Our Courses

Boost your career as a cybersecurity expert through our carefully crafted program from industry veterans

GRC Analyst

A cybersecurity Governance, Risk and Compliance analyst helps align cybersecurity and business goals while managing risks and meeting all industry and government regulations

Undertake GRC Security analyst tasks, management reporting, full-day work shift experience, management report

Maintain Risk Register, understand purpose and workings of a Risk Management framework, Management reporting, what/how to support audit & compliance requirements

Learn about policy, standard, procedure, how to conduct a security risk assessment, security awareness, security exceptions

Learn the basics of cybersecurity governance, risk and compliance, the key security control domains

Vendor Risk Assessor

A vendor risk assessor is a crucial role within cybersecurity and risk management, responsible for evaluating and mitigating potential security threats and vulnerabilities posed by third-party suppliers and partners to safeguard an organization’s data and operations.

Undertake vendor risk assessment, issue risk assessment report, management reporting, tracking and oversight

Learn how to record, track, and report on the identified risks and issues

Learn about how to conduct a vendor security risk assessment, and interconnects with other organizational processes.

Learn the fundamentals of supply chain, associated risks, and the lifecycle of a vendor engagement

IAM Analyst

An IAM Analyst manages user identities and access to protect an organization’s data. They create and control user accounts, implement security policies, and work with IT and security teams to maintain a secure system. Their role is crucial in preventing unauthorized access and data breaches.

Undertake access provisioning, access-recertification tasks, handle access request tickets within SLA, full-day work shift experience, recertification report

Responding to access request tickets, learn about access re-certification tasks, key aspects of privileged access management

Learn how to configure access on various systems, network devices, cloud and Active directory. 

IAM Analysts monitor user activities for anomalies, potential security threats, and policy violations. In the event of a security incident, they contribute to incident response efforts, collaborating with other security professionals to mitigate risks and resolve issues promptly.

L1 SOC Analyst

They analyze security events within an organization’s network infrastructure. They investigate potential breaches, escalate incidents, and maintain security protocols. With a keen eye for detail, they contribute to the protection of digital assets against cyber threats.

L1 SOC (Security Operations Center) Analysts serve as the frontline defenders against cybersecurity threats. They monitor security alerts, conduct initial analysis, and escalate incidents to higher-level teams for further investigation, contributing to the early detection and response to potential security issues.

Learn how to record, track, and report on the identified risks and issues

Learn about events vs incidents, hands-on practice on atleast one SIEM solution, understanding common cyberattacks, and how to detect them from events

Learn about various enterprise technology elements and how they come together in an organizational environment

L2 SOC Analyst

An L2 SOC (Security Operations Center) Analyst is responsible for monitoring and analyzing security alerts and incidents within an organization’s IT environment. They work to identify and assess potential security threats and breaches, categorize them, and provide an initial level of incident response. L2 SOC Analysts also escalate incidents to higher-level teams if necessary, contributing to the overall cybersecurity defense and rapid incident resolution within the organization.

Undertake event analysis, incident response, operational & management reporting, coordinate with L1/L3 analysts, full-day work shift experience, shift handover report, RCA document

Executing incident response playbooks, Create operational & management reports, conduct and document root cause analysis of an incident

Learn how to actively correlate multiple events, packet captures & threat intelligence for incident response. Learn how to read and guide on vulnerabilities remediation 

Learn how to read, analyze and decompose raw system and security events

Database Security Analyst

A Database Security Analyst specializes in safeguarding sensitive data stored within databases from unauthorized access, breaches, and malicious activities. They assess database vulnerabilities, implement security protocols, monitor user access and activity, and proactively identify and mitigate potential threats to ensure the confidentiality, integrity, and availability of critical information.

Undertake DB Security analyst tasks, handle compliance/ audit requests analyze DB security events within SLA, onboard new DBs, full-day work shift experience, management report

Configure preventative controls, learn about fulfilling audit & compliance requirements, tuning controls & event logging/ monitoring

Learn how to collect, analyze and triage database events

Learn what is a database, key elements of database security, what & why of events to expect

Security Architect

A cybersecurity architect is responsible for designing, and defining the security systems within an organization’s IT network, including systems and data. They need a strong foundation of technical cybersecurity skills covering various areas of security

Security Architects design and implement comprehensive cybersecurity frameworks, combining technical expertise with strategic planning to create robust security infrastructures.

Executing incident response playbooks, Create operational & management reports, conduct and document root cause analysis of an incident

Learn how to actively correlate multiple events, packet captures & threat intelligence for incident response. Learn how to read and guide on vulnerabilities remediation 

Learn how to read, analyze and decompose raw system and security events

We may use cookies & contact forms to improve user experience, and analyze website traffic. For these reasons, we may share your site usage data with our analytics partners. By clicking “Accept” you consent to store on your device all the technologies described in our Cookie Policy.