Practical Training & Mentorship for AI, Cloud, DevOps, & IT Security Roles

Enjoy traditional, Instructor-led Training programs, built on 3 decades of technical manpower development for the IT Industry.

Our Trainees Work at:

SPECIALIZATIONS:
Cloud Security Engineer
Cloud Solution Architect
DevOps/Platform Engineer
ML & Generative AI with Python

Features

Benefits

Cloud Security Specialization

IT Security Analyst.

This couse is suitable for NEW ENTRANTS to Tech, and covers:

 

Introduction to Windows Server Administration

– Overview of Windows Server Operating System

– Understanding Active Directory and Domain Services

– Navigating the Windows Server Interface

Installing and Configuring Windows Server

– System Requirements and Hardware Considerations

– Installation Process: GUI and Core Installations

– Initial Configuration Tasks; Server Roles and Features

Active Directory Management

– Planning and Creating Active Directory Domains

– User and Group Management

– Organizational Units (OUs) and Group Policy Objects (GPOs)

– Security and Authentication Best Practices

Networking in Windows Server Environment

– TCP/IP Configuration and DNS

– DHCP (Dynamic Host Configuration Protocol)

– Domain Security Policies and Access Control

Core Security Goals

Confidentiality: Data Encryption, Access Control Mechanisms, Data Masking and Obfuscation

Integrity: Data Signing and Hashing, Change Control and Versioning, Integrity Monitoring Systems

Availability: Redundancy and Failover Mechanisms, Distributed Denial of Service (DDoS) Protection, Disaster Recovery and Business Continuity Planning

Risk Management:

Risk Identification: Asset Inventory and Classification, Threat Modeling, Vulnerability Scanning

Risk Assessment: Quantitative and Qualitative Risk Analysis, Impact Assessment, Likelihood Determination

Risk Mitigation: Risk Transfer (Insurance, Third-party Services), Risk Avoidance, Risk Reduction (Controls Implementation, Patch Management)

Threats, Attacks, and Vulnerabilities:

Threat Landscape Analysis: Emerging Threats Monitoring, Threat Intelligence Feeds, Threat Hunting and Incident Response

Common Attack Vectors: Phishing and Social Engineering, Malware (Viruses, Trojans, Ransomware), Denial of Service (DoS) Attacks, 

Vulnerability Assessment and Patch Management: Vulnerability Scanning and Assessment, Patch Prioritization and Deployment, Vulnerability Management Lifecycle

Identity and Access Management:

Authentication Mechanisms: Multi-factor Authentication (MFA), Single Sign-On (SSO), Biometric Authentication

Authorization Policies: Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Least Privilege Principle

Identity Lifecycle Management: Provisioning and Deprovisioning, Identity Federation, Privileged Access Management (PAM)

Networking:

Network Segmentation: Microsegmentation, Virtual Local Area Networks (VLANs), Zero Trust Networking, 

Intrusion Detection and Prevention: Network Intrusion Detection Systems (NIDS), Host-based Intrusion Detection Systems (HIDS), Intrusion Prevention Systems (IPS)

Secure Communication Protocols: Transport Layer Security (TLS/SSL), Secure Shell (SSH), Virtual Private Networks (VPNs)

Cybersecurity Architecture and Design:

Security by Design Principles: Principle of Least Privilege, Defense in Depth, Fail-Safe Defaults

Defense-in-Depth Strategy: Layered Security Controls, Redundancy and Resilience, Security Orchestration and Automation

Security Controls and Countermeasures: Intrusion Detection and Prevention Systems (IDPS), Security Information and Event Management (SIEM), Endpoint Protection Platforms (EPP)

Cloud Computing – AWS, Azure, Google Cloud:

Cloud Security Best Practices: Shared Responsibility Model, Data Encryption at Rest and in Transit, Continuous Monitoring and Auditing

Identity and Access Management in Cloud: Federated Identity Management, Role-Based Access Control (RBAC), Key Management Services

Data Encryption and Compliance in Cloud Environments: Key Management and Rotation, Data Loss Prevention (DLP), Compliance Standards (e.g., GDPR, HIPAA) in Cloud Environments

PENETRATION TEST PRACTICAL

– Network Vulnerability Scanning & Report Analysis with Nessus 

 Network Analysis with Wireshark

 Network Auditing & Hacking with Nmap

 Splunk setup & Configuration

Training Duration & Fee:

One month @ $1000

Azure Security Engineer

As Azure Security Engineer, you will be involved in implementation of security strategies for cloud environments, ensuring compliance, and alignment of  security with business goals.  

Delivered wholy from Azure Portal, this heavily PRACTICAL Azure Security Engineer training leading to the AZ-500 Microsoft Azure certification exams, teaches you to implement and manage security controls, identify and remediate vulnerabilities, implement threat protection, and respond to incidents. Training covers:

 

Identity and Access Management, IAM

– Implement Azure AD Identity Protection

– Implement Azure AD Privileged Identity Management (PIM)

– Configure security for an Azure subscription

 

Platform Protection Implementation

– Implement network security

– Implement host security

– Implement container security

 

Data and Applications Security 

– Configure security for storage accounts

– Configure security for data solutions

– Implement security for applications

 

Security Operations Management

– Configure centralized policy management

– Configure security policies to manage data

– Configure security for the Azure Resource Manager (ARM) environment

– Configure security for Azure Key Vault

 

Security Review & Monitoring 

– Monitor security by using Azure Monitor

– Monitor security by using Azure Sentinel

– Monitor security by using Azure Policy

Training Duration & Fee:

One month @ $1000

 

Our Faculty Lead

Meet the Lead Trainer/Mentor 

Akin Aregbesola, theITern

Akin Aregbesola

IT Trainer/Mentor, DevOps Engineer, Cloud Security Consultant

Akin Aregbesola has a Bachelor of Electrical Engineering from UNAD Nigeria; PGD in Oil and Gas (with focus on IT) from Robert Gordon University, Scotland; PDG in Telecom, from the United States Telecom Training Institute, Washington DC; Master of Business Administration, from the Birmingham City University, England; He is a Fellow of The Chattered Institute for IT, London and holds several industry certifications across telecom, networking, and cloud technologies.

 

  • 3 decades of delivering training in Telecom, Networking, Server Management in Corporate, Enterprise and Cloud environment.
  • 2 decades of developing and delivering industry-specific IT courses under his own company label.
  • 6 years of delivering Cloud Solution Architecting, Automation, and Cybersecurity training in the USA market.
  • 3 years of mentoring 100s of trainees in Cloud Automation Apprenticeship programs, with 100+ testimonials of realization of associated job-oriented goals.

We Are Proud of Our Latest 6-figure Earners

5/5
My 4 months training at theITern prepared me well for the role of DevOps Engineer. Although it took me additional 2 months to revise the recorded classes and to practice the projects all over, I finally got an offer on my 3rd interview attempt.
Hillary Osemeh, DevOps Engineer, USA
5/5
I got 2 job offers within 6 months. The first offer came while I was still in training at theITern; the second one came 4 months after the first one. I am very comfortable and enjoying my current role as DevOps Engineer courtesy of theITern.
White Oniovosa, DevOps Engineer
4.8/5

It’s my 2nd job since I completed training at theITern.  I enjoyed the support of the faculty to get my 1st job and after the experience at that first job, life became easier as IT professional.  I am enjoying my current role at Deloitte.

Remi Adam, DevOps Engineer at Deloitte
5/5
I want to thank you so much sir for teaching me the basics of DevOps. When I started, I was lost and didn’t know where to start. You gave me direction. You made me more focused and sharpened my skills. Thank you so much again and again.
Onwuachi Samuel, DevOps Engineer, Germany

Watch Sample Training Sessions:

Have Questions? Call or Message +1.214.438.9105

Alternatively, send email to admin@theITern.com