Upcoming Instructor-Led, In-Person Courses
BlackBerry Security Awareness Training
3-hour
FREE Course
Learn about security awareness from the best in the biz! BlackBerry’s security awareness training will help you become cyber-safe through implementing key behaviours to reduce risk.
Learn why security awareness is a life skill, how to reduce your online risk, protect yourself and others, and what to do if you suspect you have been victim of a security attack. There is no exam for this course, but students will be tested on their knowledge through class quizzes. Ready to be a Cyber Defender? Sign up to this fun and informative short course today.
Attendees of this course will receive a certificate of completion at the end of the course.
Cybersecurity Role-based Education: SOC Analyst and Security Manager
5-day
The SOC Analyst and Security Manager course is designed to equip students with the essential skills to protect digital assets within a Security Operation Center (SOC).
CylanceENDPOINT Professional Training
4-day
FREE Course
The CylanceENDPOINT Professional Training is intended for users of CylanceENDPOINT who will perform the installation, configuration, and management tasks for CylancePROTECT and CylanceOPTICS.
Learn about CylanceENDPOINT deployment options, how to configure the Cylance Console including policy best practices, managing devices, threats & events, querying CylanceOPTICS data, and managing detections. This course will also cover troubleshooting common problems. Students of this course will also have the opportunity to work hands on with CylanceENDPOINT in our lab environment.
The course will prepare you for a final assessment which must be taken and passed after attending the full training and completing the lab work.
The course is open to anyone with an interest in learning how to optimize how they manage their CylanceENDPOINT investment. Learn directly from the people that created it.
Attendees of this course will receive a certificate of completion at the end of the course.
BlackBerry UEM Professional Training
4-day
FREE Course
The BlackBerry UEM Professional Training is intended for users of BlackBerry UEM who will perform the installation, configuration, and management tasks on the BlackBerry UEM platform.
Learn about the BlackBerry UEM architecture, High Availability, installing and configuring UEM and BlackBerry Enterprise Mobility Server, best practices for UEM security, upgrades and migrations as well as common troubleshooting techniques. Students of this course will also have the opportunity to work hands on with BlackBerry UEM in our lab environment.
The course will prepare you for a final assessment which must be taken and passed after attending the full training and completing the lab work.
The course is open to anyone with an interest in learning how to optimize how they manage their BlackBerry UEM investment. Learn directly from the people that built it.
Attendees of this course will receive a certificate of completion at the end of the course.
Cloud Computing Introduction
2-hour
This course introduces cloud computing and its benefits and underlying technologies. Concepts such as private cloud, public cloud, service deployment model such as IaaS, PaaS and SaaS are explained. The course also provides a quick demonstration of a public cloud in action so that the participant can better relate the theory with the actual solution helping them appreciate how the cloud technology will impact and change the entire industry.
This course is suited to newcomers to IT and Cybersecurity as well as those already in the profession looking to gain additional insights.
Attendees of this course will receive a certificate of completion at the end of the course.
Cyber Risk Management
4-hour
This course prepares members of the senior management to understand, assess, and take a proactive posture in cybersecurity. With this training, you gain the fundamental knowledge and skills to assess cyber risk aligned to your enterprise risk management framework. We discuss some common security findings, reports and initiatives management can expect from their technology teams.
This course is suited to those in senior management including C-Suite Executives.
Attendees of this course will receive a certificate of completion at the end of the course.
Career Paths in Cyber
2-hour
FREE COURSE
Calling all University graduates and those with 1-3 years work experience in tech or cyber!
In this interactive session, we discuss potential career paths for a cybersecurity professional and the different roles one can play within the cybersecurity team and journey. We will also zoom into some relevant skills, knowledges, and certification relevant to these roles. The session will include an open Q&A session with our team of experienced cybersecurity professionals.
CompTIA IT Fundamentals (ITF+)
3-day
Includes Exam for Certification
In this CompTIA certification course, students will identify PC components, work with files and folders, and conduct basic software installations.
As one of the top IT certifications for beginners globally, this course will provide students with the fundamental skills and concepts required to maintain, support, and work efficiently with personal computers.
In addition, it covers the essential skills and information needed to set up, configure, maintain, troubleshoot, and perform preventative maintenance of the hardware and software components of a basic personal computer workstation and basic wireless devices. Students will also implement basic security measures and implement basic computer and user support practices.
CompTIA A+
5-day
Includes Exams for Certification
CompTIA A+ is the industry standard for establishing a career in IT and proves IT pros can perform critical IT support tasks in the moment.
The CompTIA A+ certification validates fundamental IT knowledge including networking, operating systems and security, as well developing problem-solving skills needed for entry-level technical support careers.
This official CompTIA certification training covers mobile devices, networking technology, hardware, virtualization and cloud computing and network troubleshooting as well as installing and configuring operating systems, expanded security, software troubleshooting and operational procedures.
CompTIA Network+ Certification
5-day
Includes Exam for Certification
The Official CompTIA Network+ (Exam N10-008) course builds on your existing user-level knowledge and experience with personal computer operating systems and networks to present the fundamental skills and concepts that you will need to use on the job in any type of networking career.
CompTIA Security+ Certification
5-day
Includes Exam for Certification
The official CompTIA Security+ (Exam SY0-701) course is the primary curriculum you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination.
Introduction to Mobile Security Technology
2-hour
The course aims to provide participants with a foundational understanding of mobile security technologies, focusing on concepts such as Mobile Device Management (MDM), Mobile Application Management (MAM), and Runtime Application Self-Protection (RASP). By the end of the course, participants will be equipped to understand various threats on mobile ,then evaluate and choose the appropriate mobile security technology.
Introduction to Identity & Access Management (IAM)
2-hour
The course provides a foundational understanding of Identity and Access Management (IAM) principles, and technologies. Participants will gain insights into IAM basic and theoretical concepts in securing organizational resources and managing user access effectively. Learners will explore key IAM components, authentication methods and authorization mechanisms.
ISC2 Certified in Cybersecurity (CC) Certification
3-day
Includes Exam for Certification
ISC2 CC training course and certification enable trainees to have the foundational knowledge, skills and abilities necessary for an entry- or junior-level cybersecurity role. This training course is to prepare the trainees for taking the exam of ISC2 CC.
ISC2 Certified Information System Security Professional (CISSP)
5-day
ISC2 CISSP training course and certification enable trainees with the knowledge, skills, and abilities to lead an organization’s information security program. The CISSP is ideal for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. This training course is to prepare the trainees for taking the exam of ISC2 CISSP.
ISC2 Certified Cloud Security Professional (CCSP)
5-day
ISC2 CCSP training course and certification enable trainees to prepare for the CCSP exam.
Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.
Earning the globally recognized CCSP cloud security certification is a proven way to build your career and better secure critical assets in the cloud.
CompTIA Cybersecurity Analyst (CySA+) Certification
5-day
This CompTIA Cybersecurity Analyst certification course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT).
CompTIA PenTest+
5-day
CompTIA PenTest+ is a penetration testing certification for cybersecurity professionals tasked with penetration testing and vulnerability assessment and management and is an intermediate-skills level cybersecurity certification that focuses on offensive skills through pen testing and vulnerability assessment. Cybersecurity professionals with CompTIA PenTest+ know how plan, scope, and manage weaknesses, not just exploit them.
SANS FOR508: Advanced Incident Response, Threat Hunting and Digital Forensics
6-day
This SANS FOR508 course is to help you to:
• Understand attacker tradecraft to perform proactive compromise assessments
• Upgrade detection capabilities via better understanding of novel attack techniques, focus on critical attack paths, and knowledge of available forensic artifacts
• Develop threat intelligence to track targeted adversaries and prepare for future intrusion events
• Build advanced forensics skills to counter anti-forensics and data hiding from technical subjects for use in both internal and external investigations
Introduction to Cybersecurity Tools
6-hour
Throughout the Cybersecurity Tools course, participants will explore an array of essential cybersecurity tools, including tools for network security, endpoint security, data loss prevention, application security, data security, cloud security, and monitoring and incident response. Discover how these tools form an important line of defence for organizations who need to protect themselves in an ever-evolving threat landscape.
Cybersecurity & AI
6-hour
Delve into the world of cybersecurity and AI through this comprehensive instructor-led course. Gain an in-depth understanding of artificial intelligence and its applications in cybersecurity. Analyze the benefits and potential risks associated with the integration of AI in cybersecurity. Learn about effective AI mitigation strategies to address cybersecurity challenges. Explore advanced AI techniques tailored for cybersecurity applications. Examine the ethical and legal considerations surrounding the use of AI in cybersecurity. Understand how AI is transforming the cybersecurity landscape.
Scripting for Cybersecurity
6-hour
This course is designed to equip aspiring cybersecurity professionals with the essential skills to automate security tasks through scripting. This course covers the fundamentals of scripting languages commonly used in cybersecurity, such as Python, Bash, and PowerShell, with a focus on practical applications in real-world security scenarios.
Reverse Malware Engineering
2-day
How do you determine a file is malicious? This course will cover Windows EXE and DLL malware analysis, OSINT triage, static file analysis, behavioral analysis & threat intelligence basics to help you determine with high confidence which files are a security concern.
Careers in Cybersecurity: Expert
2-hour
Explore the cybersecurity landscape of your country and expert roles in cybersecurity. Focus on essential knowledge and skills required in the field to understand tasks and responsibilities involved in expert cybersecurity roles. Get guidance on career development in the cybersecurity field along with insight into relevant certifications.
Careers in Cybersecurity: Management
2-hour
Delve into the intricacies of cybersecurity in your country, explore the NICE Framework and specialized roles in the industry, and gain valuable insights into the knowledge, skills, tasks, and responsibilities necessary for a successful management career in cybersecurity. Discover the importance of certifications and explore avenues for career development in this dynamic field.
Study Techniques & Exam Preparation
2-hour
Unlock Your Potential: Study Techniques and Exam Preparation is an engaging and dynamic facilitator-led course designed to equip you with the essential skills and knowledge needed to excel in your exams. Explore vital topics such as the significance of effective study techniques, essential cybersecurity terminology, common prerequisites for various certifications, and the format and grading criteria for exams. Gain access to a wealth of resources and strategies aimed at empowering you to confidently prepare for your exams.
Partner Courses
Certifications for Leadership in Cybersecurity (CLIC)
This rigorous cybersecurity training program, CLIC offers you the opportunity to earn two globally-recognized SANS GIAC certifications, hone your skills in the Catalyst Cyber Range and gain career mentorship from leading cyber experts.
CLIC is delivered entirely online and uses both synchronous and asynchronous learning, delivered through live SANS on-demand courses.
The program is open to anyone with an interest in cybersecurity and looking for a rewarding and challenging career.