| SonicWall Network Security Professional (SNSP) | SNSP | 
        
      | F5 Networks Configuring BIG-IP Advanced WAF: Web Application Firewall | F5 AWAF | 
        
      | F5 Networks Configuring BIG-IP AFM: Advanced Firewall Manager | F5 AFM | 
        
      | F5 Networks Configuring BIG-IP APM: Access Policy Manager | F5 APM | 
        
      | F5 Networks Configuring BIG-IP DNS: Domain Name System | F5 DNS | 
        
      | F5 Networks Troubleshooting BIG-IP | F5 BIG-IP TRBL | 
        
      | F5 Networks Administering BIG-IP | F5 BIG-IP | 
        
      | GSEC: GIAC Security Essentials Certification | GSEC SEC401 | 
        
      | F5 Networks Configuring BIG-IP LTM: Local Traffic Manager | F5 LTM | 
        
      | CRISC Prep Course | CRISC Prep | 
        
      | CyberSec First Responder: Threat Detection and Response | CFR | 
        
      | CHFI - Computer Hacking Forensic Investigator | EC-CHFI | 
        
      | Check Point Certified Security Expert (CCSE) | Check Point CCSE | 
        
      | Check Point Certified Security Administrator (CCSA) | Check Point CCSA | 
        
      | Check Point Cybersecurity Boot Camp (CCSA+CCSE) | CCSA & CCSE | 
        
      | Certified Ethical Hacker | CEHv13 | 
        
      | Certified Network Defender (CND) | CND | 
        
      | Risk Management Framework (RMF) | RMF | 
        
      | Cybersecurity Specialization: Architecture and Policy | CF Spec Arch | 
        
      | Cybersecurity Specialization: Governance Risk and Compliance | CSF Spec GRC | 
        
      | CCP - Certified CMMC Professional | CMMC CCP | 
        
      | Building a DevSecOps Practice | DevSecOps | 
        
      | Machine Learning Operations (MLOps) and AI Security Boot Camp | TTAI2810 | 
        
      | Mastering AI Security Boot Camp | TTAI2820 | 
        
      | AI Security: Applying AI to the OWASP Top Ten | TTAI2830 | 
        
      | Cybersecurity  Specialization: Identity and Access Management | IAM | 
        
      | Cybersecurity Specialization: Incident Handling | IH | 
        
      | Cybersecurity Specialization: DevSecOps | Cyber Spec DevSec | 
        
      | Cybersecurity Specialization: Threat Modeling | Threat Modeling | 
        
      | PEN-200 - Penetration Testing with Kali Linux (PWK/OSCP) | PEN-200 | 
        
      | PEN-300 - Advanced Evasion Techniques and Breaching Defenses (ETBD/OSEP) | PEN-300 | 
        
      | WEB-300 - Advanced Web Attacks and Exploitation (AWAE/OSWE) | WEB-300 | 
        
      | EXP-301 - Windows User Mode Exploit Development (WUMED/OSED) | EXP-301 | 
        
      | Palo Alto Networks: Cortex XSOAR: Engineering Security Automation Solutions | PAN_XSOAR_Eng | 
        
      | SonicWall Network Security Administrator | SNSA | 
        
      | Introduction to Python Programming for Security Analysts & Professionals | TTPS4894 | 
        
      | Cybersecurity Foundations | CyberFound | 
        
      | Introduction to Cyber Warfare and Operations Design (ICWOD) | ICWOD | 
        
      | CSFI: Defensive Cyber Operations Engineer (DCOE) | CSFI:DCOE | 
        
      | CISM Prep Course | CISM | 
        
      | CISA Prep Course | CISA |