TechHouse is proud to be a CertNexus Authorized Training Partner.
The best organizations demonstrate adaptability during changing times and bolster their expertise with a commitment to learning. That could be you! TechHouse encourages our clients to make the most of their talents by sharpening their skills with the courses that best fit their needs. CertNexus provides emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals.
Knowledge is power. That’s why TechHouse partners with CertNexus to offer an array of technology certifications courses and micro-credentials. Some of TechHouse’s favorite courses are listed below. Please note that some courses have prerequisites that aren’t listed here. Contact TechHouse to find the course that best fits you or your organization’s needs.
CertNexus Cybersecurity Courses
|Course Name||Summary||Topics Include|
|CertNexus CyberSAFE||This class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance needs and requirements; recognize and avoid phishing and other social engineering; recognize and avoid viruses, ransomware, and other malware; help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.||• Identify the need for security.|
• Secure devices like desktops, laptops, smartphones, and more.
• Use the Internet securely.
|Incident Response for|
Business Professionals (IRBIZ)
|This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy. It is ideal for candidates who have been tasked with managing compliance with state legislation and other regulatory requirements regarding incident response, and for executing standardized responses to such incidents. The course introduces procedures and resources to comply with legislative requirements regarding incident response. This course is designed to assist students in preparing for the CertNexus Incident Responder Credential (CIR-110). What you learn and practice in this course can be a significant part of your preparation.||• Explain the importance of best practices in preparation for incident response|
• Given a scenario, execute incident response process
• Explain general mitigation methods and devices
• Assess and comply with current incident response requirements.
|Cyber Secure Coder||The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development.||• Use a Security by Design approach to design a secure architecture for your software.|
• Implement common protections to protect users and data.
• Apply various testing methods to find and correct security defects in your software.
• Maintain deployed software to ensure ongoing security.
CertNexus IoT Courses
|Course Name||Summary||Topics Include|
|IoTBIZ||The Internet of Things (IoT) promises a wide range of benefits for industry, energy and utility companies, municipalities, healthcare, and consumers. Data can be collected in extraordinary volume and detail regarding almost anything worth measuring, such as public health and safety, the environment, industrial and agricultural production, energy, and utilities. New data analysis tools have been optimized for the massive amounts of data that IoT produces, enabling well-informed|
decisions to be made quickly. Before you can successfully plan and implement an IoT solution, you must understand the
various factors that will drive your decisions. But putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions.
|• Planning IoT Implementation.|
• Undertaking an IoT project.
|Certified IoT Practitioner||Putting IoT systems into place can be a complicated proposition and fraught with hazards. Solutions may involve devices and technologies from many different vendors, requiring a good understanding of software and hardware and strategies to integrate them, as well as the risks associated with security, privacy, and the safety of those whose working and living environments are managed by these systems. IT professionals often have little or no experience working with embedded systems, sensor networks, actuators, real-time systems, and other components that are common to IoT, so this course provides a foundation for understanding how these components work with other systems that IT professionals typically have more experience working with—such as networks, cloud computing, and applications running on servers, desktop computers, and mobile devices. In this course, students will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. Students will create an IoT device based on an ESP8266 microcontroller, implementing common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption.||• Plan an IoT implementation.|
• Construct and program an IoT device.
• Communicate with an IoT device using wired and wireless connections.
• Process sensor input and control an actuator on an IoT device.
• Manage security, privacy, and safety risks on IoT projects.
• Manage an IoT prototyping and development project throughout the development lifecycle.
|Certified Internet of Things Security|
|This course is designed for practitioners seeking to demonstrate a vendor-neutral, cross-industry skill set that will enable them to design, implement, operate, and/or manage a secure IoT ecosystem. This course is designed for IoT practitioners looking to improve their skills and knowledge of IoT security and privacy. This course is also designed for students seeking the CertNexus Certified Internet of Things Security Practitioner (CIoTSP) certification and who want to prepare for Exam ITS-110.||• Managing IoT risks.|
• Securing Web and Cloud interfaces.
• Securing data.
• Controlling access to IoT resources.
• Securing IoT networks.
Read More: Check Out the CertNexus Brochure
The time to learn and grow is now. Billions of dollars will be gained and lost over the next five years as tech changes business globally. The IoT industry is estimated to grow fivefold by 2025 with an estimated 75 billion devices. According to Gartner, IDC forecasts AI systems will more than double to $79.2 billion in 2022, while the average cost of a cyber-attack on a company is $3.86 million (IBM). For an organization to succeed in this environment, training and confirming skills is the best investment towards growth.
TechHouse + CertNexus
TechHouse is a Microsoft Gold-Certified Partner offering a holistic approach to IT consulting. TechHouse has over 25 years of experience providing consulting services and customized IT solutions for corporate, mid-market, and small organizations. Each TechHouse team member firmly believes that small and mid-market organizations are critical to local communities’ health. Our team is easy to work with and ready to help your organization thrive by designing custom-fit solutions. Unlike other tech companies, we take a holistic approach to your organization and help create a roadmap for your organization’s success.
CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals. CertNexus’ mission is to assist in closing the emerging tech global skills gap while providing individuals with a path towards rewarding careers in Cybersecurity, Data Science, the Internet of Things, and Artificial Intelligence (AI)/Machine Learning. Successful CertNexus certification candidates come from representative organizations such as Ahold Delhaize, Barclays, Canon, Cisco, Ingram, Intel, Kaspersky, Optum, Starbucks, U.S. Air Force, U.S. Army, Verizon, Xerox, Zappos, and universities spanning over fifty countries.
The TechHouse Team is one of the best I have every worked with… The right people were available when we needed them.Sharon Harper, Sun Vista Rentals