Mentoring has many definitions:
“There is no one universally accepted definition of Mentoring. This is because the definition depends very much on why, where and with whom it is being used. There is, however, a generic core to all Mentoring relationships whatever the setting, which is the support is given voluntarily by one person to another.” National Mentoring Network 2014.


“C100 – IT Pro Fundamentals” – Test-Out Certification

The TestOut IT Fundamentals Pro certification measures an examinee’s understanding of foundational concepts related to computer hardware and software, networking, databases, programming, information systems, and data security.

View course outline,

Everything You Need In One Resource

In addition to in-depth computer lab simulations, the TestOut IT Fundamentals Pro course also includes instructional videos, text lessons, quizzes, and certification exam prep. No additional resources are needed. It also includes real-time scoring and LMS integration to save instructors’ valuable time.

True-to-Life Simulations

The scenarios they encounter in the course replicate everyday situations they will experience with today’s technology. These practice labs make it possible to learn real working skills that will set the foundation for future careers in IT.

Automated Assessment and Grading

Our exams and labs are automatically graded, and students are able to see how well they performed on each task. This saves instructors the time and effort of scoring. Our grading is fast and easy and gives students multiple paths to correct answers.

SUBMIT your Application for Consideration for Enrollment into IT Pro Fundamentals. 

  • Resume is required
  • Why you want to pursue a career in STEM is required

Cost: $99.00 U.S. Currency

These courses prepare you to take the COMPTIA IT Pro Fundamentals and Security+ certification exams.


Sign Up Today for Our

“C200- Introduction to Cyber Security”

Course Description: This course provides the foundation for the study of computer system security.  The course centers around the domains comprising the Information Security Common Body of Knowledge.

Chapter 1  What is Cybersecurity

Chapter 2 Why is There a Need for Security (Malicious Software, Threats, Attacks, & Vulnerabilities)

Chapter 3 Legal, Professional, Ethics, and Code of Conduct

Chapter 4 Risk Management

Chapter 5 Network Design Architecture

Chapter 6 Security Technology (IDS, IPS, VPN, Firewalls, Protocols)

Chapter 7 Basic Cryptography

Chapter 8 Physical Security

Chapter 9 Overview of Top Certifications in Demand

SUBMIT your Application for Consideration for Enrollment into Introduction to Cybersecurity

  • Cost: $399.00 U.S. Currency

Confidentiality Statement.

It is the policy of the Women in Security Mentor Program to protect the confidentiality of its participants. Additionally, mentors are required to keep information about their mentee and his/her family confidential. In order for WinS Mentor Program to provide a responsible and professional service to participants, it is necessary to ask mentors and mentees about the prospective participants including:

  • Participants’ names and images gained from participants themselves,
  • Information gained about participants from outside sources including confidential references. e.g., place of work