• E-Council-Certified Ethical Hacker

  • DEVRY - Maintaining Cyber Security

  • SQL- Structured Query Language

  • ISIS IPV4 - IPV6

  • CCNA/x 200-120 Switching and Routing

  • Penetration Testing/Vulnerability Assessment

  • Digital Forensics: Investigating Network Intrusions and Cyber Crime

  • System Forensics Investigation and Response

  • Compliance Law

  • Kali LINUX Virtual Environment

Photography by K. Harrison 

unnamed.png

In compliance with  (GDPR)  The General Data Protection Regulation 

"Focus your time, energy and conversation with people who inspire, support, and help you to grow". 

TK Cybersecurity Consultants and logo are trademarks of DHR, Inc®  2014-2021

®© Copyright
27657448_10155249382792286_6884833849450