• Professional_Learning_101614
  • professional_learning_survey
Professional_Learning_1016141 professional_learning_survey2

Professional Learning Updates

Get the latest updates on professional development opportunities sent to your emailbox. Subscribe to the Events Announcement email list.

Discounted New Horizons Courses for Merit Members


Academy Leadership
Community Calendar
Events Archive
MITE Forum
Professional Learning Blog
Suggest an Event

Social Media

Twitter: Follow our tweets.

Facebook: Like us.

LinkedIn: Connect with us.

Return to the Merit Services home page

Upcoming Professional Development Opportunities

As an important part of meeting its mission, Merit Network provides a regular program of learning opportunities. All upcoming events are listed below by category or in monthly or yearly calendar view.

    Upcoming Events

July 29, 2015
Grand Rapids
Come watch cybersecurity professionals perform under pressure in the West Michigan Cyber Security Consortium's Red vs. Red vs. Blue Cyber Event at the GVSU DeVos Campus in Grand Rapids, Michigan. There is no charge to attend the event, however, RSVP is required. Please RSVP to by July 17th.

August 3-7, 2015
Live Online
Get hands-on instruction and practice installing and configuring Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. The course is part one of a series of three courses that provide the skills and knowledge necessary to implement a core Windows Server 2012 infrastructure in an existing enterprise environment.

Register for 20410 Installing and Configuring Windows Server 2012


August 3-6, 2015
Live Online
This multi-day course will teach you practical methods for preparing a disaster recovery strategy that can benefit your organization. The comprehensive Certified Disaster Recovery Engineer course goes beyond traditional Business Continuity planning training, preparing students for industry certification in business continuity planning and presenting the latest methodologies and best practices for real-world systems recovery.

Register for Certified Disaster Recovery Engineer - C)DRE

August 10-14, 2015
Live Online
This course prepares and certifies you to analyze an organization's information security threats and risks, and to design a security program to mitigate them. The C)ISSO course addresses the broad range of industry best practices, knowledge and skills expected of a security leader.

Register for Certified Information Systems Security Officer - C)ISSO


August 10-14, 2015
Ann Arbor
This course provides you a solid understanding of how to administer a VMware vSphere v6.0 infrastructure for an organization of any size.

Register for VMware vSphere v6.0


August 17-21, 2015
Live Online
Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. Students will learn the administration tasks necessary to maintain a Windows Server 2012 infrastructure, such as user and group management, network access and data security.

Register for 20411 Administering Windows Server 2012

August 17-21, 2015
Live Online
This 5-day instructor led course provides students with the technical skills required to write basic Transact-SQL queries for Microsoft SQL Server 2014. This course is the foundation for all SQL Server-related disciplines; namely, Database Administration, Database Development and Business Intelligence. This course helps people prepare for exam 70-461.

Register for 20461 Querying Microsoft SQL Server


August 17-18, 2015
Live Online
This course is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and they will also understand the countermeasures associated with these attacks.

Register for Certified Security Sentinel Training - C)SS


August 18-19, 2015
Ann Arbor
IPv6 will soon be the only option for adding new devices or hosts on the Internet. Is your staff ready? Begin the journey to IPv6 with Merit.

Register for IPv6: Practical Tools for Implementation

August 19-21, 2015
Live Online
The IS20 Security Controls course covers proven tools and methodologies needed to execute and analyze the Top Twenty Most Critical Security Controls. These controls were selected and defined by the U.S. military and other government and private organizations (including NSA, DHS, GAO, and many others) that are the most respected experts on how attacks actually work and what can be done to stop them.

Register for IS20 Security Controls


August 31-September 4, 2015
Live Online
C)SLO is a course designed for IT managers who want to get up to speed fast on the essentials of security leadership. You will acquire the essential skills required to oversee the security component of any information technology project.

Register for Certified Security Leadership Officer - C)SLO


August 31-September 4, 2015
Ann Arbor
This CCNAX course combines ICND1 and ICND2 into a one week, extended hour "boot camp".

Register for Interconnecting Cisco Networking Devices: Accelerated (CCNAX)

September 9-11, 2015
Live Online
C)VA is a five-day class on identifying weaknesses in computerized systems. CVA constitutes an introduction to the practice of vulnerability assessment and penetration testing, and provides excellent experience for anyone who manages systems or networks.

Register for Certified Vulnerability Assessor - C)VA


September 10, 2015
Live Online
A key factor of an effective cybersecurity program is knowing your vulnerabilities before attackers do. Hackers breach organizations by taking advantage of vulnerabilities within networks. Attackers pour over every inch of your enterprise network until they find a leak. And that's where they break in, causing irreparable damage to your bottom line and reputation. Webinar happens from 3:00 PM - 4:00 PM EDT.

Register for Identifying Security Weaknesses Before They Become a Threat


September 15-17, 2015
Ann Arbor
In this intensive three-day course, you will create your own personal leadership philosophy, become a better leader and master skills that can help you improve your business results and accelerate your career.

Register for Leadership Excellence and Executive Coaching

September 21-25, 2015
Live Online
The C)DFE course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.

Register for Certified Digital Forensics Examiner - C)DFE


September 21-25, 2015
Ann Arbor
Learn the essentials of Python and writing secure code in Ann Arbor, Michigan. Secure Coding Using Python will cover everything from basic syntax and collections to functions, classes and regular expressions. Gain a solid knowledge of coding with Python!

Register for Secure Coding Using Python


September 28-October 2, 2015
Live Online
The Certified Professional Ethical Hacker course is an introductory-level penetration testing course. Through the coursework and lab exercises, students gain a valuable skillset in penetration testing and understand the importance of vulnerability assessments and ethical hacking.

Register for Certified Professional Ethical Hacker - C)PEH

October 14, 2015
Ann Arbor
Gain a better understanding of cybersecurity trends and learn how to improve the security posture of your organization. The day-long event will feature presentations by Merit Members and cybersecurity professionals. Level up and increase your cybersecurity knowledge!

Register for 2015 Security Summit


October 19-24, 2015
Live Online
In this course, you will obtain real-world security knowledge that will enable you to recognize vulnerabilities, exploit system weaknesses and help safeguard against threats. You will learn the art of ethical hacking with a professional edge.

Register for Certified Penetration Testing Engineer - C)PTE


November 2-6, 2015
Live Online
The C)ISSO course addresses the broad range of industry best practices, knowledge and skills expected of a security leader. You will learn both the theory and the requirements for practical implementation of core security concepts, practices, monitoring and compliance.

Register for Certified Information Systems Security Officer - C)ISSO

December 7-11, 2015
Live Online
This course is designed to equip attendees with the knowledge and tools needed to identify and defend against security vulnerabilities in software applications. Students will put theory to practice by completing real world labs that include testing applications for software vulnerabilities, identifying weaknesses in design through architecture risks analysis and threat modeling, conducting secure code reviews and more.

Register for Certified Secure Web Application Engineer - C)SWAE


Scholarship Testimonial

Merit Community Supporter logos

Like Us on Facebook

Follow us on Twitter

Read our Blogs

Contact Us

Membership | Services | Events | Research | Cybersecurity | News | About Merit | Contact Us | Directions to Merit | Site Map | Merit Network Home

Copyright © 2015 Merit Network, Inc.
1000 Oakbrook Drive, Suite 200, Ann Arbor, Michigan 48104-6794
Phone: (734) 527-5700    Fax: (734) 527-5790    E-mail: