About

About

 

The Khalifa University Cyber Security Academy offers training programs designed to equip students and professionals with the skills needed to succeed in the cybersecurity field in both Arabic and English, marking a first in the region. The academy provides a diverse range of courses covering topics such as intrusion detection, incident response, cloud security, and compliance for cyber defenders, analysts, operators, and managers. Additionally, it aims to raise awareness within the UAE community. This initiative is led by Khalifa University's Center for Secure Cyber Physical Systems (C2PS) and KU Continuing Education, under the patronage of the UAE Cybersecurity Council. Various courses are powered by Leonardo, an Italian-headquartered multinational company specializing in aerospace, defense, and security.

People
Courses Profiles

Cyber Defender

(D)

Gain hands-on experience in proactive security measures, incident response tactics, and defensive strategies to safeguard systems and networks from potential breaches.

Cyber Analyst

(A)

Learn to dissect security incidents, analyze vulnerabilities, and implement strategies for robust threat detection and response.

Cyber Operator

(O)

Simulate cyber-attacks, identify vulnerabilities, and develop expertise in ethical hacking, penetration testing, and adversarial tactics.

Managers and Executives

(M)

Gain insights into strategic security management, governance, compliance, and leadership skills essential for decision making in the ever-evolving cybersecurity.

Cyber Novice

(N)

Learn cybersecurity concepts, essential online safety practices, and an introduction to the key principles that form the basis of a secure digital environment.

 

The profiles cater to diverse skill levels and roles within the cybersecurity field, allowing individuals to customize their learning paths based on their specific interests, career goals, and existing expertise.

Red Team
Cloud Security

Powered by: Leonardo   

Duration 5 Days

Description: This course enables participants to gain expertise in safeguarding digital assets within cloud environments. The latest techniques in securing cloud infrastructure and data are explored, ensuring a robust defense against evolving cyber threats in the dynamic landscape of cloud computing.

DAO

Penetration Testing

Powered by: Leonardo

Duration: 5 days

Description: This course is designed to equip participants with hands-on skills in identifying and securing vulnerabilities within computer systems. Participants will explore the methodologies of ethical hacking and penetration testing, mastering the art of proactive defense to safeguard digital assets against potential cyber threats.

DO

IT-OT-IoT Monitoring

Powered by: Leonardo

Duration: 5 Days

Description: In this course, participants will examine the complexities of cybersecurity, focusing on the convergence of IT, OT and IoT. Participants will learn cutting-edge monitoring techniques to secure interconnected systems, ensuring comprehensive defense and resilience against cyber threats across diverse technological domains.

DAO

Blue Team

Powered by: Leonardo

Duration: 3 Days

Description: This course aids the participants to become frontline defenders in the dynamically changing cybersecurity. It allows participants to gain practical expertise in proactive threat detection, incident response, and network defense, arming them with the skills to secure digital environments against cyber adversaries.

DAO

Crisis Management

Powered by: Leonardo

Duration: 3 Days

Description: In this course, participants will develop the strategic skills needed to effectively navigate and mitigate cyber threats during high-stakes situations. Participants will explore crisis response planning, incident handling, and communication strategies to ensure resilience and swift recovery in the case of cybersecurity emergencies.

DOM

Monitoring and Operations

Powered by: Leonardo

Duration: 4 Days

Description: In this course, participants will learn the essential skills for real-time threat detection, incident response, and security operations management. Participants will explore the latest tools and techniques to monitor and secure digital environments, ensuring a proactive and resilient defense against cyber threats.

DAO

Compliance in Depth

Powered by: Leonardo

Duration: 3 Days

Description: In this course, participants will gain a comprehensive understanding of regulatory frameworks and industry standards. Participants will gain in-depth insights into compliance strategies, risk management, and best practices, ensuring organizations meet and exceed cybersecurity requirements in today's ever-changing regulatory landscape.

AM

Security Architecture and Engineering

Powered by: Leonardo

Duration: 5 Days

Description: In this course, participants will explore the design and implementation of resilient security solutions. Participants will acquire the skills to architect secure systems, engineer effective defenses, and understand the principles that underpin a proactive cybersecurity posture.

D

Security Orchestration, Automation, & Response (SOAR)

Powered by: Leonardo  

Duration: 5 Days

Description: This course, is designed to empower participants in streamlining and enhancing incident response workflows. Participants will learn to leverage advanced technologies and automation tools to proactively address and mitigate security incidents, ensuring a more efficient and resilient defense against cyber threats.

DAO

SIEM with Tactical Analysis

Powered by: Leonardo 

Duration: 3 Days

Description: In this course, participants will acquire a comprehensive knowledge of Security Information and Event Management (SIEM) solutions for tactical insights. Participants will gain hands-on experience in analyzing security data, identifying patterns, and executing strategic responses, enhancing their ability to proactively defend against evolving cyber threats.

DAO

Advanced IR & Threat Hunting Bootcamp

Powered by: Leonardo

Duration: 3 Days

Description: In this course, participants will develop advanced skills in responding to incidents and proactively hunting for threats. Participants will explore real-world scenarios, master techniques to mitigate cyber threats effectively, and elevate their expertise in securing the digital environments.

DAO

Intrusion Detection

Powered by: Leonardo 

Duration: 4 Days

Description: In this course, participants will become proficient in identifying and mitigating cyber threats through advanced detection techniques. Participants will explore the principles and practices of intrusion detection systems, gaining the skills needed to secure digital landscapes against unauthorized access and potential breaches.

DA

Purple Team 

Powered by: Leonardo

Duration: 3 Days

Description: In this course, participants will engage in a hands-on learning experience to bridge the gap between offensive and defensive strategies. Participants will master the art of coordinated testing and feedback loops, gaining comprehensive skills to enhance overall security posture and resilience against evolving cyber threats.

DO

The Foundations of Cybersecurity

Duration: 3 Days

Description: In this course, participants will build a solid understanding of key concepts, techniques, and best practices in the cybersecurity field. Participants will explore the fundamentals of risk management, encryption, and network security, equipping themselves with the knowledge to establish a robust foundation for securing digital environments.

N

Cybersecurity Strategy, Leadership, and Management

Duration: 3 Days

Description: In this course, participants will explore the critical aspects of developing, leading, and managing effective cybersecurity strategies. Participants will gain insights into strategic decision-making, risk management, and leadership skills, empowering them to navigate the complexity of cybersecurity and contribute to the resilience of organizations.

M

Cybersecurity Awareness

Duration: 3 Days

Description: This course is crafted to empower participants with the knowledge and skills needed to address common threats effectively. Exploring fundamental principles, offering practical tips, and highlighting best practices, the course ensures participants remain vigilant and play an active role in maintaining a secure digital environment.

N

Cybersecurity Risk Management and Business Continuity

Duration: 5 Days

Description: In this course, participants will navigate the complex landscape of digital threats and ensure organizational resilience. Participants will learn strategic risk assessment, mitigation strategies, and business continuity planning to secure critical assets and maintain operational integrity in the face of cyber challenges.

DOM

Introduction to Artificial Intelligence

Duration: 5 Days

Description: In this course, participants will explore the foundations of AI, from basic concepts to practical applications, and gain a comprehensive understanding of this transformative technology.

DAOMN

Introduction to Cryptography

Duration: 5 Days

Description: In this course, participants will be introduced with a foundational understanding of cryptographic principles and techniques. Participants will explore key concepts such as encryption, decryption, and cryptographic protocols, participants will gain essential knowledge for securing digital communication and information.

A

Cyber Threat Intelligence

Duration: 3 Days

Description: In this course, participants will learn how to identify and analyze threats. Participants will gain expertise in collecting, analyzing, and leveraging intelligence to stay one step ahead of cyber adversaries, enhancing their organization's resilience against evolving digital threats.

AO

Metaverse Security

Duration: 5 Days

Description: In this course, participants will gain the skills to navigate and secure digital spaces within the metaverse. Participants will explore the unique cybersecurity challenges of this immersive landscape, mastering strategies to protect assets and secure the evolving world of interconnected virtual environments.

DAO

Wireless Security

Duration: 5 Days

Description: In this course, participants will delve into the principles and practices of securing Wi-Fi and mobile connections. Participants will explore encryption methods, vulnerability assessments, and countermeasures to strengthen wireless environments, ensuring robust defense against potential cyber threats.

DAO

Web Security

Duration: 5 Days

Description: In this course, participants will gain essential skills to protect web applications and ensure a resilient online presence. Participants will explore best practices in securing websites, mitigating vulnerabilities, and implementing effective defense strategies against evolving cyber threats.

DAO

Artificial Intelligence (AI) and Cybersecurity

Duration: 5 Days

Description: In this course, participants will gain hands-on experience leveraging AI tools to enhance threat detection, automate response mechanisms, and reinforce digital defenses in cybersecurity.

DAN

Digital Forensics and Investigation

Duration: 5 Days

Description: In this course, participants will acquire the skills to uncover and analyze digital evidence in cybersecurity incidents. Participants will learn about forensic examination, data recovery, and investigative techniques to become a proficient cyber investigator, contributing to effective incident response and resolution.

A

Cyber Crimes, Cyber Terrorism, and Cyber Warfare

Duration: 3 Days

Description: In this course, participants will explore a wide range of criminal activities, terrorism, and state-sponsored warfare in the cyber domain. Participants will gain insights into the motives, tactics, and preventive measures to protect against and respond to the diverse challenges posed by cyber threats.

MN

National Policy Analysis

Duration:  3 Days

Description: In this course, participants will gain a comprehensive understanding of crafting, evaluating, and implementing policies at the national level. Participants will explore the intersection of cybersecurity, governance, and national security, developing the expertise needed to contribute to effective policy frameworks.

M

Digital Transformation and Cyber Resilience

Duration:  5 Days

Description: In this course, participants will explore the synergy between technological evolution and cybersecurity readiness. Participants will learn to implement resilient cybersecurity measures when navigating to the digital world, ensuring that their organizations thrive in the everchanging technological advancement.

MN

Access Control System Design and Planning

Duration:  5 Days

Description: This course covers key areas such as access control technologies, system design principles, and strategic planning, and prepares participants with the skills needed to design and implement robust access control systems. Participants will be prepared to assess security requirements, select appropriate technologies, and develop comprehensive access control strategies.

DO

CompTIA Network+

Duration: 5 Days

Description: In this course, participants will gain a thorough understanding of networking concepts and practices. The course covers essential topics including network architecture, protocols, and troubleshooting. Participants will acquire the skills necessary for configuring, managing, and securing networks, and will be prepared for the CompTIA Network+ certification.

AO

CompTIA A+

Duration:  5 Days

Description: In this course, participants will understand the cutting-edge fundamentals of computer hardware and software. Participants will learn how to troubleshoot a wide range of devices, from computers to smartphones, and will be prepared for the CompTIA A+ certification.

ON

CompTIA Security +

Duration: 5 Days

Description: This course prepares the participants for a global certification, CompTIA Security + certificate, that validates the baseline skills needed to perform core security functions and pursue an IT security career.

DAO

CompTIA PenTest+

Duration: 5 Days

Description: This course represents an intermediate-level cybersecurity certification, CompTIA PenTest+ certificate, emphasizing on offensive capabilities in penetration testing and vulnerability assessment. Participants holding this certification possess the knowledge to strategize, define scope, and discover vulnerabilities and exploit them.

DA

Certified Ethical Hacker

Duration:  5 Days

Description: In this course, participants are introduced to essential domains such as network security, vulnerability assessment, and ethical hacking methodologies, and are prepared for the CEH certification. Participants will gain hands-on practice and real-world scenarios to identify and address security vulnerabilities proactively.

DO

Certified Cloud Security Professional (CCSP)

Duration:  5 Days

Description: This course covers critical domains such as cloud architecture, data security, and legal and compliance issues, preparing participants for the CCSP certification. Participants will learn to effectively navigate the complexities of securing cloud-based systems and contribute to the development of robust and compliant cloud security strategies.

DAO