SlideShare a Scribd company logo
”
”
Get tech savvy in a booming field: 								
• AutoCAD Essentials; Intermediate; Advanced
• Bookkeeper Professional
• Cisco CCNA
• Ethical Hacker
• Information Systems Security Professional
• Social Media Marketing
• Web Design & Development
Technology Programs
ccpe.kennesaw.edu // 470-578-6765
EMPOWER // REINVENT // SUCCEED
GAIN AN EDGE
Productivity is the key to success. Maintain your competitive edge by staying current in the fluid
field of technology. These courses are designed for individuals seeking to change or advance in their
careers, or for businesses looking to train employees to help boost the company’s bottom line.
The instructors were actually subject
matter experts actively working in
the profession they teach. The return
on investment was huge.
David Drake,
Web Design & Development graduate
“The ISSP program helped me
tremendously with getting my arms
around the concept of cyber security.
It was of great benefit to someone
who has not yet worked in an
IT department.
Annette Reed,
Information Systems Security
Professional (ISSP) graduate
COLLEGE OF CONTINUING & PROFESSIONAL EDUCATION
TECHNOLOGY PROGRAMS
AutoCAD Essentials; Intermediate; Advanced
Learn the most widely used computer-aided design (CAD) software for producing
architectural, engineering and construction drawings. This class benefits individuals
in engineering, construction, and architecture industries.
Bookkeeper Professional
Are you a number cruncher? This unique course will provide you the skills necessary
to become savvy with the QuickBooks accounting software package installed on an
individually-assigned, remote computer.
Cisco CCNA
Gain knowledge to earn the necessary credentials to advance your networking career.
Cisco certifications are among the top-paying IT certifications (Global Knowledge).
Ethical Hacker
Become an expert who systematically attempts to penetrate a computer system or
network. By identifying weaknesses in target systems, you will use the same methods
and tools as a hacker, but in a lawful and ethical manner to evaluate the target
system’s security.
Information Systems Security Professional
Data breaches continue at alarming rates. Be the solution by learning to secure
information systems while becoming thoroughly familiar with the domains of the
CISSP® Common Body of Knowledge.
Social Media Marketing
Are you social savvy? Catch up with one of the fastest moving mediums by effectively
using social media to market your business, expand brand awareness, and increase
exposure and – ultimately – revenue.
Web Design & Development
Learn the integral design principles and industry tools to put you at the forefront of
technology. The Department of Labor projects Web Designer jobs to increase by 20%
through 2022.
Gain an Edge
ccpe.kennesaw.edu // 470-578-6765
REINVENT
SUCCEED
EMPOWER

More Related Content

What's hot

NodeJS Application Development services
 NodeJS Application Development services NodeJS Application Development services
NodeJS Application Development services
Oodles Technologies Pvt. Ltd.
 
CraftTurf Brochure
CraftTurf BrochureCraftTurf Brochure
CraftTurf Brochure
OlawaleBernardAdesin
 
Container Security: What Enterprises Need to Know
Container Security: What Enterprises Need to KnowContainer Security: What Enterprises Need to Know
Container Security: What Enterprises Need to Know
DevOps.com
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
accenture
 
Mendix learning by Sunil Kumar
Mendix learning by Sunil KumarMendix learning by Sunil Kumar
Mendix learning by Sunil Kumar
SunilKumar706490
 
Managing Compliance in Container Environments
Managing Compliance in Container EnvironmentsManaging Compliance in Container Environments
Managing Compliance in Container Environments
Twistlock
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
Cisco Russia
 
What is the Goal of Data Center Security
What is the Goal of Data Center SecurityWhat is the Goal of Data Center Security
What is the Goal of Data Center Security
42U Data Center Solutions
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
NetworkCollaborators
 
How to Build a Great Web Application
How to Build a Great Web ApplicationHow to Build a Great Web Application
How to Build a Great Web Application
Mike McNeil
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
SlideTeam
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
Elasticsearch
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
NetworkCollaborators
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
Software Park Thailand
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentDevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
Adhitya Hartowo
 
How to Make New Nonprofit Videos from Old Content Using Adobe Rush
How to Make New Nonprofit Videos from Old Content Using Adobe RushHow to Make New Nonprofit Videos from Old Content Using Adobe Rush
How to Make New Nonprofit Videos from Old Content Using Adobe Rush
TechSoup
 
Threat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps CulturesThreat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps Cultures
DevOps Indonesia
 

What's hot (20)

NodeJS Application Development services
 NodeJS Application Development services NodeJS Application Development services
NodeJS Application Development services
 
CraftTurf Brochure
CraftTurf BrochureCraftTurf Brochure
CraftTurf Brochure
 
Container Security: What Enterprises Need to Know
Container Security: What Enterprises Need to KnowContainer Security: What Enterprises Need to Know
Container Security: What Enterprises Need to Know
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Mendix learning by Sunil Kumar
Mendix learning by Sunil KumarMendix learning by Sunil Kumar
Mendix learning by Sunil Kumar
 
Managing Compliance in Container Environments
Managing Compliance in Container EnvironmentsManaging Compliance in Container Environments
Managing Compliance in Container Environments
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
What is the Goal of Data Center Security
What is the Goal of Data Center SecurityWhat is the Goal of Data Center Security
What is the Goal of Data Center Security
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
 
How to Build a Great Web Application
How to Build a Great Web ApplicationHow to Build a Great Web Application
How to Build a Great Web Application
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - jordan koh
Cisco Connect 2018 Singapore -  jordan kohCisco Connect 2018 Singapore -  jordan koh
Cisco Connect 2018 Singapore - jordan koh
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
DevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production EnvironmentDevOps Indonesia - DevSecOps - Application Security on Production Environment
DevOps Indonesia - DevSecOps - Application Security on Production Environment
 
How to Make New Nonprofit Videos from Old Content Using Adobe Rush
How to Make New Nonprofit Videos from Old Content Using Adobe RushHow to Make New Nonprofit Videos from Old Content Using Adobe Rush
How to Make New Nonprofit Videos from Old Content Using Adobe Rush
 
Threat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps CulturesThreat Modelling in DevSecOps Cultures
Threat Modelling in DevSecOps Cultures
 

Similar to Technology Certificates at KSU

The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
Mercury Solutions Limited
 
Cisco datacentercertificatione guide-2017
Cisco datacentercertificatione guide-2017Cisco datacentercertificatione guide-2017
Cisco datacentercertificatione guide-2017
Fayyaz Ahmed
 
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional CertificationsTop Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
jeetendra mandal
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
infosec train
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
KaganMinare
 
Secure-Net Technologies
Secure-Net TechnologiesSecure-Net Technologies
Secure-Net Technologies
Namita Mahajan
 
The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
Calvin Sam
 
Top Skills Every Data Center Engineer Should Master.pdf
Top Skills Every Data Center Engineer Should Master.pdfTop Skills Every Data Center Engineer Should Master.pdf
Top Skills Every Data Center Engineer Should Master.pdf
IDCA
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)Jason Chapman
 
Datasheet
DatasheetDatasheet
Datasheet
Carlos urrea
 
Innovation Women Speak! Career Pivot - How to Break into Cybersecurity
Innovation Women Speak! Career Pivot - How to Break into CybersecurityInnovation Women Speak! Career Pivot - How to Break into Cybersecurity
Innovation Women Speak! Career Pivot - How to Break into Cybersecurity
Innovation Women
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
insightssuccess2
 
How to choose cybersecurity academy in Kerala
How to choose cybersecurity academy in KeralaHow to choose cybersecurity academy in Kerala
How to choose cybersecurity academy in Kerala
pranavvs2024
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fields
ankur bhalla
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
InfoSec4TC
 
DCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHURE
DCDNA
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
accenture
 
CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™
CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™
CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™
USDSI
 

Similar to Technology Certificates at KSU (20)

The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Cisco datacentercertificatione guide-2017
Cisco datacentercertificatione guide-2017Cisco datacentercertificatione guide-2017
Cisco datacentercertificatione guide-2017
 
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional CertificationsTop Certification for 2023 Top 10 Certifications Top Professional Certifications
Top Certification for 2023 Top 10 Certifications Top Professional Certifications
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
CSI Promotional Brochure
CSI Promotional BrochureCSI Promotional Brochure
CSI Promotional Brochure
 
Secure-Net Technologies
Secure-Net TechnologiesSecure-Net Technologies
Secure-Net Technologies
 
The Ultimate Roadmap For CompTIA Training & Certifications
 The Ultimate Roadmap For CompTIA Training & Certifications The Ultimate Roadmap For CompTIA Training & Certifications
The Ultimate Roadmap For CompTIA Training & Certifications
 
Top Skills Every Data Center Engineer Should Master.pdf
Top Skills Every Data Center Engineer Should Master.pdfTop Skills Every Data Center Engineer Should Master.pdf
Top Skills Every Data Center Engineer Should Master.pdf
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
 
Datasheet
DatasheetDatasheet
Datasheet
 
Innovation Women Speak! Career Pivot - How to Break into Cybersecurity
Innovation Women Speak! Career Pivot - How to Break into CybersecurityInnovation Women Speak! Career Pivot - How to Break into Cybersecurity
Innovation Women Speak! Career Pivot - How to Break into Cybersecurity
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
How to choose cybersecurity academy in Kerala
How to choose cybersecurity academy in KeralaHow to choose cybersecurity academy in Kerala
How to choose cybersecurity academy in Kerala
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fields
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
 
DCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHURE
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™
CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™
CERTIFIED ARTIFICIAL INTELLIGENCE ENGINEER - CAIE™
 

More from College of Continuing and Professional Education

OLLI Courses January 2019
OLLI Courses January 2019OLLI Courses January 2019
OLLI Director Dick Harp Retirement Recognition
OLLI Director Dick Harp Retirement RecognitionOLLI Director Dick Harp Retirement Recognition
OLLI Director Dick Harp Retirement Recognition
College of Continuing and Professional Education
 
June 2017 Certificate Program Graduation
June 2017 Certificate Program GraduationJune 2017 Certificate Program Graduation
June 2017 Certificate Program Graduation
College of Continuing and Professional Education
 
Breanna Schnitger, KSU Phlebotomy Graduate
Breanna Schnitger, KSU Phlebotomy GraduateBreanna Schnitger, KSU Phlebotomy Graduate
Breanna Schnitger, KSU Phlebotomy Graduate
College of Continuing and Professional Education
 
Spring Break Camps in the Marietta Daily Journal
Spring Break Camps in the Marietta Daily JournalSpring Break Camps in the Marietta Daily Journal
Spring Break Camps in the Marietta Daily Journal
College of Continuing and Professional Education
 
A Growing Aging Population
A Growing Aging PopulationA Growing Aging Population
Top Jobs in Georgia
Top Jobs in GeorgiaTop Jobs in Georgia
Financial Aid Flowchart
Financial Aid FlowchartFinancial Aid Flowchart
CIA — Crime Investigation Adventures Camp (Summer University)
CIA — Crime Investigation Adventures Camp (Summer University)CIA — Crime Investigation Adventures Camp (Summer University)
CIA — Crime Investigation Adventures Camp (Summer University)
College of Continuing and Professional Education
 
FAQs for TESOL: Teaching English to Speakers of Other Languages
FAQs for TESOL: Teaching English to Speakers of Other LanguagesFAQs for TESOL: Teaching English to Speakers of Other Languages
FAQs for TESOL: Teaching English to Speakers of Other Languages
College of Continuing and Professional Education
 

More from College of Continuing and Professional Education (10)

OLLI Courses January 2019
OLLI Courses January 2019OLLI Courses January 2019
OLLI Courses January 2019
 
OLLI Director Dick Harp Retirement Recognition
OLLI Director Dick Harp Retirement RecognitionOLLI Director Dick Harp Retirement Recognition
OLLI Director Dick Harp Retirement Recognition
 
June 2017 Certificate Program Graduation
June 2017 Certificate Program GraduationJune 2017 Certificate Program Graduation
June 2017 Certificate Program Graduation
 
Breanna Schnitger, KSU Phlebotomy Graduate
Breanna Schnitger, KSU Phlebotomy GraduateBreanna Schnitger, KSU Phlebotomy Graduate
Breanna Schnitger, KSU Phlebotomy Graduate
 
Spring Break Camps in the Marietta Daily Journal
Spring Break Camps in the Marietta Daily JournalSpring Break Camps in the Marietta Daily Journal
Spring Break Camps in the Marietta Daily Journal
 
A Growing Aging Population
A Growing Aging PopulationA Growing Aging Population
A Growing Aging Population
 
Top Jobs in Georgia
Top Jobs in GeorgiaTop Jobs in Georgia
Top Jobs in Georgia
 
Financial Aid Flowchart
Financial Aid FlowchartFinancial Aid Flowchart
Financial Aid Flowchart
 
CIA — Crime Investigation Adventures Camp (Summer University)
CIA — Crime Investigation Adventures Camp (Summer University)CIA — Crime Investigation Adventures Camp (Summer University)
CIA — Crime Investigation Adventures Camp (Summer University)
 
FAQs for TESOL: Teaching English to Speakers of Other Languages
FAQs for TESOL: Teaching English to Speakers of Other LanguagesFAQs for TESOL: Teaching English to Speakers of Other Languages
FAQs for TESOL: Teaching English to Speakers of Other Languages
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 

Technology Certificates at KSU

  • 1. ” ” Get tech savvy in a booming field: • AutoCAD Essentials; Intermediate; Advanced • Bookkeeper Professional • Cisco CCNA • Ethical Hacker • Information Systems Security Professional • Social Media Marketing • Web Design & Development Technology Programs ccpe.kennesaw.edu // 470-578-6765 EMPOWER // REINVENT // SUCCEED GAIN AN EDGE Productivity is the key to success. Maintain your competitive edge by staying current in the fluid field of technology. These courses are designed for individuals seeking to change or advance in their careers, or for businesses looking to train employees to help boost the company’s bottom line. The instructors were actually subject matter experts actively working in the profession they teach. The return on investment was huge. David Drake, Web Design & Development graduate “The ISSP program helped me tremendously with getting my arms around the concept of cyber security. It was of great benefit to someone who has not yet worked in an IT department. Annette Reed, Information Systems Security Professional (ISSP) graduate COLLEGE OF CONTINUING & PROFESSIONAL EDUCATION
  • 2. TECHNOLOGY PROGRAMS AutoCAD Essentials; Intermediate; Advanced Learn the most widely used computer-aided design (CAD) software for producing architectural, engineering and construction drawings. This class benefits individuals in engineering, construction, and architecture industries. Bookkeeper Professional Are you a number cruncher? This unique course will provide you the skills necessary to become savvy with the QuickBooks accounting software package installed on an individually-assigned, remote computer. Cisco CCNA Gain knowledge to earn the necessary credentials to advance your networking career. Cisco certifications are among the top-paying IT certifications (Global Knowledge). Ethical Hacker Become an expert who systematically attempts to penetrate a computer system or network. By identifying weaknesses in target systems, you will use the same methods and tools as a hacker, but in a lawful and ethical manner to evaluate the target system’s security. Information Systems Security Professional Data breaches continue at alarming rates. Be the solution by learning to secure information systems while becoming thoroughly familiar with the domains of the CISSP® Common Body of Knowledge. Social Media Marketing Are you social savvy? Catch up with one of the fastest moving mediums by effectively using social media to market your business, expand brand awareness, and increase exposure and – ultimately – revenue. Web Design & Development Learn the integral design principles and industry tools to put you at the forefront of technology. The Department of Labor projects Web Designer jobs to increase by 20% through 2022. Gain an Edge ccpe.kennesaw.edu // 470-578-6765 REINVENT SUCCEED EMPOWER