Hands-on Experience

Gain practical skills and real-world exposure through immersive projects.

Mentorship

Gain mentorship and guidance to navigate the cybersecurity GRC field.

Resume-Ready

Build a portfolio of projects and experiences to boost your resume and stand out to employers.

What people are saying

Some of the testimonials of students who have gone through the IAM program

This internship provides an exceptional, real-world simulation that bridges the gap between theory and practical application. It comprehensively covers all essential structures, including Access provisioning, Just-In-Time management, and De-provisioning. Through hands-on projects, I gained the practical ability to design flowcharts and implement IAM procedures within the Azure environment.
Jude Oise

USA

Taking this internship was one of the best steps I’ve made so far. I started with little to no knowledge about Identity and Access Management (IAM), but this experience has really opened my eyes. I’ve learned how IAM works in real organizations and how to manage access for both small businesses and large media companies. It’s been a great learning journey that’s helped me build confidence and a clearer sense of direction in my cybersecurity path.
Destiny Hilary

Nigeria

Very informative and informational and easy to follow instructional videos. I really learned a lot and enjoyed learning how to use Jira as well.
Caleem Bennett

USA

This internship gave me the confidence to apply IAM concepts in real-world scenarios. I look forward to leveraging these skills to help organizations secure identities, automate processes, and stay compliant while enabling productivity
Juliet Otiende

USA

About the Program

This program provides a unique opportunity for aspiring professionals to gain hands-on experience and practical skills in IAM and IT. Join us and equip yourself with the knowledge and confidence to excel in the cybersecurity industry.

Curriculum

  1. 1

    Participant Acknowledgement

    1. (Included in full purchase)
  2. 2

    Identity and Access Management Consultant Experience

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
  3. 3

    Let's Connect!

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
  4. 4

    Understand The Business

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
  5. 5

    IAM Project 1 - Access Analysis

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
  6. 6

    IAM Project 2 - Request Based Access

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
  7. 7

    IAM Project 3 - JIT

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
  8. 8

    IAM Project 4 - Deprovisioning

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
  9. 9

    IAM Project 5 - User Access Reviews

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
    9. (Included in full purchase)
    10. (Included in full purchase)
    11. (Included in full purchase)
    12. (Included in full purchase)
    13. (Included in full purchase)
  10. 10

    IAM Project 6 - Azure AD Project

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
    6. (Included in full purchase)
    7. (Included in full purchase)
    8. (Included in full purchase)
    9. (Included in full purchase)
    10. (Included in full purchase)
    11. (Included in full purchase)
    12. (Included in full purchase)
  11. 11

    IAM Project 7: Azure Exploration

    1. (Included in full purchase)
    2. (Included in full purchase)
  12. 12

    Jira Help Desk Project

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)
    4. (Included in full purchase)
    5. (Included in full purchase)
  13. 13

    Congratulations and Next Steps!

    1. (Included in full purchase)
    2. (Included in full purchase)
    3. (Included in full purchase)

Ready to Start Your Cybersecurity Journey?

Join our virtual internship program and gain hands-on experience, expert guidance, and a resume-ready portfolio to kickstart your career in cybersecurity.

$300.00 first payment, $30.00 / month onwards