• E-Council-Certified Ethical Hacker

  • DEVRY - Maintaining Cyber Security

  • SQL- Structured Query Language

  • ISIS IPV4 - IPV6

  • CCNA/x 200-120 Switching and Routing

  • Penetration Testing/Vulnerability Assessment

  • Digital Forensics: Investigating Network Intrusions and Cyber Crime

  • System Forensics Investigation and Response

  • Compliance Law

  • Kali LINUX Virtual Environment

Photography by K. Harrison 


In compliance with  (GDPR)  The General Data Protection Regulation 

"Focus your time, energy and conversation with people who inspire, support, and help you to grow". 

TK Cybersecurity Consultants and logo are trademarks of DHR, Inc®  2014-2021

®© Copyright