Our Courses
GRC Analyst
A cybersecurity Governance, Risk and Compliance analyst helps align cybersecurity and business goals while managing risks and meeting all industry and government regulations
Undertake GRC Security analyst tasks, management reporting, full-day work shift experience, management report
Maintain Risk Register, understand purpose and workings of a Risk Management framework, Management reporting, what/how to support audit & compliance requirements
Learn about policy, standard, procedure, how to conduct a security risk assessment, security awareness, security exceptions
Learn the basics of cybersecurity governance, risk and compliance, the key security control domains
- Duration 3 Months
- Course Level Intermediate
- Certificate Included
Vendor Risk Assessor
A vendor risk assessor is a crucial role within cybersecurity and risk management, responsible for evaluating and mitigating potential security threats and vulnerabilities posed by third-party suppliers and partners to safeguard an organization’s data and operations.
Undertake vendor risk assessment, issue risk assessment report, management reporting, tracking and oversight
Learn how to record, track, and report on the identified risks and issues
Learn about how to conduct a vendor security risk assessment, and interconnects with other organizational processes.
Learn the fundamentals of supply chain, associated risks, and the lifecycle of a vendor engagement
- Duration 3 Months
- Course Level Beginner
- Certificate Included
IAM Analyst
Undertake access provisioning, access-recertification tasks, handle access request tickets within SLA, full-day work shift experience, recertification report
Responding to access request tickets, learn about access re-certification tasks, key aspects of privileged access management
Learn how to configure access on various systems, network devices, cloud and Active directory.
IAM Analysts monitor user activities for anomalies, potential security threats, and policy violations. In the event of a security incident, they contribute to incident response efforts, collaborating with other security professionals to mitigate risks and resolve issues promptly.
- Duration 3 Months
- Course Level Beginner
- Certificate Included
L1 SOC Analyst
They analyze security events within an organization’s network infrastructure. They investigate potential breaches, escalate incidents, and maintain security protocols. With a keen eye for detail, they contribute to the protection of digital assets against cyber threats.
L1 SOC (Security Operations Center) Analysts serve as the frontline defenders against cybersecurity threats. They monitor security alerts, conduct initial analysis, and escalate incidents to higher-level teams for further investigation, contributing to the early detection and response to potential security issues.
Learn how to record, track, and report on the identified risks and issues
Learn about events vs incidents, hands-on practice on atleast one SIEM solution, understanding common cyberattacks, and how to detect them from events
Learn about various enterprise technology elements and how they come together in an organizational environment
- Duration 3 Months
- Course Level Beginner
- Certificate Included
L2 SOC Analyst
Undertake event analysis, incident response, operational & management reporting, coordinate with L1/L3 analysts, full-day work shift experience, shift handover report, RCA document
Executing incident response playbooks, Create operational & management reports, conduct and document root cause analysis of an incident
Learn how to actively correlate multiple events, packet captures & threat intelligence for incident response. Learn how to read and guide on vulnerabilities remediation
Learn how to read, analyze and decompose raw system and security events
- Duration 3 Months
- Course Level Intermediate
- Certificate Included
Database Security Analyst
A Database Security Analyst specializes in safeguarding sensitive data stored within databases from unauthorized access, breaches, and malicious activities. They assess database vulnerabilities, implement security protocols, monitor user access and activity, and proactively identify and mitigate potential threats to ensure the confidentiality, integrity, and availability of critical information.
Undertake DB Security analyst tasks, handle compliance/ audit requests analyze DB security events within SLA, onboard new DBs, full-day work shift experience, management report
Configure preventative controls, learn about fulfilling audit & compliance requirements, tuning controls & event logging/ monitoring
Learn how to collect, analyze and triage database events
Learn what is a database, key elements of database security, what & why of events to expect
- Duration 3 Months
- Course Level Beginner
- Certificate Included
Security Architect
Security Architects design and implement comprehensive cybersecurity frameworks, combining technical expertise with strategic planning to create robust security infrastructures.
Executing incident response playbooks, Create operational & management reports, conduct and document root cause analysis of an incident
Learn how to actively correlate multiple events, packet captures & threat intelligence for incident response. Learn how to read and guide on vulnerabilities remediation
Learn how to read, analyze and decompose raw system and security events
- Duration 12 Months
- Course Level Expert
- Certificate Included