Our Courses

Basic Cryptography and Programming with Crypto API

Basic Cryptography and Programming with Crypto API

In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems.

  • Course by
  • Self Paced
  • 17 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
AWS S3 Basics

AWS S3 Basics

In this 1-hour long project-based course, you will learn about AWS S3 and its features like Encryption, Versioning, Static Website Hosting and Life cycle management. S3 stands for Simple Storage Service, it is a object-based storage service which AWS provides. S3 can also be used to host a static website. By the end of this project you will create S3 bucket and will be able upload content to the bucket. You will also enable Encryption, Versioning for S3 Bucket, Static website hosting and will create Lifecycle management rule for objects in S3 Bucket.

  • Course by
  • Self Paced
  • 2 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
Assets, Threats, and Vulnerabilities

Assets, Threats, and Vulnerabilities

This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified.

  • Course by
  • Self Paced
  • 26 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Identifying Security Vulnerabilities

Identifying Security Vulnerabilities

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data.

  • Course by
  • Self Paced
  • 14 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Teaching Impacts of Technology: Data Collection, Use, and Privacy

Teaching Impacts of Technology: Data Collection, Use, and Privacy

In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. This will be done through a series of paired teaching sections, exploring a specific “Impact of Computing” in your typical day and the “Technologies and Computing Concepts” that enable that impact, all at a K12-appropriate level.

  • Course by
  • Self Paced
  • 13 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Security Operations

Security Operations

Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties.

  • Course by
  • Self Paced
  • 8 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Encryption with Python: Encrypt data with key pairs

Encryption with Python: Encrypt data with key pairs

This guided project, Encryption with Python: Encrypt data with key pairs, will help a beginning security analyst who is looking to use the Python Cryptography package to encrypt data using a public key and a private key to decrypt data.

  • Course by
  • Self Paced
  • 3 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
Decryption with Python

Decryption with Python

By the end of this project, you will be able to apply different decryption algorithms and techniques using Python. Moreover, you will apply cryptography concepts through completing several practical exercises to build a solid foundation in decrypting information and data using several renowned industry encryption algorithms.

  • Course by
  • Self Paced
  • 3 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
Introduction to IT Security

Introduction to IT Security

Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices.

  • Course by
  • Self Paced
  • 23 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Data Encryption using AWS KMS From UST

Data Encryption using AWS KMS From UST

Welcome to this Guided Project on Data Encryption using AWS KMS, From UST.

  • Course by
  • Self Paced
  • 3 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
Implement Platform Protection

Implement Platform Protection

Are you a security engineer who wants to learn how to lock down the infrastructure and network resources running in your Azure environment?

  • Course by
  • Self Paced
  • 18 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Systems and Application Security

Systems and Application Security

Course 7 - Systems and Application Security This is the seventh course under the specialization SSCP. This course discusses two major changes in recent years to how we use our data: going mobile and using the cloud. First, we use our data on the go by means of data services provided to our mobile phones, Wi-Fi, and other devices.

  • Course by
  • Self Paced
  • 17 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Introduction to Cybersecurity Essentials

Introduction to Cybersecurity Essentials

With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using computing devices and connecting to the Internet. You will first learn to recognize common security threats and risks that individuals and organizations may face, such as theft, tampering, and destruction of sensitive information. You’ll then discover the characteristics of cyber-attacks and learn how you can employ best practices to guard against them. Next, you’ll learn about the best practices against cyberattacks.

  • Course by
  • Self Paced
  • 13 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Introduction to Encryption and Cryptography

Introduction to Encryption and Cryptography

Learn about how encryption helps to keep your information safe, and how it is used in the world today.

  • Course by
  • Self Paced
  • 12
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Cybersecurity Threat Vectors and Mitigation

Cybersecurity Threat Vectors and Mitigation

This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.

  • Course by
  • Self Paced
  • 20 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Security in Google Cloud

Security in Google Cloud

Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Security Command Center, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor.

  • Course by
  • Self Paced
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Encryption and Decryption using C++

Encryption and Decryption using C++

By the end of this project, you will be able to create a basic application using Vigenere encryption-decryption technique to encrypt and decrypt messages. Throughout the project, you will be able to identify the basics of cryptography and how to encrypt and decrypt messages using a specific technique, you will be able to apply concepts like ASCII codes and type casting.

  • Course by
  • Self Paced
  • 2 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
An Introduction to Cryptography

An Introduction to Cryptography

Cryptography is an essential part of secure but accessible communication that's critical for our everyday life and organisations use it to protect their privacy and keep their conversations and data confidential. This course provides a comprehensive introduction to the fascinating world of cryptography, covering both historical cyphers and modern-day cryptographic techniques. In this course, you will explore the foundations of encryption, decryption, and cryptographic protocols.

  • Course by
  • Self Paced
  • 8 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Introduction to Networks and Cisco Devices

Introduction to Networks and Cisco Devices

In this 2-hours guided project, you will identify different components such as end devices, intermediary devices, and connection media and simulate network topologies in the Packet Tracer, manage Cisco network devices using telnet, SSH, and Console connections, and secure access to Cisco devices using passwords and password encryption services.

  • Course by
  • Self Paced
  • 3 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
AWS: Security in Data Analytics

AWS: Security in Data Analytics

AWS: Security in Data Analytics Course is the fourth course of AWS Certified Data Analytics Speciality Specialization. This course teaches learners the concepts of Security in Data Analytics with reference to AWS. Learners will be able to analyze appropriate authentication and authorization mechanisms, apply data protection and encryption techniques and data governance and compliance controls in this course. The course is divided into three modules and each module is further segmented by Lessons and Video Lectures.

  • Course by
  • Self Paced
  • 6 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Securing a Cloud SQL for PostgreSQL Instance

Securing a Cloud SQL for PostgreSQL Instance

This is a self-paced lab that takes place in the Google Cloud console. In this lab you will deploy a new Cloud SQL instance using a customer-managed encryption key (CMEK). You will configure pgAudit to selectively record and track SQL operations performed against that instance, then you will configure and test Cloud SQL IAM database authentication.

  • Course by
  • Self Paced
  • 1 hour
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
The Internet: Encryption & Public Keys

The Internet: Encryption & Public Keys

What is the internet? This is the introductory series on how the Internet works. Join our movement and register at https://studio.code.org/users/sign_in and learn more at https://code.org/educate/resources/videos and at https://studio.code.org/courses

  • Course by
  • 7 min
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
Implementing Blob Storage in Azure

Implementing Blob Storage in Azure

This Guided Project “Implementing Blob Storage in Azure” is for anyone who wants to learn to create blob storage in Azure. In this 1-hour long project-based course, you will learn to create an Azure free account. You will also learn to create an Azure Storage account. You will also learn to work with containers and learn to upload blobs. Additionally, you will also learn to work with snapshots and shared access signatures for granting access to the storage account.

  • Course by
  • Self Paced
  • 2 hours
  • English
Monthly Subscription
Option not available
    Buy Now
  • Free
Know more
AWS: Data Protection and Security Governance

AWS: Data Protection and Security Governance

AWS: Data Protection and Security Governance Course is the fourth course of Exam Prep SCS-C02: AWS Certified Security – Specialty Specialization. This course assists learners to design and implement mechanisms for data encryption at rest and in transit. The course is divided into three modules and each module is further segmented by Lessons and Video Lectures. This course facilitates learners with approximately 2:00-2:30 Hours of Video lectures that provide both Theory and Hands-On knowledge.

  • Course by
  • Self Paced
  • 5 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more
Secure Your Data at Rest

Secure Your Data at Rest

Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection.

  • Course by
  • Self Paced
  • 17 hours
  • English
Monthly Subscription
Included in
  • Starter @ AED 99 + VAT
Know more