SlideShare a Scribd company logo
1 of 1
Download to read offline
This is to certify that
Steve J. Collins
has successfully completed
Cloud Computing Security - 1 Hour
March 20, 2016
Certificate https://fedvte.usalearning.gov/getcert.php?course=63
1 of 1 3/21/2016 7:15 AM

More Related Content

Viewers also liked

trilok yadav resume
trilok yadav resumetrilok yadav resume
trilok yadav resume
TRILOK KUMAR
 
Sphere Response International - Services and Capabilities -
Sphere Response International - Services and Capabilities  -Sphere Response International - Services and Capabilities  -
Sphere Response International - Services and Capabilities -
Frank Smyth
 
Updated Resume JB 2016
Updated Resume JB 2016Updated Resume JB 2016
Updated Resume JB 2016
JODIANN BRYAN
 

Viewers also liked (12)

trilok yadav resume
trilok yadav resumetrilok yadav resume
trilok yadav resume
 
Sphere Response International - Services and Capabilities -
Sphere Response International - Services and Capabilities  -Sphere Response International - Services and Capabilities  -
Sphere Response International - Services and Capabilities -
 
Enfermedades infeccionsas
Enfermedades infeccionsasEnfermedades infeccionsas
Enfermedades infeccionsas
 
Roles and Functions of Educational Technology in 21st Century Education
Roles and Functions of Educational Technology in 21st Century EducationRoles and Functions of Educational Technology in 21st Century Education
Roles and Functions of Educational Technology in 21st Century Education
 
Gise exel
Gise exelGise exel
Gise exel
 
Future world ppt
Future world pptFuture world ppt
Future world ppt
 
Didier.de.saint.pierre.es
Didier.de.saint.pierre.esDidier.de.saint.pierre.es
Didier.de.saint.pierre.es
 
A República Oligárquica
A República OligárquicaA República Oligárquica
A República Oligárquica
 
2016 resume
2016 resume2016 resume
2016 resume
 
2__A-1 Basement Plan__24x36
2__A-1 Basement Plan__24x362__A-1 Basement Plan__24x36
2__A-1 Basement Plan__24x36
 
Updated Resume JB 2016
Updated Resume JB 2016Updated Resume JB 2016
Updated Resume JB 2016
 
Presentation 5 (1)
Presentation 5 (1)Presentation 5 (1)
Presentation 5 (1)
 

More from Steve Collins

Certified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study CourseCertified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study Course
Steve Collins
 
Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)
Steve Collins
 
SiLK Traffic Analysis
SiLK Traffic AnalysisSiLK Traffic Analysis
SiLK Traffic Analysis
Steve Collins
 
Securing Infrastructure Devices
Securing Infrastructure DevicesSecuring Infrastructure Devices
Securing Infrastructure Devices
Steve Collins
 
Radio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) SecurityRadio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) Security
Steve Collins
 
Network Monitoring with Open Source Tools
Network Monitoring with Open Source ToolsNetwork Monitoring with Open Source Tools
Network Monitoring with Open Source Tools
Steve Collins
 
Network Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HRNetwork Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HR
Steve Collins
 
Linux Operating System Security
Linux Operating System SecurityLinux Operating System Security
Linux Operating System Security
Steve Collins
 
Introduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HRIntroduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HR
Steve Collins
 
Introduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HRIntroduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HR
Steve Collins
 

More from Steve Collins (20)

Certified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study CourseCertified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study Course
 
NPCS
NPCSNPCS
NPCS
 
Field Tech Cert.
Field Tech Cert.Field Tech Cert.
Field Tech Cert.
 
Certificate R-56
Certificate R-56Certificate R-56
Certificate R-56
 
Certificate APX
Certificate APXCertificate APX
Certificate APX
 
Cert. R9000
Cert. R9000Cert. R9000
Cert. R9000
 
2 Pages ARTS
2 Pages ARTS2 Pages ARTS
2 Pages ARTS
 
ARTS Collage
ARTS CollageARTS Collage
ARTS Collage
 
Cert 2 Excel
Cert 2 ExcelCert 2 Excel
Cert 2 Excel
 
Cert. 1 Excel
Cert. 1 ExcelCert. 1 Excel
Cert. 1 Excel
 
Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)
 
SiLK Traffic Analysis
SiLK Traffic AnalysisSiLK Traffic Analysis
SiLK Traffic Analysis
 
Security and DNS
Security and DNSSecurity and DNS
Security and DNS
 
Securing Infrastructure Devices
Securing Infrastructure DevicesSecuring Infrastructure Devices
Securing Infrastructure Devices
 
Radio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) SecurityRadio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) Security
 
Network Monitoring with Open Source Tools
Network Monitoring with Open Source ToolsNetwork Monitoring with Open Source Tools
Network Monitoring with Open Source Tools
 
Network Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HRNetwork Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HR
 
Linux Operating System Security
Linux Operating System SecurityLinux Operating System Security
Linux Operating System Security
 
Introduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HRIntroduction to Windows Scripting 10_4_HR
Introduction to Windows Scripting 10_4_HR
 
Introduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HRIntroduction to Investigation of Digital Assets 8_4_HR
Introduction to Investigation of Digital Assets 8_4_HR
 

Cloud Computing Security

  • 1. This is to certify that Steve J. Collins has successfully completed Cloud Computing Security - 1 Hour March 20, 2016 Certificate https://fedvte.usalearning.gov/getcert.php?course=63 1 of 1 3/21/2016 7:15 AM