Certifications
Over the past few years, this journey in cybersecurity has been shaped through continuous learning and hands-on experience. This page highlights the certifications earned along the way, each representing a milestone in building knowledge, sharpening skills, and staying relevant in a constantly changing threat landscape.
2026
Certified Blue Team Practitioner (CBTEAMER)
date: 2026-03-20
A Certified Ethical Hacker (CEH) is a person trained to penetrate their own computer system or that of a client in order to determine what vulnerabilities exist and how to apply protective, corrective, and preventive countermeasures. This helps to mitigate risk and protect the system from being compromised by an unethical hacker or cybercriminal. The CEH is trained to look for weaknesses that can be exploited using the same tools a hacker would use to attack. Their job may include making recommendations for how to patch vulnerabilities or creating strategies to prevent malicious attacks.
2025
Certified Incident Responder (eCIR)
date: 2025-12-20
The eCIR exam is a fully hands-on assessment that simulates realistic incident scenarios, requiring deep analysis and investigative skills. Through this process, I significantly strengthened my capabilities in threat detection and SIEM operations by analyzing logs and correlating data to identify suspicious activities, as well as in endpoint and network analysis by investigating endpoint behavior, privilege escalation techniques, and network traffic. I also enhanced my digital forensics skills by examining binaries, registry artifacts, and other forensic evidence, while improving my ability to leverage threat intelligence to map attacker behavior to known TTPs. Additionally, the exam refined my reporting and communication skills, enabling me to produce clear, structured incident reports complete with timelines and actionable remediation steps.
Certified Blue Teamers (CBTEAMER)
date: 2025-12-14
This certification is well-structured and highly relevant to real-world SOC and blue team operations, covering core areas such as alert triage, SIEM and log analysis, MITRE ATT&CK mapping, threat hunting, incident response, digital forensics, phishing and malware analysis, as well as network and cloud security monitoring. Overall, CBTeamer provides strong practical coverage across detection, investigation, and response, making it a valuable certification for blue team and SOC practitioners. Thanks to The SecOps Group for designing an exam that reflects real-world defensive scenarios.
Certified Threat Hunting Professional (eCTHP)
date: 2025-12-06
The eCIR is a fully practical exam, which immerses candidates in a realistic lab environment simulating a corporate breach. Examinees must investigate the incident and answer a series of scenario-based questions that mirror the type of findings and information typically included in a professional incident report.
Certified Cybersecurity Educator Professional (CCEP)
date: 2025-12-05
This exam demonstrates mastery across the core domains of cybersecurity, including Fundamentals & Network Security, Information Security Architecture, Identity and Access Management (IAM), Offensive Security, Cloud Security, Security Operations, Application Security, and Incident Response.
Certified Threat Hunting and Incident Response I (CTHIRI)
date: 2025-10-14
Certified Threat Hunting and Incident Response I (CTHRI-I) validates your ability to investigate real-world security incidents end-to-end. This practical exam focuses on hypothesis-driven hunting, log analysis, endpoint telemetry triage, network signal interpretation, MITRE ATT&CK mapping, and clear, actionable reporting. Candidates work through interactive, time-boxed scenarios that simulate enterprise conditions—pivoting across host and network data, correlating events, and documenting containment, eradication and recovery.
2023
Certified SOC Analyst (CSA)
date: 2023-07-08
The Certified SOC Analyst has an in-depth understanding of various attack methodologies, to collaborating with the IRTs in case of an incident. A certified member has adequate knowledge to bring people, process and technology together and provide a comprehensive skill set to manage a robust security operation centre with enhanced incident detection and response capabilities. In-depth knowledge to understand the relation between events, logs and incident, and provide appropriate skills to manage various SOC processes, Centralized Log Management (CLM), SIEM use case development, alert triage, and incident response.
Microsoft Certified: Security Operations Analyst Associate (SC-200)
date: 2023-03-04
The Microsoft security operations analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the security operations analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Candidates for this role should be familiar with attack vectors, cyberthreats, incident management, and Kusto Query Language (KQL). Candidates should also be familiar with Microsoft 365 and Azure services.
2022
Certified Ethical Hacker (CEH)
date: 2022-10-22
A Certified Ethical Hacker (CEH) is a person trained to penetrate their own computer system or that of a client in order to determine what vulnerabilities exist and how to apply protective, corrective, and preventive countermeasures. This helps to mitigate risk and protect the system from being compromised by an unethical hacker or cybercriminal. The CEH is trained to look for weaknesses that can be exploited using the same tools a hacker would use to attack. Their job may include making recommendations for how to patch vulnerabilities or creating strategies to prevent malicious attacks.
Elearn Security Junior Penetration Tester (eJPT)
date: 2022-07-29
eLearnSecurity Junior Penetration Tester (eJPT) is a 100% practical certification on penetration testing and information security essentials. Passing the exam and obtaining the certificate will prove your shills as a penetration tester.
Stellar Cyber Certified Associate
date: 2022-01-10
Stellar Cyber unifies currently disjointed security tools and data sources to fully visualize, correlate through AI, and automatically detect, investigate and respond to all attack activities.
2021
Certified Secure Computer User (CSCU)
date: 2021-11-05
The purpose of the CSCU training program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.
Certified Network Security Specialist (CNSS)
date: 2021-11-01
This course by the International Cybersecurity Institute – Certified Network Security Specialist a.k.a ICSI CNSS provides a detailed overview of modern network security including operating system hardening, firewalls, intrusion-detection systems, VPNs, and Encryption. The course also includes topics such as physical security standards, system security, and security policies..
Cyber Security Foundation Professional Certificate
date: 2021-05-11
The source of this certification is the Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 National Institute of Standards and Technology (NIST) Cybersecurity Framework April 16, 2018.