Practical Training & Mentorship for AI, Cloud, DevOps, & IT Security Roles
Enjoy traditional, Instructor-led Training programs, built on 3 decades of technical manpower development for the IT Industry.
Our Trainees Work at:
SPECIALIZATIONS:
Cloud Security Engineer
Cloud Solution Architect
DevOps/Platform Engineer
ML & Generative AI with Python
Cloud Security Specialization
IT Security Analyst.
This couse is suitable for NEW ENTRANTS to Tech, and covers:
Introduction to Windows Server Administration
– Overview of Windows Server Operating System
– Understanding Active Directory and Domain Services
– Navigating the Windows Server Interface
Installing and Configuring Windows Server
– System Requirements and Hardware Considerations
– Installation Process: GUI and Core Installations
– Initial Configuration Tasks; Server Roles and Features
Active Directory Management
– Planning and Creating Active Directory Domains
– User and Group Management
– Organizational Units (OUs) and Group Policy Objects (GPOs)
– Security and Authentication Best Practices
Networking in Windows Server Environment
– TCP/IP Configuration and DNS
– DHCP (Dynamic Host Configuration Protocol)
– Domain Security Policies and Access Control
Core Security Goals
Confidentiality: Data Encryption, Access Control Mechanisms, Data Masking and Obfuscation
Integrity: Data Signing and Hashing, Change Control and Versioning, Integrity Monitoring Systems
Availability: Redundancy and Failover Mechanisms, Distributed Denial of Service (DDoS) Protection, Disaster Recovery and Business Continuity Planning
Risk Management:
Risk Identification: Asset Inventory and Classification, Threat Modeling, Vulnerability Scanning
Risk Assessment: Quantitative and Qualitative Risk Analysis, Impact Assessment, Likelihood Determination
Risk Mitigation: Risk Transfer (Insurance, Third-party Services), Risk Avoidance, Risk Reduction (Controls Implementation, Patch Management)
Threats, Attacks, and Vulnerabilities:
Threat Landscape Analysis: Emerging Threats Monitoring, Threat Intelligence Feeds, Threat Hunting and Incident Response
Common Attack Vectors: Phishing and Social Engineering, Malware (Viruses, Trojans, Ransomware), Denial of Service (DoS) Attacks,
Vulnerability Assessment and Patch Management: Vulnerability Scanning and Assessment, Patch Prioritization and Deployment, Vulnerability Management Lifecycle
Identity and Access Management:
Authentication Mechanisms: Multi-factor Authentication (MFA), Single Sign-On (SSO), Biometric Authentication
Authorization Policies: Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Least Privilege Principle
Identity Lifecycle Management: Provisioning and Deprovisioning, Identity Federation, Privileged Access Management (PAM)
Networking:
Network Segmentation: Microsegmentation, Virtual Local Area Networks (VLANs), Zero Trust Networking,
Intrusion Detection and Prevention: Network Intrusion Detection Systems (NIDS), Host-based Intrusion Detection Systems (HIDS), Intrusion Prevention Systems (IPS)
Secure Communication Protocols: Transport Layer Security (TLS/SSL), Secure Shell (SSH), Virtual Private Networks (VPNs)
Cybersecurity Architecture and Design:
Security by Design Principles: Principle of Least Privilege, Defense in Depth, Fail-Safe Defaults
Defense-in-Depth Strategy: Layered Security Controls, Redundancy and Resilience, Security Orchestration and Automation
Security Controls and Countermeasures: Intrusion Detection and Prevention Systems (IDPS), Security Information and Event Management (SIEM), Endpoint Protection Platforms (EPP)
Cloud Computing – AWS, Azure, Google Cloud:
Cloud Security Best Practices: Shared Responsibility Model, Data Encryption at Rest and in Transit, Continuous Monitoring and Auditing
Identity and Access Management in Cloud: Federated Identity Management, Role-Based Access Control (RBAC), Key Management Services
Data Encryption and Compliance in Cloud Environments: Key Management and Rotation, Data Loss Prevention (DLP), Compliance Standards (e.g., GDPR, HIPAA) in Cloud Environments
PENETRATION TEST PRACTICAL
– Network Vulnerability Scanning & Report Analysis with Nessus
– Network Analysis with Wireshark
– Network Auditing & Hacking with Nmap
– Splunk setup & Configuration
Training Duration & Fee:
One month @ $1000
Azure Security Engineer
As Azure Security Engineer, you will be involved in implementation of security strategies for cloud environments, ensuring compliance, and alignment of security with business goals.
Delivered wholy from Azure Portal, this heavily PRACTICAL Azure Security Engineer training leading to the AZ-500 Microsoft Azure certification exams, teaches you to implement and manage security controls, identify and remediate vulnerabilities, implement threat protection, and respond to incidents. Training covers:
Identity and Access Management, IAM
– Implement Azure AD Identity Protection
– Implement Azure AD Privileged Identity Management (PIM)
– Configure security for an Azure subscription
Platform Protection Implementation
– Implement network security
– Implement host security
– Implement container security
Data and Applications Security
– Configure security for storage accounts
– Configure security for data solutions
– Implement security for applications
Security Operations Management
– Configure centralized policy management
– Configure security policies to manage data
– Configure security for the Azure Resource Manager (ARM) environment
– Configure security for Azure Key Vault
Security Review & Monitoring
– Monitor security by using Azure Monitor
– Monitor security by using Azure Sentinel
– Monitor security by using Azure Policy
Training Duration & Fee:
One month @ $1000
Our Faculty Lead
Meet the Lead Trainer/Mentor
Akin Aregbesola
IT Trainer/Mentor, DevOps Engineer, Cloud Security Consultant
Akin Aregbesola has a Bachelor of Electrical Engineering from UNAD Nigeria; PGD in Oil and Gas (with focus on IT) from Robert Gordon University, Scotland; PDG in Telecom, from the United States Telecom Training Institute, Washington DC; Master of Business Administration, from the Birmingham City University, England; He is a Fellow of The Chattered Institute for IT, London and holds several industry certifications across telecom, networking, and cloud technologies.
- 3 decades of delivering training in Telecom, Networking, Server Management in Corporate, Enterprise and Cloud environment.
- 2 decades of developing and delivering industry-specific IT courses under his own company label.
- 6 years of delivering Cloud Solution Architecting, Automation, and Cybersecurity training in the USA market.
- 3 years of mentoring 100s of trainees in Cloud Automation Apprenticeship programs, with 100+ testimonials of realization of associated job-oriented goals.
We Are Proud of Our Latest 6-figure Earners
It’s my 2nd job since I completed training at theITern. I enjoyed the support of the faculty to get my 1st job and after the experience at that first job, life became easier as IT professional. I am enjoying my current role at Deloitte.