
Tijan Hydara
The ECA program has been a game-changer for my cybersecurity journey. It's provided hands-on experience with SIEM tools like Splunk Enterprise and practical insights into SOC operations, which helped me strengthen my skills in threat detection and incident response. The structured learning, combined with real-world scenarios, gave me a solid foundation and confidence in handling cybersecurity challenges. Overall, it has been an invaluable resource for refining my skills and advancing my career in cybersecurity. Justin has been amazing at guiding my cohort to success and makes himself available to answer any concerns or questions.
Tijan Hydara
The ECA program has been a game-changer for my cybersecurity journey. It's provided hands-on experience with SIEM tools like Splunk Enterprise and practical insights into SOC operations, which helped me strengthen my skills in threat detection and incident response. The structured learning, combined with real-world scenarios, gave me a solid foundation and confidence in handling cybersecurity challenges. Overall, it has been an invaluable resource for refining my skills and advancing my career in cybersecurity. Justin has been amazing at guiding my cohort to success and makes himself available to answer any concerns or questions.
Mar 18, 2025
Mar 18, 2025
Last week I had the honor of sitting on the panel reviewing one of the capstone presentations for the course "Succeeding in Security Splunk & SIEM." In the course, students come away with an understanding of what a SIEM is, how to build a Splunk instances to ingest data, various ways to visualize that data for both infosec and other org use cases, and much much more.
Being able to create meaningful stories from raw logs is a necessary talent for many security positions such as SOC analysts, Incident Responders, and Digital Forensics professionals. I was incredibly impressed by the students' ability to demonstrate core concepts of Splunk after just a few weeks! For more information, check out the course on Maven and be on the lookout for new content from Ellington Cyber Academy coming soon! lnkd.in/gebHUkcw
Last week I had the honor of sitting on the panel reviewing one of the capstone presentations for the course "Succeeding in Security Splunk & SIEM." In the course, students come away with an understanding of what a SIEM is, how to build a Splunk instances to ingest data, various ways to visualize that data for both infosec and other org use cases, and much much more.
Being able to create meaningful stories from raw logs is a necessary talent for many security positions such as SOC analysts, Incident Responders, and Digital Forensics professionals. I was incredibly impressed by the students' ability to demonstrate core concepts of Splunk after just a few weeks! For more information, check out the course on Maven and be on the lookout for new content from Ellington Cyber Academy coming soon! lnkd.in/gebHUkcw
Feb 13, 2023
Feb 13, 2023
The Custom Ellington Cyber Academy Splunk App is a gamechanger...
I had no idea what I was missing while learning from youtube videos and following tutorials. I spent a lot of time learning but never got the feel of what it's actually like in a Security Operations environment. The Cyber Range has it all. Here is what's included:
- Hands-on SPL query labs
-Real world security datasets
-SOC investigation scenarios
-Detection and correlation logic
-Threat intel and IOC analysis
-Dashboards and visualizations
-Structured analyst workflow training
-And there is also exam prep for for Splunk Certifications
If you are looking for a platform and a community to learn Splunk, security operations, threat intelligence, threat hunting, etc. check out the Range:
lnkd.in/eG3XWmFG
The Custom Ellington Cyber Academy Splunk App is a gamechanger...
I had no idea what I was missing while learning from youtube videos and following tutorials. I spent a lot of time learning but never got the feel of what it's actually like in a Security Operations environment. The Cyber Range has it all. Here is what's included:
- Hands-on SPL query labs
-Real world security datasets
-SOC investigation scenarios
-Detection and correlation logic
-Threat intel and IOC analysis
-Dashboards and visualizations
-Structured analyst workflow training
-And there is also exam prep for for Splunk Certifications
If you are looking for a platform and a community to learn Splunk, security operations, threat intelligence, threat hunting, etc. check out the Range:
lnkd.in/eG3XWmFG
Mar 19, 2026
Mar 19, 2026
I am in week 1 of the Ellington Cyber Academy Cyber Range beginning with the basics of Splunk SIEM. This week was focused on the data pipeline of a Splunk SIEM instance starting with:
1. The Universal Forwarder- Used to gather logs from endpoints, whether it's a Windows, Linux, Syslog Server, etc.
2. The indexer- Used for storing and parsing the data. This is the place where your queries are "packaged up" how you "ordered" them.
3. Search Head- Where your query is entered to be sent to the indexer for processing.
I'm really enjoying how the Cyber Range is laid out. It takes you from the absolute basics to even more complex topics.
There is also an ongoing scenario in this module where you put yourself in the role of a Business Analyst, which really makes the learning engaging.
Really looking forward to what is next. It's like a book you can't put down!
If you want to know more about the Cyber Range, feel free to send me a message or contact Kenneth Ellington
#Splunk
#SkillBuilding
#SIEM
#Cybersecurity
#EllingtonCyberAcademy
lnkd.in/eG3XWmFG
I am in week 1 of the Ellington Cyber Academy Cyber Range beginning with the basics of Splunk SIEM. This week was focused on the data pipeline of a Splunk SIEM instance starting with:
1. The Universal Forwarder- Used to gather logs from endpoints, whether it's a Windows, Linux, Syslog Server, etc.
2. The indexer- Used for storing and parsing the data. This is the place where your queries are "packaged up" how you "ordered" them.
3. Search Head- Where your query is entered to be sent to the indexer for processing.
I'm really enjoying how the Cyber Range is laid out. It takes you from the absolute basics to even more complex topics.
There is also an ongoing scenario in this module where you put yourself in the role of a Business Analyst, which really makes the learning engaging.
Really looking forward to what is next. It's like a book you can't put down!
If you want to know more about the Cyber Range, feel free to send me a message or contact Kenneth Ellington
#Splunk
#SkillBuilding
#SIEM
#Cybersecurity
#EllingtonCyberAcademy
lnkd.in/eG3XWmFG
Mar 5, 2026
Mar 5, 2026
As I reflect on my journey in cybersecurity, one thing has become very clear...
Being the most hardworking, the most intelligent, or the most knowledgeable are all incredible traits to have.
But having the right people around you can make all the difference in how far those qualities take you. What has truly accelerated my growth has not just been the late nights studying logs, building labs, or preparing for interviews, but the community that supported me along the way.
During my college experience, I was incredibly blessed to be part of the Ellington Cyber Academy, where I developed not only stronger technical skills, but also a stronger mindset, refined soft skills, and a greater drive to aim higher.
Within that environment, I experienced intentional leadership and genuine support, and I want to sincerely thank Kenneth Ellington for creating a space where growth is encouraged and excellence is expected.
I am also deeply grateful to the cybersecurity professionals who took time to share their knowledge and guidance with me, as those conversations and moments of support truly meant more than they may ever know.
This journey has reinforced something I will carry with me forever:
“If you want to go fast, go alone.
If you want to go far, go together.”
As I reflect on my journey in cybersecurity, one thing has become very clear...
Being the most hardworking, the most intelligent, or the most knowledgeable are all incredible traits to have.
But having the right people around you can make all the difference in how far those qualities take you. What has truly accelerated my growth has not just been the late nights studying logs, building labs, or preparing for interviews, but the community that supported me along the way.
During my college experience, I was incredibly blessed to be part of the Ellington Cyber Academy, where I developed not only stronger technical skills, but also a stronger mindset, refined soft skills, and a greater drive to aim higher.
Within that environment, I experienced intentional leadership and genuine support, and I want to sincerely thank Kenneth Ellington for creating a space where growth is encouraged and excellence is expected.
I am also deeply grateful to the cybersecurity professionals who took time to share their knowledge and guidance with me, as those conversations and moments of support truly meant more than they may ever know.
This journey has reinforced something I will carry with me forever:
“If you want to go fast, go alone.
If you want to go far, go together.”
Mar 8, 2026
Mar 8, 2026
I am excited to share that I have completed my second Splunk capstone project in the Ellington Cyber Academy Cyber Range. I am proud of myself for building on the foundation from my first capstone and advancing my understanding of Splunk as an analysis tool. This project focused on designing a multi-source monitoring dashboard that integrates Windows Event Logs, network traffic data, and business analytics. I developed dashboards that support both executive visibility and granular monitoring of a windows computer.
Thank you Kenneth Ellington for the structured class and the hands-on experience gained through the ECA Cyber Range.
If you are interested in learning more about the Cyber Range, here is the link: lnkd.in/ghjPSMJD
I am excited to share that I have completed my second Splunk capstone project in the Ellington Cyber Academy Cyber Range. I am proud of myself for building on the foundation from my first capstone and advancing my understanding of Splunk as an analysis tool. This project focused on designing a multi-source monitoring dashboard that integrates Windows Event Logs, network traffic data, and business analytics. I developed dashboards that support both executive visibility and granular monitoring of a windows computer.
Thank you Kenneth Ellington for the structured class and the hands-on experience gained through the ECA Cyber Range.
If you are interested in learning more about the Cyber Range, here is the link: lnkd.in/ghjPSMJD
Feb 27, 2026
Feb 27, 2026
I’m proud to share that I’ve completed my first Splunk capstone project in the Ellington Cyber Academy Cyber Range, where I designed and built multiple dashboards to analyze business and security data. A huge thank you to Kenneth Ellington. Through this project, I applied Splunk’s stats, chart, and time chart commands to transform raw data into useable business data.
This capstone reinforced how powerful Splunk is for both security monitoring and business intelligence, and strengthened my hands-on skills in dashboard development, data analysis, and detection-focused thinking.
Grateful for the continued learning through ECA Cyber Range and excited to keep building.
If you are interested to learn more check out the Cyber Range lnkd.in/ghjPSMJD
I’m proud to share that I’ve completed my first Splunk capstone project in the Ellington Cyber Academy Cyber Range, where I designed and built multiple dashboards to analyze business and security data. A huge thank you to Kenneth Ellington. Through this project, I applied Splunk’s stats, chart, and time chart commands to transform raw data into useable business data.
This capstone reinforced how powerful Splunk is for both security monitoring and business intelligence, and strengthened my hands-on skills in dashboard development, data analysis, and detection-focused thinking.
Grateful for the continued learning through ECA Cyber Range and excited to keep building.
If you are interested to learn more check out the Cyber Range lnkd.in/ghjPSMJD
Feb 13, 2026
Feb 13, 2026
I took the leap and joined Kenneth Ellington Ellington Cyber Academy to get more hands-on training with becoming a Splunk Engineer. Even though I have analytical knowledge on how to use Splunk, it is time for me to branch into how Splunk truly ingest data and more.
Within the first month of joining ECA, I was selected to check out the ECA custom Splunk ES Security app. It is a great resource for someone who has never heard of Splunk a day in their life. The way the material is written is easy to understand and practical for a day in the life of a SOC analyst. I highly recommend checking out Ellington Cyber Academy to join the great training he has prepared for the cyber community.
I took the leap and joined Kenneth Ellington Ellington Cyber Academy to get more hands-on training with becoming a Splunk Engineer. Even though I have analytical knowledge on how to use Splunk, it is time for me to branch into how Splunk truly ingest data and more.
Within the first month of joining ECA, I was selected to check out the ECA custom Splunk ES Security app. It is a great resource for someone who has never heard of Splunk a day in their life. The way the material is written is easy to understand and practical for a day in the life of a SOC analyst. I highly recommend checking out Ellington Cyber Academy to join the great training he has prepared for the cyber community.
Feb 13, 2026
Feb 13, 2026
Well, this is different. A new update appeared on the beta Ellington Cyber Academy Kenneth Ellington Cyber Range App. Now there’s an Infrastructure and Configuration Lab. You can create a mock Splunk infrastructure from No Clustering to Basic HA to Full Enterprise. It’s great to see new content added to the app every day.
Check out the
#ECA Cyber Range lnkd.in/esz5aTiS.
#eca
#splunk
#cybersecurity
Well, this is different. A new update appeared on the beta Ellington Cyber Academy Kenneth Ellington Cyber Range App. Now there’s an Infrastructure and Configuration Lab. You can create a mock Splunk infrastructure from No Clustering to Basic HA to Full Enterprise. It’s great to see new content added to the app every day.
Check out the
#ECA Cyber Range lnkd.in/esz5aTiS.
#eca
#splunk
#cybersecurity
Feb 11, 2026
Feb 11, 2026
I passed my Splunk Core Certified User exam today. Shout out to Kenneth Ellington and Justin Duru for putting me through the paces at Ellington Cyber Academy. My home lab has definitely grown with all the things I've learned and I look forward to continuing to build my experience and continue to grow! To infinity and beyond, or something like that...
Also shout out to Nigel Boston, Kaye Westbrooks, Dorian Talla, Steavin Murray, Malayasia Bacon, M.S., Marcus Mease, Sophia O. Peluyera Consuegra, Stephane Mesidor, Tijan Hydara, Alexis Brown.
I passed my Splunk Core Certified User exam today. Shout out to Kenneth Ellington and Justin Duru for putting me through the paces at Ellington Cyber Academy. My home lab has definitely grown with all the things I've learned and I look forward to continuing to build my experience and continue to grow! To infinity and beyond, or something like that...
Also shout out to Nigel Boston, Kaye Westbrooks, Dorian Talla, Steavin Murray, Malayasia Bacon, M.S., Marcus Mease, Sophia O. Peluyera Consuegra, Stephane Mesidor, Tijan Hydara, Alexis Brown.
Feb 8, 2026
Feb 8, 2026
Lately, I’ve been building hands-on experience with SIEM tools, which led me to the ECA Cyber Range. So far, I’m getting through the basics of Splunk and its overall function, learning SPL commands, and understanding its role in security operations. I’ve been getting great value from Nigel Boston on how threat intelligence fits into the bigger picture, and Kenneth Ellington is always available and constantly working to improve the experience for everyone. Everyone involved has been cooking 🔥, and I’m glad to be a part of it. More growth, more learning, and more posts to come.
If you want to join a community of supportive people dedicated to your advancement, look no further than: lnkd.in/eVTVU_Rm
#Socanalyst
#Cybersecurity
#Splunk
Lately, I’ve been building hands-on experience with SIEM tools, which led me to the ECA Cyber Range. So far, I’m getting through the basics of Splunk and its overall function, learning SPL commands, and understanding its role in security operations. I’ve been getting great value from Nigel Boston on how threat intelligence fits into the bigger picture, and Kenneth Ellington is always available and constantly working to improve the experience for everyone. Everyone involved has been cooking 🔥, and I’m glad to be a part of it. More growth, more learning, and more posts to come.
If you want to join a community of supportive people dedicated to your advancement, look no further than: lnkd.in/eVTVU_Rm
#Socanalyst
#Cybersecurity
#Splunk
Feb 8, 2026
Feb 8, 2026
Big thanks to Kenneth Ellington and the ECA Cyber Range for giving me early access to his Splunk app that is currently in development, SIEM Analyst Foundations with Splunk.
The app does a great job of breaking down SIEM fundamentals, Splunk basics, log analysis, and SOC-focused use cases through hands-on SPL challenges and simulations. I especially like how it frames learning around real SOC workflows and practical problem-solving instead of just theory.
Appreciate the opportunity to get early access and provide feedback. Looking forward to seeing how this continues to evolve.
#Splunk
#CyberSecurity
#SIEM
#SOC
#EllingtonCyberAcademy
Check out the cyber range here: lnkd.in/esz5aTiS
Big thanks to Kenneth Ellington and the ECA Cyber Range for giving me early access to his Splunk app that is currently in development, SIEM Analyst Foundations with Splunk.
The app does a great job of breaking down SIEM fundamentals, Splunk basics, log analysis, and SOC-focused use cases through hands-on SPL challenges and simulations. I especially like how it frames learning around real SOC workflows and practical problem-solving instead of just theory.
Appreciate the opportunity to get early access and provide feedback. Looking forward to seeing how this continues to evolve.
#Splunk
#CyberSecurity
#SIEM
#SOC
#EllingtonCyberAcademy
Check out the cyber range here: lnkd.in/esz5aTiS
Feb 6, 2026
Feb 6, 2026
I’m excited to share that I’ve completed Capstone 3 with Ellington Cyber Academy. It was a great opportunity to bring together everything I’ve been learning. This project focused on presenting a full Splunk deployment plan to stakeholders, mapping applications and use cases to the NIST 2.0 Framework, and designing both the production and development architectures. The experience pushed me to communicate technical decisions clearly and think through real‑world constraints. Special shoutout to judge Kenneth Ellington & all my peers (Alexis Brown, Taji Abdullah, Tijan Hydara, Stephane Mesidor, Rocky Tkacz, Justin Duru) — it’s helping me sharpen my skills and keep leveling up.
On to the next challenge.
#CyberSecurity
#WomeninTech
#Splunk
#NISTFramework
#SecurityArchitecture
#EllingtonCyberAcademy
#CapstoneProject
#CareerGrowth
I’m excited to share that I’ve completed Capstone 3 with Ellington Cyber Academy. It was a great opportunity to bring together everything I’ve been learning. This project focused on presenting a full Splunk deployment plan to stakeholders, mapping applications and use cases to the NIST 2.0 Framework, and designing both the production and development architectures. The experience pushed me to communicate technical decisions clearly and think through real‑world constraints. Special shoutout to judge Kenneth Ellington & all my peers (Alexis Brown, Taji Abdullah, Tijan Hydara, Stephane Mesidor, Rocky Tkacz, Justin Duru) — it’s helping me sharpen my skills and keep leveling up.
On to the next challenge.
#CyberSecurity
#WomeninTech
#Splunk
#NISTFramework
#SecurityArchitecture
#EllingtonCyberAcademy
#CapstoneProject
#CareerGrowth
Jan 31, 2026
Jan 31, 2026
Just finished a CTI session led by Nigel Boston at ECA Cyber Range. The discussion really dug into how threat intelligence is supposed to flow through an organization....from what happens in the SOC, to how detections get built, to how leadership actually uses intel to make decisions. A big takeaway for me was the focus on intent and action: who the intelligence is for, what decision it’s meant to support, and why simply sharing information isn’t the same as delivering intelligence.
Definitely the kind of class that makes you stop and rethink how CTI is practiced day to day. Thank you Nigel Boston!!!!!!
Just finished a CTI session led by Nigel Boston at ECA Cyber Range. The discussion really dug into how threat intelligence is supposed to flow through an organization....from what happens in the SOC, to how detections get built, to how leadership actually uses intel to make decisions. A big takeaway for me was the focus on intent and action: who the intelligence is for, what decision it’s meant to support, and why simply sharing information isn’t the same as delivering intelligence.
Definitely the kind of class that makes you stop and rethink how CTI is practiced day to day. Thank you Nigel Boston!!!!!!
Jan 15, 2026
Jan 15, 2026
I just finished my Capstone 2 for the "SIEM Analyst Foundations with Splunk" class as part of Kenneth Ellington, Cyber Security Instructor ECA Cyber Range. The capstone project involved creating a dashboard using the following datasets: network security logs, bakery CSV, video game sales, and a new Windows VM. The bakery and video game sales are at the top. The user agents, as part of the network logs, are broken down in the next two cells, along with the known bot user agents versus non-bot user agents. The last three cells are based on my new Windows VM with some help from Hydra. Any comments/suggestions?
Next up is the Splunk and SIEM Engineering and Architecture course, and the Splunk Core Certified User and Splunk Core Certified Power User certificates next year. I am also looking forward to Nigel Boston threat hunting workshops on the ECA Cyber Range. Paul Daigle II had another excellent presentation this week, and I look forward to his next one in a couple of weeks!
Happy (Splunk) New Year!
#eca
#splunk
#randomhashtags
I just finished my Capstone 2 for the "SIEM Analyst Foundations with Splunk" class as part of Kenneth Ellington, Cyber Security Instructor ECA Cyber Range. The capstone project involved creating a dashboard using the following datasets: network security logs, bakery CSV, video game sales, and a new Windows VM. The bakery and video game sales are at the top. The user agents, as part of the network logs, are broken down in the next two cells, along with the known bot user agents versus non-bot user agents. The last three cells are based on my new Windows VM with some help from Hydra. Any comments/suggestions?
Next up is the Splunk and SIEM Engineering and Architecture course, and the Splunk Core Certified User and Splunk Core Certified Power User certificates next year. I am also looking forward to Nigel Boston threat hunting workshops on the ECA Cyber Range. Paul Daigle II had another excellent presentation this week, and I look forward to his next one in a couple of weeks!
Happy (Splunk) New Year!
#eca
#splunk
#randomhashtags
Jan 1, 2026
Jan 1, 2026
This program wasn't just another certification program. This was a transformative experience that reshaped how I think about security operations.
Yes, we worked hands-on with Splunk, Sentinel, and Cortex XSOAR, but the real power was in how the program elevated our thinking as security professionals. What truly set this program apart was the mindset shift, learning to think like a Detection Engineer who understands business impact, not just a technician who deploys tools.
The capstone projects weren't theoretical. They were complete SIEM/SOAR implementation presentations that needed to be defended before industry professionals. Justifying architectural choices, walking through detection logic, and proving business value under live scrutiny bridged the gap between lab work and real-world incident response. The presentations taught me more about stakeholder communication than any textbook ever could.
Community always makes a difference. I want to give a massive shoutout to the instructors Kenneth Ellington, Cyber Security Instructor, and Justin Duru, who didn't just lecture but mentored. The staff's genuine presence is evident in their willingness to answer questions at odd hours, provide feedback on lab work, and share stories from the field. That created a learning environment that felt more like a security operations center than a classroom.
This journey gave me deeper insight into detection engineering, threat intelligence, and the art of balancing technical depth with business relevance. I’m walking away not just certified, but prepared.
I’m incredibly grateful to have enrolled this year and wholeheartedly recommend this program to anyone serious about cybersecurity. It’s more than a course, it’s a launchpad.
#CyberSecurity
#SIEM
#SOAR
#ThreatIntelligence
#DetectionEngineering
#CareerBoost
#Splunk
#Sentinel
#XSOAR
#SecurityAnalyst
#Gratitude
#ECAcertified
#CyberCareerBoost
#ContinuousLearning
This program wasn't just another certification program. This was a transformative experience that reshaped how I think about security operations.
Yes, we worked hands-on with Splunk, Sentinel, and Cortex XSOAR, but the real power was in how the program elevated our thinking as security professionals. What truly set this program apart was the mindset shift, learning to think like a Detection Engineer who understands business impact, not just a technician who deploys tools.
The capstone projects weren't theoretical. They were complete SIEM/SOAR implementation presentations that needed to be defended before industry professionals. Justifying architectural choices, walking through detection logic, and proving business value under live scrutiny bridged the gap between lab work and real-world incident response. The presentations taught me more about stakeholder communication than any textbook ever could.
Community always makes a difference. I want to give a massive shoutout to the instructors Kenneth Ellington, Cyber Security Instructor, and Justin Duru, who didn't just lecture but mentored. The staff's genuine presence is evident in their willingness to answer questions at odd hours, provide feedback on lab work, and share stories from the field. That created a learning environment that felt more like a security operations center than a classroom.
This journey gave me deeper insight into detection engineering, threat intelligence, and the art of balancing technical depth with business relevance. I’m walking away not just certified, but prepared.
I’m incredibly grateful to have enrolled this year and wholeheartedly recommend this program to anyone serious about cybersecurity. It’s more than a course, it’s a launchpad.
#CyberSecurity
#SIEM
#SOAR
#ThreatIntelligence
#DetectionEngineering
#CareerBoost
#Splunk
#Sentinel
#XSOAR
#SecurityAnalyst
#Gratitude
#ECAcertified
#CyberCareerBoost
#ContinuousLearning
Dec 24, 2025
Dec 24, 2025
I am grateful to be part of the ECA community. Recently, I watched a session with Paul Daigle, and the depth of insight, real-world experience, and emphasis on community and continuous learning were incredible. I extend my appreciation to Kenneth Ellington and the ECA team for creating a space that genuinely supports growth in cybersecurity.
I am grateful to be part of the ECA community. Recently, I watched a session with Paul Daigle, and the depth of insight, real-world experience, and emphasis on community and continuous learning were incredible. I extend my appreciation to Kenneth Ellington and the ECA team for creating a space that genuinely supports growth in cybersecurity.
Dec 18, 2025
Dec 18, 2025
What a great Meet & Greet we had with Paul Daigle II as part of ECA Cyber Range. We discussed Splunk, Cribl, Elastic, and provided tips on leveraging AI. I look forward to the next one Kenneth Ellington, Cyber Security Instructor.
#eca
#ellingtoncyberacademy
#randomhashtags
What a great Meet & Greet we had with Paul Daigle II as part of ECA Cyber Range. We discussed Splunk, Cribl, Elastic, and provided tips on leveraging AI. I look forward to the next one Kenneth Ellington, Cyber Security Instructor.
#eca
#ellingtoncyberacademy
#randomhashtags
Dec 16, 2025
Dec 16, 2025
Excited to share that I've recently joined ECA Cyber Academy! Connecting with Kenneth Ellington, Cyber Security Instructor, has been a game-changer. His platform offers everything I need to enhance my skills in cybersecurity. Thrilled to be part of a community of driven individuals like me and I look forward to advancing in this field! lnkd.in/eTfCNc7Y Kenneth Ellington, Cyber Security Instructor Paul Daigle II#CyberSecurity
#ProfessionalGrowth
Excited to share that I've recently joined ECA Cyber Academy! Connecting with Kenneth Ellington, Cyber Security Instructor, has been a game-changer. His platform offers everything I need to enhance my skills in cybersecurity. Thrilled to be part of a community of driven individuals like me and I look forward to advancing in this field! lnkd.in/eTfCNc7Y Kenneth Ellington, Cyber Security Instructor Paul Daigle II#CyberSecurity
#ProfessionalGrowth
Nov 13, 2025
Nov 13, 2025
Its an utter privilege to judge these - Alexis Brown the skills you put on display were already *deep*. Can't wait to see what you come back with on the next stage of capstone.
Kenneth Ellington, Cyber Security Instructor is arming his students with real-world, hands-on skills that are still in high demand. If you are curious about anything cyber-related, have been on the fence about giving it a try...reach out to him.
Its an utter privilege to judge these - Alexis Brown the skills you put on display were already *deep*. Can't wait to see what you come back with on the next stage of capstone.
Kenneth Ellington, Cyber Security Instructor is arming his students with real-world, hands-on skills that are still in high demand. If you are curious about anything cyber-related, have been on the fence about giving it a try...reach out to him.
Nov 11, 2025
Nov 11, 2025
