Our Courses

Threat Intelligence in Cybersecurity

Threat Intelligence in Cybersecurity

Gain an understanding of network defensive tactics, network access controls, as well as network monitoring tools. This course is part of the IBM Cybersecurity Analyst Professional Certificate!

  • Course by
  • Self Paced
  • 13
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Security and Privacy for Big Data - Part 1

Security and Privacy for Big Data - Part 1

Welcome to our comprehensive course focused on security within Big Data environments. This course aims to provide you with a deep understanding of cryptographic principles and equip you with the tools necessary to manage access controls effectively within any Big Data system.

  • Course by
  • Self Paced
  • 1 hour
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Cloud and Wireless Security

Cloud and Wireless Security

Course 6: Cloud and Wireless Security

  • Course by
  • Self Paced
  • 6 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Access Controls

Access Controls

Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership.

  • Course by
  • Self Paced
  • 15 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Risk Management: Use of Access Controls to Protect Assets

Risk Management: Use of Access Controls to Protect Assets

Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets

  • Course by
  • Self Paced
  • 6 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Microsoft Azure Services and Lifecycles

Microsoft Azure Services and Lifecycles

In this course, you will learn how Microsoft Azure can help you secure access to cloud resources, what it means to build a cloud governance strategy, and how Microsoft Azure adheres to common regulatory and compliance standards. With the rise of remote work, bring your own device (BYOD), mobile applications, and cloud applications, the primary security boundary has shifted from firewalls and physical access controls to identity. Understanding who is using your systems and what they have permission to do is critical to keeping your data safe from attackers.

  • Course by
  • Self Paced
  • 7 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Access Control Concepts

Access Control Concepts

Welcome to course 3 of 5 of this Specialization, Access Control Concepts. In Course 1, we introduced access control concepts. Now, we will take a more detailed look at the types of access control that every information security professional should be familiar with.

  • Course by
  • Self Paced
  • 5 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Using Role-based Access Control in Kubernetes Engine

Using Role-based Access Control in Kubernetes Engine

This is a self-paced lab that takes place in the Google Cloud console. After provisioning two service accounts to represent user personas and three namespaces for dev, test, and prod, you will test the access controls of the personals in each namespace.

  • Course by
  • Self Paced
  • 1 hour
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Security Best Practices in Google Cloud

Security Best Practices in Google Cloud

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

  • Course by
  • Self Paced
  • 12 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
Know more