Certifications
On this page, you’ll find a complete list of my professional certifications.
They reflect my commitment to continuous learning and staying current in the ever-evolving field of Information Technology.
My Certifications
Bachelor of Science (B.Sc.) Business Informatics
Earned at IU International University of Applied Sciences.
Certified technical business Economist
Earned at IU International University of Applied Sciences.
Microsoft Certified Professional
Demonstrates foundational expertise in Microsoft technologies and a commitment to professional excellence within the Microsoft ecosystem.
Microsoft Certified Technology Specialist (MCTS)
Validates in-depth technical knowledge and hands-on skills in specific Microsoft technologies, with a focus on implementing, troubleshooting, and supporting key solutions.
Installation, Storage and Compute with Windows Server 2016
Demonstrates expertise in installing, configuring, and maintaining Windows Server environments, with a focus on storage solutions, virtualization, and compute operations.
Networking with Windows Server 2016
Validates the ability to configure and manage network infrastructure using Windows Server 2016, including DNS, DHCP, IPAM, and advanced network connectivity features.
Microsoft Certified Solutions Associate 2016
Confirms proficiency in designing and implementing IT solutions using Windows Server, with a focus on system administration, network infrastructure, and security.
CGF01 – Barracuda CloudGen Firewall – Foundation
Demonstrates foundational knowledge and skills in deploying, configuring, and managing Barracuda CloudGen Firewalls to ensure robust network security and optimal traffic management.
Citrix Certified Associate – Virtualization (CCA – V)
Validates expertise in deploying, configuring, and managing Citrix Virtual Apps and Desktops, enabling efficient and secure virtualization solutions for end users.
OCG IT-Security
Demonstrates a comprehensive understanding of IT security principles, including risk management, threat detection, and secure system configuration, ensuring a strong defense against cyber threats.