SlideShare a Scribd company logo
1 of 1
Download to read offline
This is to certify that
Steve J. Collins
has successfully completed
Certified Information Security Manager 2013 Self-Study Course - 11
Hours
March 28, 2016
Certificate https://fedvte.usalearning.gov/getcert.php?course=4
1 of 1 3/28/2016 12:47 PM

More Related Content

More from Steve Collins

Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network SecuritySteve Collins
 
Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)Steve Collins
 
SiLK Traffic Analysis
SiLK Traffic AnalysisSiLK Traffic Analysis
SiLK Traffic AnalysisSteve Collins
 
Securing the Network Perimeter
Securing the Network PerimeterSecuring the Network Perimeter
Securing the Network PerimeterSteve Collins
 
Securing Infrastructure Devices
Securing Infrastructure DevicesSecuring Infrastructure Devices
Securing Infrastructure DevicesSteve Collins
 
Radio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) SecurityRadio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) SecuritySteve Collins
 
Network Monitoring with Open Source Tools
Network Monitoring with Open Source ToolsNetwork Monitoring with Open Source Tools
Network Monitoring with Open Source ToolsSteve Collins
 
Network Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HRNetwork Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HRSteve Collins
 
Linux Operating System Security
Linux Operating System SecurityLinux Operating System Security
Linux Operating System SecuritySteve Collins
 
LAN Security Using Switch Features
LAN Security Using Switch FeaturesLAN Security Using Switch Features
LAN Security Using Switch FeaturesSteve Collins
 
IPv6 Security Essentials Course 12_5_HR
IPv6 Security Essentials Course 12_5_HRIPv6 Security Essentials Course 12_5_HR
IPv6 Security Essentials Course 12_5_HRSteve Collins
 
Introduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HRIntroduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HRSteve Collins
 
Introduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HRIntroduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HRSteve Collins
 
Demilitarized Zone _DMZ_ with IDS_IPS
Demilitarized Zone _DMZ_ with IDS_IPSDemilitarized Zone _DMZ_ with IDS_IPS
Demilitarized Zone _DMZ_ with IDS_IPSSteve Collins
 
Cyber Security Overview for Managers
Cyber Security Overview for ManagersCyber Security Overview for Managers
Cyber Security Overview for ManagersSteve Collins
 
Cyber Security Investigations
Cyber Security InvestigationsCyber Security Investigations
Cyber Security InvestigationsSteve Collins
 
Cyber Risk Management for Managers 11_6_HR
Cyber Risk Management for Managers 11_6_HRCyber Risk Management for Managers 11_6_HR
Cyber Risk Management for Managers 11_6_HRSteve Collins
 
CompTIA A+ 220-802 Certification Prep
CompTIA A+ 220-802 Certification PrepCompTIA A+ 220-802 Certification Prep
CompTIA A+ 220-802 Certification PrepSteve Collins
 

More from Steve Collins (20)

Cert. 1 Excel
Cert. 1 ExcelCert. 1 Excel
Cert. 1 Excel
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)
 
SiLK Traffic Analysis
SiLK Traffic AnalysisSiLK Traffic Analysis
SiLK Traffic Analysis
 
Security and DNS
Security and DNSSecurity and DNS
Security and DNS
 
Securing the Network Perimeter
Securing the Network PerimeterSecuring the Network Perimeter
Securing the Network Perimeter
 
Securing Infrastructure Devices
Securing Infrastructure DevicesSecuring Infrastructure Devices
Securing Infrastructure Devices
 
Radio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) SecurityRadio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) Security
 
Network Monitoring with Open Source Tools
Network Monitoring with Open Source ToolsNetwork Monitoring with Open Source Tools
Network Monitoring with Open Source Tools
 
Network Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HRNetwork Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HR
 
Linux Operating System Security
Linux Operating System SecurityLinux Operating System Security
Linux Operating System Security
 
LAN Security Using Switch Features
LAN Security Using Switch FeaturesLAN Security Using Switch Features
LAN Security Using Switch Features
 
IPv6 Security Essentials Course 12_5_HR
IPv6 Security Essentials Course 12_5_HRIPv6 Security Essentials Course 12_5_HR
IPv6 Security Essentials Course 12_5_HR
 
Introduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HRIntroduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HR
 
Introduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HRIntroduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HR
 
Demilitarized Zone _DMZ_ with IDS_IPS
Demilitarized Zone _DMZ_ with IDS_IPSDemilitarized Zone _DMZ_ with IDS_IPS
Demilitarized Zone _DMZ_ with IDS_IPS
 
Cyber Security Overview for Managers
Cyber Security Overview for ManagersCyber Security Overview for Managers
Cyber Security Overview for Managers
 
Cyber Security Investigations
Cyber Security InvestigationsCyber Security Investigations
Cyber Security Investigations
 
Cyber Risk Management for Managers 11_6_HR
Cyber Risk Management for Managers 11_6_HRCyber Risk Management for Managers 11_6_HR
Cyber Risk Management for Managers 11_6_HR
 
CompTIA A+ 220-802 Certification Prep
CompTIA A+ 220-802 Certification PrepCompTIA A+ 220-802 Certification Prep
CompTIA A+ 220-802 Certification Prep
 

Certified Information Security Manager 2013 Self-Study Course

  • 1. This is to certify that Steve J. Collins has successfully completed Certified Information Security Manager 2013 Self-Study Course - 11 Hours March 28, 2016 Certificate https://fedvte.usalearning.gov/getcert.php?course=4 1 of 1 3/28/2016 12:47 PM