Shield Tech Solutions, LLC
Shield Tech Solutions, LLC
  • Home
  • Services
  • Contact Us
  • About Us
    • About Us
    • About Our Founder
    • Privacy Policy
    • Certifications
    • Professional Memberships
  • Publications
  • More
    • Home
    • Services
    • Contact Us
    • About Us
      • About Us
      • About Our Founder
      • Privacy Policy
      • Certifications
      • Professional Memberships
    • Publications
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Services
  • Contact Us
  • About Us
    • About Us
    • About Our Founder
    • Privacy Policy
    • Certifications
    • Professional Memberships
  • Publications

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

Certified experts

In-service Training Coordinator

In-service Training Coordinator

In-service Training Coordinator

Our founder is a certified In-service Training Coordinator by the State of North Carolina.

School Director (SMI)

In-service Training Coordinator

In-service Training Coordinator

Our founder is a certified School Director of SMI by the State of North Carolina.

General Instructor

In-service Training Coordinator

Background Investigator

Our founder is a certified General Instructor by the State of North Carolina.

Background Investigator

In-service Training Coordinator

Background Investigator

Our founder is a certified Background Investigator by the State of North Carolina.

Certified in Cybersecurity (CC) (ISC)²

Certified in Vulnerability Management Detection and Response (Qualys)

Certified in Vulnerability Management Detection and Response (Qualys)

Our founder is Certified in Cybersecurity by (ISC)² .

Certified in Vulnerability Management Detection and Response (Qualys)

Certified in Vulnerability Management Detection and Response (Qualys)

Certified in Vulnerability Management Detection and Response (Qualys)

Our founder is Certified in Vulnerability Management Detection and Response by Qualys.

Previous certifications

Law Enforcement Officer

Law Enforcement Officer

Law Enforcement Officer

Our founder was previously a sworn law enforcement officer by the State of North Carolina.

Qualified Assistant

Law Enforcement Officer

Law Enforcement Officer

Our founder was previously a certified Qualified Assistant to a School Director of a State Certified SMI Program by the State of North Carolina.

Radar Operator

Law Enforcement Officer

Radar Operator

Our founder was previously a certified Radar Operator by the State of North Carolina.

Certifications and programs in progress - PENDING COMPLETION

Bachelors of Science in Cybersecurity and Information Assurance

Bachelors of Science in Cybersecurity and Information Assurance

Bachelors of Science in Cybersecurity and Information Assurance

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance.

CompTIA A+

Bachelors of Science in Cybersecurity and Information Assurance

Bachelors of Science in Cybersecurity and Information Assurance

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA A+ at the conclusion of the degree program.

CompTIA Network+

Bachelors of Science in Cybersecurity and Information Assurance

CompTIA Security+

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA Network+ at the conclusion of the degree program.

CompTIA Security+

Bachelors of Science in Cybersecurity and Information Assurance

CompTIA Security+

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA Security+ at the conclusion of the degree program.

CompTIA Project+

CompTIA Network Vulnerability Assessment Professional

CompTIA Project+

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA Project+ at the conclusion of the degree program.

CompTIA CySA+

CompTIA Network Vulnerability Assessment Professional

CompTIA Project+

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA CySA+ at the conclusion of the degree program.

CompTIA Network Vulnerability Assessment Professional

CompTIA Network Vulnerability Assessment Professional

CompTIA Network Vulnerability Assessment Professional

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA Network Vulnerability Assessment Professionalat the conclusion of the degree program.

CompTIA Network Security Professional

CompTIA Network Vulnerability Assessment Professional

CompTIA Network Vulnerability Assessment Professional

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA Network Security Professional at the conclusion of the degree program.

CompTIA Security Analytics Professional

CompTIA Secure Infrastructure Specialist

CompTIA Security Analytics Professional

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA Security Analytics Professionalat the conclusion of the degree program.

CompTIA PenTest+

CompTIA Secure Infrastructure Specialist

CompTIA Security Analytics Professional

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA PenTest+at the conclusion of the degree program.

CompTIA IT Operations Specialist

CompTIA Secure Infrastructure Specialist

CompTIA Secure Infrastructure Specialist

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA IT Operations Specialist at the conclusion of the degree program.

CompTIA Secure Infrastructure Specialist

CompTIA Secure Infrastructure Specialist

CompTIA Secure Infrastructure Specialist

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in CompTIA Secure Infrastructure Specialist at the conclusion of the degree program.

CERTIFICATIONS AND PROGRAMS IN PROGRESS - PENDING COMPLETION

AXELOS ITIL Foundation Certification

Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

AXELOS ITIL Foundation Certification

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in AXELOS ITIL Foundation Certification at the conclusion of the degree program.

LPI Linux Essentials

Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

AXELOS ITIL Foundation Certification

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in LPI Linux Essentials Certification at the conclusion of the degree program.

Certified Cloud Security Professional (CCSP) – Associate of (ISC)² designation

Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in Cloud Security Professional (CCSP) – Associate of (ISC)² designationCertification at the conclusion of the degree program.

Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

Systems Security Certified Practitioner (SSCP) – Associate of (ISC)² designation

Our founder is enrolled in the B.S. of Cybersecurity and Information Assurance and will be certified in Systems Security Practitioner (SSCP) – Associate of (ISC)² designation at the conclusion of the degree program.

Shield Tech Solutions, LLC

336-310-9861

Copyright © 2023 Shield Tech Solutions, LLC - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept