The demand for cybersecurity experts has never greater than the last few years
Cybersecurity has become a high priority to infrastructure worldwide due to the increased reliance on computer systems. As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cybersecurity.
In this course, learn the basic concepts needed to identify and protect yourself against common cyber threats and attacks. You’ll also gain an understanding of principles and policies, commonly used authentication/authorization techniques, and network security fundamentals.
This course is a great starting point for anyone interested in cybersecurity, but not sure where to start. Build your foundation by learning the fundamentals of one of the fastest-growing fields today.
Mr. Daniel Sackie-Mensah expands skills from law enforcement into cyber security and digital forensics through independent study, work experience, and obtaining an advanced degree. Mr. Sackie-Mensah possesses in-depth knowledge of digital forensics and understanding of the cyber security issues pertaining to crime in general. Skilled in database IT processes, including database policies, procedures, standards and authorized system approaches. Coaches and leads training in fundamental information technology personnel.
Mr. Sackie-Mensah currently serves as a Detective for the Palm Beach County Sheriff’s Office, working a Digital Forensics Taskforce. Daniel is also a former cross-sworn Agent with the Federal Bureau of Investigations while focusing on network intrusion investigations. Daniel obtained a Master’s Degree from Utica University with a specialization in Cyber Security Operations (Graduation Honors: Magna Cum Laude).
Current Certifications: CompTia Security Plus SY0-501, Cellebrite Physical Analyzer/CCO, IACIS Basic Computer Forensic Examiner, SANS GIAC Advanced Smartphone Forensics.
Software Experience: Wireshark, Kali Linux, Forensics Toolkit (FTK), OS Forensics, EnCase, X-Ways, Cellebrite Physical Analyzer/UFED, Magnet Axiom and Grayshift – Gray Key.
Write a public review