QUALIFICATIONS
Welcome to my Qualifications page, where you can discover my credentials, certifications, and educational background in the field of cybersecurity. With a strong foundation of expertise and a dedication to ongoing learning, I am equipped with the skills and knowledge necessary to deliver exceptional cybersecurity solutions. Explore below to learn more about my qualifications and how they contribute to the quality and reliability of the services I provide.
Academic Qualifications
MSc in Cyber Security
Coventry University – UK
BSc (Hons) in Ethical Hacking and Network Security
Coventry University – UK
Professional Qualifications
Cisco Certified Network Associate (CCNA) – Click to verify
Cisco IOS XR Broadband Network Gateway Implementation and Verification v1.0 – CDLL-2HTRWSKXQ2
Microsoft Azure Administrator Associate (AZ104) – Click to verify
Certifications
Mastering Pentesting using Kali Linux
Digital Forensics Essentials (DFE)
Network Defense Essentials (NDE)
Ethical Hacking Essentials (EHE)
Microsoft Defender for Identity Ninja Training Certificate
Microsoft 365: Implement Security and Threat Management Certificate
Microsoft Office 365: Administration (Office 365/Microsoft 365) Certificate
Cisco IoT Fundamentals: Connecting Things Certificate
NDG Linux Essentials Certificate (LPI)
PCAP: Programming Essentials in Python Certificate (OpenEDG)
Cisco Introduction to IoT Certificate
Understanding of Cisco Network Devices Certificate
Thank you for exploring my qualifications in the field of cybersecurity. As the digital landscape continues to evolve, I remain dedicated to staying abreast of emerging trends, technologies, and best practices. By continuously expanding my expertise and honing my skills, I ensure that I am well-equipped to address the ever-changing challenges of cybersecurity. If you have any questions or would like to learn more about how my qualifications can benefit your organization, please don’t hesitate to reach out. I look forward to the opportunity to collaborate with you and contribute to your cybersecurity objectives.