-05-15
  • Hacking without Domain Admin 2019-05-14
  • LPT (Master – Advanced Penetration Testing 2019-05-13
  • Pure Storage Certified Associate 2019-05-10
  • How to Secure a Modern Web Application in AWS 2019-05-09
  • How Effective is Your WAF Protection- Metrics & Key Considerations 2019-05-02
  • Delivering Genuine White-Glove Retail Experience with SD-WAN 2019-04-27
  • Python the Big Picture 2019-03-26
  • Pure Storage FlashArray Architect Professional 2019-03-01
  • Pure Storage Sales Accreditiation 2019-03-01
  • Pure Storage Foundations 2019-02-28
  • FlasArray//M Array Management 2019-02-28
  • File vs. Block vs. Object Storage 2019-02-06
  • Certified Ethical Hacker Master 2019-01-30
  • Certified Ethical Hacker Practical 2019-01-30
  • Vmware Expert 2019 2019-01-01
  • DataCore 1-Day Online Troubleshooting Course 2018-11-21
  • Certified Ethical Hacker 2018-07-13
  • Certified Ethical Hacker 2018-07-08
  • Certified Data Protection Specialist (CDPS) 2018-04-15
  • Vmware Network Virtualization Fundamentals 2018-03-07
  • Nutanix NPP 5.0 2017-12-20
  • Specialist Technology Architect, Midrange Storage Soloutions Version 1 2017-11-27
  • Associate – Information Storage and Management Version 3.0 2017-11-27
  • MidRange Storage Credential 2017 2017-11-22
  • IT Transformation Credential 2017 2017-10-27
  • Converge Infrastructure Credential 2017 2017-10-27
  • Vmware Certified Professional (VCP6.5) 2017-08-29
  • VTSP – Server Virtualization 2017 2017-06-15
  • PowerEdge VRTX Sales Overview 2016-12-07
  • HPE Accredited Technical Professional Storage Solutions V2 2016-10-07
  • Microsoft – Upgrading your skills to Windows Server 2016 2016-10-06
  • Foundation OF HPE Storage Solutions 2016-07-10
  • Netapp Enablement Workshop 2016-06-28
  • Vmware vSphere Design and Deploy Fast Track 2016-04-15
  • Veeam Sales Professional 2016-03-14
  • Veeam Technical Sales Professional (VMTSP) 2016-03-14
  • Cisco Data Center Unified Computing Design Specialist 2016-03-01
  • Cisco UCS Accelerated Accreditaion Traiong (UCSAAT) 2016-02-05
  • Vmware Certified Professional (VCP6) 2016-01-15
  • Advanced Transition to Clustered Data ONTAP 2015-12-03
  • Managing HP 3par StoreServ III 2015-10-01
  • Vmware vSphere 6 Whats New 2015-04-29
  • Vmware Certified Professional (VCP550) 2015-01-13
  • Design Active Directory Windows 2003 2014-08-03
  • Managing HP 3par StoreServ II 2014-02-07
  • Managing HP 3par StoreServ I 2014-02-05
  • Windows Server 2012 2013-12-23
  • Netapp Accredited Installation Professional 2 2013-11-14
  • Clustered Data ONTAP Administration 8.2 Update Part 2 2013-10-30
  • Clustered Data ONTAP Administration 8.2 Update Part 1 2013-10-30
  • Clustered Data ONTAP Administration 8.2 Update Part 3 2013-10-30
  • Clustered Data ONTAP Administration 8.2 Update Part 4 2013-10-30
  • Technical Overview of OnCommand System Maanger 2013-10-25
  • Netapp Certified Data Management Administrator NCDA 2013-10-25
  • Hardware and Down Storage System Troubleshooting for Partners 2013-03-19
  • Data ONTAP Cluster-Mode Administration 2013-03-13
  • Ontap Cluster-Mode Administrator 2013-01-02
  • Netapp Certified Backup And Recovery Implementaion Engineer 2012-11-13
  • Vmware View 5 Design Best Practices 2012-06-15
  • Vmware View 5 Install Configure Manage 2012-06-13
  • Operations Manager, Protection Manager and Provisioning Manager Administration 4.0 2012-04-20
  • San Fundamentals ON Data ONTAP 2012-04-16
  • Installing the Deep Cabinet 2012-04-16
  • FAS3000 Series Hardware Maintenance 2012-04-16
  • Technical Overview of Autosupport Family 2012-04-16
  • Netapp Certified Implementation Engineer SAN and Virtualization 2012-04-12
  • Netapp certified SAN Implementation Engineer 2012-04-12
  • Netapp Certfied SAN Implementation Engineer 2012-04-12
  • Storage Efficiency Common Best Practices 2012-04-04
  • Netapp Tools and Resources for Partners 2012-04-04
  • San Design 2012-04-04
  • Introduction to CIFS Administration 2012-04-04
  • Introduction to Netapp Products 2012-04-03
  • SnapMirror Planning and Implementation 2012-04-03
  • Snapmirror Performance and Best Practices 2012-04-03
  • ONTAP 8.0 7-Mode Administrator 2012-03-30
  • Netapp Certified Data Management Administrator NCDA 2012-03-30
  • Netapp Certfied Data Management Administrator 2012-03-30
  • NCDA Boot Camp 2011-12-02
  • Data ONTAP 8.1 7-Mode New Features 2011-11-29
  • Data ONTAP 8 Cabling 2011-11-29
  • High Availability for Data ONTAP 7-Mode 2011-11-29
  • Compliance: SE Core Assessment 2011-11-29
  • SAN: SE Core Assessment 2011-11-29
  • Ethernet Storage: SE Core Assessment 2011-11-29
  • Virtualization: SE Core assessment 2011-11-29
  • Vmware Certified Professional (VCP5) 2011-10-29
  • HP Master Accredited Systems Engineer StorgeWorks Solutions 2011-10-27
  • HP Accredited Systems Engineer StorageWorks Integration 2011-10-27
  • Designing HP Storage Datacenter Solutions 2011-10-21
  • getting Started with Foundation Software Pack Efficient Provisioning 2011-10-13
  • Gettings Started With Netapp Software Streamlined Data Protection for Vmware 2011-09-02
  • Cerfied Security Smart Card Expert 2011-03-24
  • Designing HP StorgeWorks Soloutions 2010-12-21
  • Accredited Presales Consultant HP StorageWorks Solutions 2010-12-21
  • Vmware vSphere Design workshop V4 2010-06-23
  • Vmware vSphere Manager for Performance v4 2010-05-28
  • Updating Skills to Windows 2008 2010-03-05
  • Implementing HP Proliant ML/DL Servers 2010-01-15
  • Accredited Integration Specialist HP Proliant ML/DL Server 2007 2010-01-15
  • Novell Open Enterprise Server 2 Advanced Services and Troubleshooting 2009-12-11
  • Vmware Certified Professional (VCP4) 2009-11-04
  • Designing HP StorageWorks Solutions 2009-11-04
  • Accredited Presales Consultant 2009 2009-11-04
  • VMware Technical Sales Professional 4 2009-10-26
  • VMWare Sales Person 4 2009-10-26
  • Comptia Server + 2009-05-28
  • Certified Novell Salesperson 2009-05-06
  • Systems and Resource Management Specialist 2009 2009-05-06
  • Project Management 2009-05-05
  • Vmware Infrastructure Whats New 2009-04-28
  • Sanrads Storage Solutions 2009-02-20
  • Advanced SAN Architecture 2008-12-19
  • Replication Solutions for the HP StorageWorks EVA 2008-12-19
  • Master Accredited Systems Engineer HP Storage Works 2008 2008-12-19
  • Accredited System Engineer Specialty in HP Storage Essentials 2008 2008-12-19
  • Master Accredited Systems Engineer HP San Architect – data Availability Solutions 2008-12-19
  • Novell Certified Linux Desktop Administrator (CLDA) 2008-12-15
  • SUSE Linux Enterpris Desktop 10 Administration 2008-12-11
  • Designing and Implementing HP Enterprise Backup Solutions 2008-12-11
  • Accredited System Engineer HP Storage Works 2008 2008-12-11
  • HP Storage Essentials SRM Enterprise Edition 2008-12-08
  • HP Storage Essentials SRM Standard Edition 2008-12-08
  • Accredited System Engineer HP Storage Works 2005 2008-12-08
  • Advanced Technical Training Novell GroupWise 8 Administration 2008-12-04
  • ASE HP StorageWorks Fast Forward 2008-11-21
  • Novell Certifies Administrator (CNA) 2008-11-17
  • Novell Certified Engineer (CNE) 2008-11-17
  • Upgradning to Novell Open Enterprise Server for Netware 2008-11-14
  • Accredited Integration Specialist HP StorageWorks 2008 2008-11-14
  • Certified Novell Administrator Open Enterprise Server For Netware 2008-11-14
  • Certified Novell Engineer Open Enterpriser Server for Netware 2008-11-14
  • Implementing HP StorageWorks EVA Solutions 2008-11-13
  • Accredited Presales Consultant HP Enterprise Storage Solutions 2008-11-13
  • Designing and Implementing HP San Soloutions 2008-11-05
  • MSA Storage Soloutions 2008-11-05
  • AIS HP StorageWorks Fast Forward 2008-10-12
  • Accredited Platform Specialist HP Commercial Desktops, Workstations and Notebooks 2008-05-23
  • Advanced Network Security 2007-04-19
  • IBM System P5 Technical Mastery 2007-03-21
  • Certified Novell Salesperson 2007-01-12
  • Vmware Certified Professional (VCP3) 2006-12-06
  • Lenovo Mobile Systems 2006-08-15
  • Lenovo Desktop Systems 2006-08-15
  • Vmware Infrastructure 3 Whats new 2006-06-15
  • Vmware Certified Professional (VCP101V) 2006-06-02
  • MobilityGuard Administration 2006-03-09
  • Advanced Technical Training SUSE Linux Enterprise Server 9 Optimizing & Troubleshoot 2006-01-19
  • Vmware Virtual Infrastructure With ESX Server and VirtualCenter 2005-11-25
  • Novell Certified Linux Salesperson 2005-05-26
  • Certified Novell Salesperson 2005-05-26
  • OES Quick Train 2005-02-18
  • Novell Certified Linux Salesperson 2004-08-31
  • Nsure Identity Manager 2 2004-04-30
  • Certified Novell Salesperson 2004-03-30
  • Nterprise Linux Services First Class 2004-01-09
  • Introduction to IBM ThinkVantage Technologies – IBM Secure Wireless Solutions (TXW15-R2) 2003-11-12
  • Introduction to IBM ThinkVantage Technologies-IBM Migration and Uptime Solutions (TXW16-R2) 2003-11-12
  • Introduction to the IBM ThinkVantage Technologies-IBM Security Solutions (TXW14-R2) 2003-11-12
  • Linux System Administration 2003-09-26
  • Updatning skills Windows 2000 – 2003 Server Workshop 2003-06-13
  • Certified Novell Administrator Netware 6 2003-01-27
  • Certified Novell Engineer Netware 6 2003-01-27
  • IBM eServer xseries Service and Support Simulations Test (MEC02-R2) 2003-01-27
  • IBM Desktop Systems (RDC02) 2003-01-27
  • IBM eServer xseries Technical Principles and Problem determination Test (MEC01-R1.1) 2003-01-27
  • Advanced Technical Training Novell BorderManager 3.7 2002-08-22
  • Advanced Technical Training Novell Netware 6 2002-08-16
  • Advanced Technical Training Novell Advanced DirXML 2002-04-12
  • Small Business Suite 6 QuickTrain 2001-11-15
  • Novell NetDevices NAS QuickTrain 2001-11-15
  • Novell eProvisioning QuickTrain 2001-11-15
  • Certified Novell Salesperson 2001-11-13
  • Advanced Technical Training Novell ZenWorks for Dekstops 3 2001-10-27
  • Netware6 Workshop 2001-10-14
  • Netware6 QuickTrain Course 2001-10-01
  • IBM eServer Certified Systems Expert xSeries 2001-09-05
  • Certified Novell Salesperson 2001-05-21
  • N995: Directory Technologies 2000-12-21
  • Certified Novell Salesperson 2000-11-07
  • Advanced NDS Tools and Diagnistics 2000-11-03
  • Internet Security Management with BorderManager 2000-10-06
  • Certified Novell Engineer Netware 5 2000-10-03
  • Interconnecting Cisco Network Devices 2000-06-29
  • IBM eServer Certified Systems Expert xSeries 1999-11-04
  • Netware 5.0 Advanced Administration 1999-04-23
  • Vinca Certified Engineer 1999-03-31
  • Networking Technologies 1999-03-05
  • Certified Novell Administrator Netware 5 1999-02-26
  • Netware 5.0 Administration 1999-02-12
  • Citrix Certified Professional (Citrix Winframe) 1998-05-05
  • Citrix Winframe 1.7 1998-02-12
  • IBM Gold Member 1998-01-28
  • IBM Gold Member 1997-08-19
  • Netware 4.x Installation & Configuration 1997-06-06
  • Netware 4.x Advanced Administration 1997-05-23
  • IBM Server Netware 1997-04-08
  • IBM Professional Server Specialist 1997-02-03
  • IBM Gold Member 1997-01-29
  • IBM Server Technical Training 1996-10-02
  • Netware 3.x update to 4,x 1995-10-06
  • Installation course Netware 3.x 1995-09-08
  • System Administration Level 2 Netware 3.x 1995-09-06
  • Lotus Notes Application Develpment I 1995-04-12
  • System Administration Level 1 Netware 3.x 1995-03-16
  • Lotus Notes Administration I 1995-01-27
  • IBM PS/2 Service Course 1994-11-28

1 Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.