The Khalifa University Cyber Security Academy offers training programs designed to equip students and professionals with the skills needed to succeed in the cybersecurity field in both Arabic and English, marking a first in the region. The academy provides a diverse range of courses covering topics such as intrusion detection, incident response, cloud security, and compliance for cyber defenders, analysts, operators, and managers. Additionally, it aims to raise awareness within the UAE community. This initiative is led by Khalifa University's Center for Secure Cyber Physical Systems (C2PS) and KU Continuing Education, under the patronage of the UAE Cybersecurity Council. Various courses are powered by Leonardo, an Italian-headquartered multinational company specializing in aerospace, defense, and security.
Cyber Defender (D) |
Gain hands-on experience in proactive security measures, incident response tactics, and defensive strategies to safeguard systems and networks from potential breaches. |
|
Cyber Analyst (A) |
Learn to dissect security incidents, analyze vulnerabilities, and implement strategies for robust threat detection and response. |
|
Cyber Operator (O) |
Simulate cyber-attacks, identify vulnerabilities, and develop expertise in ethical hacking, penetration testing, and adversarial tactics. |
|
Managers and Executives (M) |
Gain insights into strategic security management, governance, compliance, and leadership skills essential for decision making in the ever-evolving cybersecurity. |
|
Cyber Novice (N) |
Learn cybersecurity concepts, essential online safety practices, and an introduction to the key principles that form the basis of a secure digital environment. |
The profiles cater to diverse skill levels and roles within the cybersecurity field, allowing individuals to customize their learning paths based on their specific interests, career goals, and existing expertise.
Powered by: ³¢±ð´Ç²Ô²¹°ù»å´ÇÌýÌýÌý
Duration 5 Days
Description: This course enables participants to gain expertise in safeguarding digital assets within cloud environments. The latest techniques in securing cloud infrastructure and data are explored, ensuring a robust defense against evolving cyber threats in the dynamic landscape of cloud computing.
DAO
Powered by: Leonardo
Duration: 5 days
Description: This course is designed to equip participants with hands-on skills in identifying and securing vulnerabilities within computer systems. Participants will explore the methodologies of ethical hacking and penetration testing, mastering the art of proactive defense to safeguard digital assets against potential cyber threats.
DO
Powered by: Leonardo
Duration: 5 Days
Description: In this course, participants will examine the complexities of cybersecurity, focusing on the convergence of IT, OT and IoT. Participants will learn cutting-edge monitoring techniques to secure interconnected systems, ensuring comprehensive defense and resilience against cyber threats across diverse technological domains.
DAO
Powered by: Leonardo
Duration: 3 Days
Description: This course aids the participants to become frontline defenders in the dynamically changing cybersecurity. It allows participants to gain practical expertise in proactive threat detection, incident response, and network defense, arming them with the skills to secure digital environments against cyber adversaries.
DAO
Powered by: Leonardo
Duration: 3 Days
Description: In this course, participants will develop the strategic skills needed to effectively navigate and mitigate cyber threats during high-stakes situations. Participants will explore crisis response planning, incident handling, and communication strategies to ensure resilience and swift recovery in the case of cybersecurity emergencies.
DOM
Powered by: Leonardo
Duration: 4 Days
Description: In this course, participants will learn the essential skills for real-time threat detection, incident response, and security operations management. Participants will explore the latest tools and techniques to monitor and secure digital environments, ensuring a proactive and resilient defense against cyber threats.
DAO
Powered by: Leonardo
Duration: 3 Days
Description: In this course, participants will gain a comprehensive understanding of regulatory frameworks and industry standards. Participants will gain in-depth insights into compliance strategies, risk management, and best practices, ensuring organizations meet and exceed cybersecurity requirements in today's ever-changing regulatory landscape.
AM
Powered by: Leonardo
Duration: 5 Days
Description: In this course, participants will explore the design and implementation of resilient security solutions. Participants will acquire the skills to architect secure systems, engineer effective defenses, and understand the principles that underpin a proactive cybersecurity posture.
D
Powered by: Leonardo Ìý
Duration: 5 Days
Description: This course, is designed to empower participants in streamlining and enhancing incident response workflows. Participants will learn to leverage advanced technologies and automation tools to proactively address and mitigate security incidents, ensuring a more efficient and resilient defense against cyber threats.
DAO
Powered by: LeonardoÌý
Duration: 3 Days
Description: In this course, participants will acquire a comprehensive knowledge of Security Information and Event Management (SIEM) solutions for tactical insights. Participants will gain hands-on experience in analyzing security data, identifying patterns, and executing strategic responses, enhancing their ability to proactively defend against evolving cyber threats.
DAO
Powered by: Leonardo
Duration: 3 Days
Description: In this course, participants will develop advanced skills in responding to incidents and proactively hunting for threats. Participants will explore real-world scenarios, master techniques to mitigate cyber threats effectively, and elevate their expertise in securing the digital environments.
DAO
Powered by: LeonardoÌý
Duration: 4 Days
Description: In this course, participants will become proficient in identifying and mitigating cyber threats through advanced detection techniques. Participants will explore the principles and practices of intrusion detection systems, gaining the skills needed to secure digital landscapes against unauthorized access and potential breaches.
DA
Powered by: Leonardo
Duration: 3 Days
Description: In this course, participants will engage in a hands-on learning experience to bridge the gap between offensive and defensive strategies. Participants will master the art of coordinated testing and feedback loops, gaining comprehensive skills to enhance overall security posture and resilience against evolving cyber threats.
DO
Duration: 3 Days
Description: In this course, participants will build a solid understanding of key concepts, techniques, and best practices in the cybersecurity field. Participants will explore the fundamentals of risk management, encryption, and network security, equipping themselves with the knowledge to establish a robust foundation for securing digital environments.
N
Duration: 3 Days
Description: In this course, participants will explore the critical aspects of developing, leading, and managing effective cybersecurity strategies. Participants will gain insights into strategic decision-making, risk management, and leadership skills, empowering them to navigate the complexity of cybersecurity and contribute to the resilience of organizations.
M
Duration: 3 Days
Description: This course is crafted to empower participants with the knowledge and skills needed to address common threats effectively. Exploring fundamental principles, offering practical tips, and highlighting best practices, the course ensures participants remain vigilant and play an active role in maintaining a secure digital environment.
N
Duration: 5 Days
Description: In this course, participants will navigate the complex landscape of digital threats and ensure organizational resilience. Participants will learn strategic risk assessment, mitigation strategies, and business continuity planning to secure critical assets and maintain operational integrity in the face of cyber challenges.
DOM
Duration: 5 Days
Description: In this course, participants will explore the foundations of AI, from basic concepts to practical applications, and gain a comprehensive understanding of this transformative technology.
DAOMN
Duration: 5 Days
Description: In this course, participants will be introduced with a foundational understanding of cryptographic principles and techniques. Participants will explore key concepts such as encryption, decryption, and cryptographic protocols, participants will gain essential knowledge for securing digital communication and information.
A
Duration: 3 Days
Description: In this course, participants will learn how to identify and analyze threats. Participants will gain expertise in collecting, analyzing, and leveraging intelligence to stay one step ahead of cyber adversaries, enhancing their organization's resilience against evolving digital threats.
AO
Duration: 5 Days
Description: In this course, participants will gain the skills to navigate and secure digital spaces within the metaverse. Participants will explore the unique cybersecurity challenges of this immersive landscape, mastering strategies to protect assets and secure the evolving world of interconnected virtual environments.
DAO
Duration: 5 Days
Description: In this course, participants will delve into the principles and practices of securing Wi-Fi and mobile connections. Participants will explore encryption methods, vulnerability assessments, and countermeasures to strengthen wireless environments, ensuring robust defense against potential cyber threats.
DAO
Duration: 5 Days
Description: In this course, participants will gain essential skills to protect web applications and ensure a resilient online presence. Participants will explore best practices in securing websites, mitigating vulnerabilities, and implementing effective defense strategies against evolving cyber threats.
DAO
Duration: 5 Days
Description: In this course, participants will gain hands-on experience leveraging AI tools to enhance threat detection, automate response mechanisms, and reinforce digital defenses in cybersecurity.
DAN
Duration: 5 Days
Description: In this course, participants will acquire the skills to uncover and analyze digital evidence in cybersecurity incidents. Participants will learn about forensic examination, data recovery, and investigative techniques to become a proficient cyber investigator, contributing to effective incident response and resolution.
A
Duration: 3 Days
Description: In this course, participants will explore a wide range of criminal activities, terrorism, and state-sponsored warfare in the cyber domain. Participants will gain insights into the motives, tactics, and preventive measures to protect against and respond to the diverse challenges posed by cyber threats.
MN
Duration: Ìý3 Days
Description: In this course, participants will gain a comprehensive understanding of crafting, evaluating, and implementing policies at the national level. Participants will explore the intersection of cybersecurity, governance, and national security, developing the expertise needed to contribute to effective policy frameworks.
M
Duration: Ìý5 Days
Description: In this course, participants will explore the synergy between technological evolution and cybersecurity readiness. Participants will learn to implement resilient cybersecurity measures when navigating to the digital world, ensuring that their organizations thrive in the everchanging technological advancement.
MN
Duration: Ìý5 Days
Description: This course covers key areas such as access control technologies, system design principles, and strategic planning, and prepares participants with the skills needed to design and implement robust access control systems. Participants will be prepared to assess security requirements, select appropriate technologies, and develop comprehensive access control strategies.
DO
Duration: 5 Days
Description: In this course, participants will gain a thorough understanding of networking concepts and practices. The course covers essential topics including network architecture, protocols, and troubleshooting. Participants will acquire the skills necessary for configuring, managing, and securing networks, and will be prepared for the CompTIA Network+ certification.
AO
Duration: Ìý5 Days
Description: In this course, participants will understand the cutting-edge fundamentals of computer hardware and software. Participants will learn how to troubleshoot a wide range of devices, from computers to smartphones, and will be prepared for the CompTIA A+ certification.
ON
Duration: 5 Days
Description: This course prepares the participants forÌýa global certification, CompTIA Security + certificate, that validates the baseline skills needed to perform core security functions and pursue an IT security career.
DAO
Duration: 5 Days
Description: This course represents an intermediate-level cybersecurity certification, CompTIA PenTest+ certificate, emphasizing on offensive capabilities in penetration testing and vulnerability assessment. Participants holding this certification possess the knowledge to strategize, define scope, and discover vulnerabilities and exploit them.
DA
Duration: Ìý5 Days
Description: In this course, participants are introduced to essential domains such as network security, vulnerability assessment, and ethical hacking methodologies, and are prepared for the CEH certification. Participants will gain hands-on practice and real-world scenarios to identify and address security vulnerabilities proactively.
DO
Duration: Ìý5 Days
Description: This course covers critical domains such as cloud architecture, data security, and legal and compliance issues, preparing participants for the CCSP certification. Participants will learn to effectively navigate the complexities of securing cloud-based systems and contribute to the development of robust and compliant cloud security strategies.
DAO