SlideShare a Scribd company logo
1 of 1
Download to read offline
This is to certify that
Steve J. Collins
has successfully completed
Cyber Risk Management for Managers - 6 Hours
March 14, 2016
Certificate https://fedvte.usalearning.gov/getcert.php?course=6
1 of 1 3/14/2016 1:32 PM

More Related Content

Viewers also liked

Cyber Security Overview for Managers
Cyber Security Overview for ManagersCyber Security Overview for Managers
Cyber Security Overview for Managers
Steve Collins
 

Viewers also liked (7)

Samoocenka 2014-2015
Samoocenka 2014-2015Samoocenka 2014-2015
Samoocenka 2014-2015
 
Open for all – the benefits of open data in a digital age_Thorley
Open for all – the benefits of open data in a digital age_ThorleyOpen for all – the benefits of open data in a digital age_Thorley
Open for all – the benefits of open data in a digital age_Thorley
 
Cyber Security Overview for Managers
Cyber Security Overview for ManagersCyber Security Overview for Managers
Cyber Security Overview for Managers
 
EUSKAL HERRIKO IBAIAK
EUSKAL HERRIKO IBAIAKEUSKAL HERRIKO IBAIAK
EUSKAL HERRIKO IBAIAK
 
strategic decision making
strategic decision makingstrategic decision making
strategic decision making
 
The EC FP7 Post-Grant Open Access Pilot Implementation in the UK
The EC FP7 Post-Grant Open Access Pilot Implementation in the UKThe EC FP7 Post-Grant Open Access Pilot Implementation in the UK
The EC FP7 Post-Grant Open Access Pilot Implementation in the UK
 
Joe dispenza-distruge-ţi-obiceiurile-nocive-cum-să-ţi-determini-mintea-să...
Joe dispenza-distruge-ţi-obiceiurile-nocive-cum-să-ţi-determini-mintea-să...Joe dispenza-distruge-ţi-obiceiurile-nocive-cum-să-ţi-determini-mintea-să...
Joe dispenza-distruge-ţi-obiceiurile-nocive-cum-să-ţi-determini-mintea-să...
 

More from Steve Collins

Certified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study CourseCertified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study Course
Steve Collins
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
Steve Collins
 
Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)
Steve Collins
 
SiLK Traffic Analysis
SiLK Traffic AnalysisSiLK Traffic Analysis
SiLK Traffic Analysis
Steve Collins
 
Securing the Network Perimeter
Securing the Network PerimeterSecuring the Network Perimeter
Securing the Network Perimeter
Steve Collins
 
Securing Infrastructure Devices
Securing Infrastructure DevicesSecuring Infrastructure Devices
Securing Infrastructure Devices
Steve Collins
 
Radio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) SecurityRadio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) Security
Steve Collins
 
Network Monitoring with Open Source Tools
Network Monitoring with Open Source ToolsNetwork Monitoring with Open Source Tools
Network Monitoring with Open Source Tools
Steve Collins
 
Network Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HRNetwork Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HR
Steve Collins
 
Linux Operating System Security
Linux Operating System SecurityLinux Operating System Security
Linux Operating System Security
Steve Collins
 

More from Steve Collins (20)

Certified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study CourseCertified Information Security Manager 2013 Self-Study Course
Certified Information Security Manager 2013 Self-Study Course
 
NPCS
NPCSNPCS
NPCS
 
Field Tech Cert.
Field Tech Cert.Field Tech Cert.
Field Tech Cert.
 
Certificate R-56
Certificate R-56Certificate R-56
Certificate R-56
 
Certificate APX
Certificate APXCertificate APX
Certificate APX
 
Cert. R9000
Cert. R9000Cert. R9000
Cert. R9000
 
2 Pages ARTS
2 Pages ARTS2 Pages ARTS
2 Pages ARTS
 
ARTS Collage
ARTS CollageARTS Collage
ARTS Collage
 
Cert 2 Excel
Cert 2 ExcelCert 2 Excel
Cert 2 Excel
 
Cert. 1 Excel
Cert. 1 ExcelCert. 1 Excel
Cert. 1 Excel
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)Software Assurance Executive Course (SAE)
Software Assurance Executive Course (SAE)
 
SiLK Traffic Analysis
SiLK Traffic AnalysisSiLK Traffic Analysis
SiLK Traffic Analysis
 
Security and DNS
Security and DNSSecurity and DNS
Security and DNS
 
Securing the Network Perimeter
Securing the Network PerimeterSecuring the Network Perimeter
Securing the Network Perimeter
 
Securing Infrastructure Devices
Securing Infrastructure DevicesSecuring Infrastructure Devices
Securing Infrastructure Devices
 
Radio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) SecurityRadio Frequency Identification (RFID) Security
Radio Frequency Identification (RFID) Security
 
Network Monitoring with Open Source Tools
Network Monitoring with Open Source ToolsNetwork Monitoring with Open Source Tools
Network Monitoring with Open Source Tools
 
Network Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HRNetwork Layer 1 & 2 Troubleshooting 9_3_HR
Network Layer 1 & 2 Troubleshooting 9_3_HR
 
Linux Operating System Security
Linux Operating System SecurityLinux Operating System Security
Linux Operating System Security
 

Cyber Risk Management for Managers 11_6_HR

  • 1. This is to certify that Steve J. Collins has successfully completed Cyber Risk Management for Managers - 6 Hours March 14, 2016 Certificate https://fedvte.usalearning.gov/getcert.php?course=6 1 of 1 3/14/2016 1:32 PM