The Security Operations Analyst role aims to develop professionals with strong analytical skills to safeguard information systems by monitoring alerts and events, investigating potential risks, threat hunting, responding to active incidents, identifying mitigation measures, resolving security incidents and reporting on the security posture of the organisation. They are responsible for analysing an organization’s defense controls by performing technical and non-technical risk and vulnerability assessments and preparing reports of their findings with accompanying remediation recommendations to strengthen the security posture of the organization’s information systems.
Cyber Shujaa LMS
Available courses
The Data Protection Officer Training is a one-week face-to-face training that aims to develop and enhance practical skills for roles such as: Data governance officers, Data Protection Officers, and Data Privacy Professionals within the organization.
- Teacher: Jennifer Ndegwa
- Teacher: Nabihah Rishad
The Cloud Security Specialist role aims to develop professionals who can effectively safeguard cloud-based environments, ensuring the confidentiality, integrity, and availability of data and services. These professionals are tasked with implementing robust security measures to protect cloud infrastructure, platforms, and applications from cyber threats. Additionally, they are responsible for assessing and mitigating risks associated with cloud adoption, such as data breaches, unauthorized access, and misconfigurations.
- Teacher: Dr. Paula Musuva
- Teacher: Paula Musuva
The Software Security Specialist Training aims to develop professionals who proactively test, evaluate and recommend security measures throughout the software development lifecycle, ensuring software products are built with robust security at their core. The aim will be to grow expertise in secure coding practices, threat modelling, and penetration testing, collaborate closely with development teams to integrate security controls, conduct security assessments, and provide guidance on remediating vulnerabilities.
- Teacher: Samuel Katana Ngumbao
- Teacher: Adonijah Kiplimo
The Data Protection Officer Training is a one-week face-to-face training that aims to develop and enhance practical skills for roles such as: Data governance officers, Data Protection Officers, and Data Privacy Professionals within the organization.
- Teacher: Jennifer Ndegwa
Soft skills are personality traits and behaviors that will help you get hired and succeed in your work. This course therefore helps develop skills that will make you attractive for employment and further ensure you succeed and progress in their careers.
Soft skills are personality traits and behaviors that will help you get hired and succeed in your work. This course therefore helps develop skills that will make you attractive for employment and further ensure you succeed and progress in their careers.
- Teacher: Dr. Paula Musuva
- Teacher: Mark Namasake
- Teacher: Judy Ouma
The Cyber Security Analyst course is designed to equip students with the knowledge, skills, and practical experience needed to excel in the Security Analyst role. This comprehensive course provides a solid foundation in cybersecurity principles, threat detection and response, risk assessment, incident handling, and vulnerability management.
A Cybersecurity/SOC Analyst would be responsible for analyzing an organization’s defense controls by performing technical and non-technical risk and vulnerability assessments and preparing reports of their findings with accompanying remediation recommendations in order to strengthen the security posture of the organization’s information systems.
The Cyber Shujaa Cloud and Network security specialization addresses a growing workforce demand for cloud security specialists who are grounded well on network and infrastructure security concepts.
Job roles filled from this track include those concerned with: secure architecture design, best practice controls implementation, technical and non-technical risk audits, vulnerability assessments of existing implementations, threat hunting and continuous monitoring of cloud deployments. This track aims to develop skills on preparation of security assessment and remediation reports that clearly communicate to management in order to strengthen the security posture of cloud deployments while ensuring organizations achieve their business goals.
Soft skills are personality traits and behaviors that will help you get hired and succeed in your work. This course therefore helps develop skills that will make you attractive for employment and further ensure you succeed and progress in their careers.
Ethical Hacking Essentials is a comprehensive course designed to provide participants with foundational knowledge and skills in ethical hacking. This course includes interactive labs for hands-on experience, ensuring that students gain practical insights into the techniques and tools used by ethical hackers to protect and secure information systems.
The course is organized into twelve detailed modules, each focusing on a core aspect of ethical hacking. Participants will learn how to identify, analyze, and mitigate various types of security threats, and will gain proficiency in using modern hacking tools and methodologies.
- Teacher: Natasha Muthusi
- Teacher: Nabihah Rishad
Digital Forensics Essentials provides a comprehensive introduction to the field of digital forensics. This course is designed to equip participants with the foundational knowledge and skills required to investigate and analyze digital evidence. Whether you are new to digital forensics or looking to enhance your understanding, this course covers a wide array of essential topics to prepare you for real-world forensic challenges.
The course is divided into twelve detailed modules, each focusing on a specific aspect of digital forensics. Throughout these modules, you will learn how to handle and analyze digital evidence, utilize forensic tools, and understand the methodologies used in modern forensic investigations.
Network Defense Essentials is an in-depth course designed to equip participants with foundational knowledge and skills in network security.
The course is structured into twelve comprehensive modules, each focusing on critical aspects of network security. Participants will learn how to protect network infrastructure, implement robust security protocols, and defend against various cyber threats.
- Teacher: Riara Wanjiru
- Teacher: Dr. Paula Musuva
- Teacher: Mark Namasake
- Teacher: Judy Ouma
Digital Forensics Essentials provides a comprehensive introduction to the field of digital forensics. This course is designed to equip participants with the foundational knowledge and skills required to investigate and analyze digital evidence. Whether you are new to digital forensics or looking to enhance your understanding, this course covers a wide array of essential topics to prepare you for real-world forensic challenges.
The course is divided into twelve detailed modules, each focusing on a specific aspect of digital forensics. Throughout these modules, you will learn how to handle and analyze digital evidence, utilize forensic tools, and understand the methodologies used in modern forensic investigations.
Ethical Hacking Essentials is a comprehensive course designed to provide participants with foundational knowledge and skills in ethical hacking. This course includes interactive labs for hands-on experience, ensuring that students gain practical insights into the techniques and tools used by ethical hackers to protect and secure information systems.
The course is organized into twelve detailed modules, each focusing on a core aspect of ethical hacking. Participants will learn how to identify, analyze, and mitigate various types of security threats, and will gain proficiency in using modern hacking tools and methodologies.
Network Defense Essentials is an in-depth course designed to equip participants with foundational knowledge and skills in network security.
The course is structured into twelve comprehensive modules, each focusing on critical aspects of network security. Participants will learn how to protect network infrastructure, implement robust security protocols, and defend against various cyber threats.
- Teacher: Riara Wanjiru
The Cyber Shujaa Cloud and Network security specialization addresses a growing workforce demand for cloud security specialists who are grounded well on network and infrastructure security concepts.
Job roles filled from this track include those concerned with: secure architecture design, best practice controls implementation, technical and non-technical risk audits, vulnerability assessments of existing implementations, threat hunting and continuous monitoring of cloud deployments. This track aims to develop skills on preparation of security assessment and remediation reports that clearly communicate to management in order to strengthen the security posture of cloud deployments while ensuring organizations achieve their business goals.
The Cyber Security Analyst course is designed to equip students with the knowledge, skills, and practical experience needed to excel in the Security Analyst role. This comprehensive course provides a solid foundation in cybersecurity principles, threat detection and response, risk assessment, incident handling, and vulnerability management.
A Cybersecurity/SOC Analyst would be responsible for analyzing an organization’s defense controls by performing technical and non-technical risk and vulnerability assessments and preparing reports of their findings with accompanying remediation recommendations in order to strengthen the security posture of the organization’s information systems.
The Cyber Shujaa Cloud and Network security specialization addresses a growing workforce demand for cloud security specialists who are grounded well on network and infrastructure security concepts.
Job roles filled from this track include those concerned with: secure architecture design, best practice controls implementation, technical and non-technical risk audits, vulnerability assessments of existing implementations, threat hunting and continuous monitoring of cloud deployments. This track aims to develop skills on preparation of security assessment and remediation reports that clearly communicate to management in order to strengthen the security posture of cloud deployments while ensuring organizations achieve their business goals.
- Teacher: Keith Muciri
The Cyber Security Analyst course is designed to equip students with the knowledge, skills, and practical experience needed to excel in the Security Analyst role. This comprehensive course provides a solid foundation in cybersecurity principles, threat detection and response, risk assessment, incident handling, and vulnerability management.
A Cybersecurity/SOC Analyst would be responsible for analyzing an organization’s defense controls by performing technical and non-technical risk and vulnerability assessments and preparing reports of their findings with accompanying remediation recommendations in order to strengthen the security posture of the organization’s information systems.
The Cyber Shujaa Cloud and Network security specialization addresses a growing workforce demand for cloud security specialists who are grounded well on network and infrastructure security concepts.
Job roles filled from this track include those concerned with: secure architecture design, best practice controls implementation, technical and non-technical risk audits, vulnerability assessments of existing implementations, threat hunting and continuous monitoring of cloud deployments. This track aims to develop skills on preparation of security assessment and remediation reports that clearly communicate to management in order to strengthen the security posture of cloud deployments while ensuring organizations achieve their business goals.
- Teacher: Keith Muciri
The Cyber Security Analyst course is designed to equip students with the knowledge, skills, and practical experience needed to excel in the Security Analyst role. This comprehensive course provides a solid foundation in cybersecurity principles, threat detection and response, risk assessment, incident handling, and vulnerability management.
A Cybersecurity/SOC Analyst would be responsible for analyzing an organization’s defense controls by performing technical and non-technical risk and vulnerability assessments and preparing reports of their findings with accompanying remediation recommendations in order to strengthen the security posture of the organization’s information systems.
The Data Protection Officer Training is a one-week face-to-face training that aims to develop and enhance practical skills for roles such as: Data governance officers, Data Protection Officers, and Data Privacy Professionals within the organization.
- Teacher: Jennifer Ndegwa
- Teacher: Nabihah Rishad
- Teacher: Caroline Tipape
The Cyber Shujaa Cloud and Network security specialization addresses a growing workforce demand for cloud security specialists who are grounded well on network and infrastructure security concepts.
Job roles filled from this track include those concerned with: secure architecture design, best practice controls implementation, technical and non-technical risk audits, vulnerability assessments of existing implementations, threat hunting and continuous monitoring of cloud deployments. This track aims to develop skills on preparation of security assessment and remediation reports that clearly communicate to management in order to strengthen the security posture of cloud deployments while ensuring organizations achieve their business goals.
- Teacher: Dr. Paula Musuva
- Teacher: Mark Namasake
- Teacher: Judy Ouma
- Teacher: Albertini Francis
- Teacher: Martin M Kamethu
- Teacher: Dr. Paula Musuva
- Teacher: Frankline Wegulo
The Cyber Security Analyst course is designed to equip students with the knowledge, skills, and practical experience needed to excel in the Security Analyst role. This comprehensive course provides a solid foundation in cybersecurity principles, threat detection and response, risk assessment, incident handling, and vulnerability management.
A Cybersecurity/SOC Analyst would be responsible for analyzing an organization’s defense controls by performing technical and non-technical risk and vulnerability assessments and preparing reports of their findings with accompanying remediation recommendations in order to strengthen the security posture of the organization’s information systems.
- Instructor: Chris Byron
- Instructor: Dr. Paula Musuva
- Instructor: Caroline Tipape
The Cyber Shujaa Cloud and Network security specialization addresses a growing workforce demand for cloud security specialists who are grounded well on network and infrastructure security concepts.
Job roles filled from this track include those concerned with: secure architecture design, best practice controls implementation, technical and non-technical risk audits, vulnerability assessments of existing implementations, threat hunting and continuous monitoring of cloud deployments. This track aims to develop skills on preparation of security assessment and remediation reports that clearly communicate to management in order to strengthen the security posture of cloud deployments while ensuring organizations achieve their business goals.
- Teacher: George Mitii
- Teacher: Keith Muciri
- Teacher: Dr. Paula Musuva
The Cyber Security Analyst course is designed to equip students with the knowledge, skills, and practical experience needed to excel in the Security Analyst role. This comprehensive course provides a solid foundation in cybersecurity principles, threat detection and response, risk assessment, incident handling, and vulnerability management.
A Cybersecurity/SOC Analyst would be responsible for analyzing an organization’s defense controls by performing technical and non-technical risk and vulnerability assessments and preparing reports of their findings with accompanying remediation recommendations in order to strengthen the security posture of the organization’s information systems.
Soft skills are personality traits and behaviors that will help you get hired and succeed in your work. This course therefore helps develop skills that will make you attractive for employment and further ensure you succeed and progress in their careers.
Welcome to the Soft Skills Masterclass!
The Cyber Shujaa Soft Skills course is designed to enhance and develop a range of interpersonal skills that are valuable in professional and personal contexts. It is designed to improve an individual’s ability to navigate complex work environments, build strong relationships, and effectively communicate and interact with others, ultimately leading to enhanced personal growth and career advancement opportunities.
- Teacher: Lorraine Malinda
- Teacher: Judy Ouma
Soft skills are personality traits and behaviors that will help you get hired and succeed in your work. This course therefore helps develop skills that will make you attractive for employment and further ensure you succeed and progress in their careers.
- Teacher: Judy Ouma
Soft skills are personality traits and behaviors that will help you get hired and succeed in your work. This course therefore helps develop skills that will make you attractive for employment and further ensure you succeed and progress in their careers.
- Teacher: Lorraine Malinda
- Teacher: Judy Ouma
Soft skills are personality traits and behaviors that will help you get hired and succeed in your work. This course therefore helps develop skills that will make you attractive for employment and further ensure you succeed and progress in their careers.