Securing Microservices with Diana Ndinda Nyamai
Cyber Shujaa
Securing Microservices with Diana Ndinda Nyamai
1:01:30
DevSecOps Demo with Ayub Mwangi
Cyber Shujaa
DevSecOps Demo with Ayub Mwangi
1:23:18
Cybersecurity Incident Management with Lawrence Muchilwa
Cyber Shujaa
Cybersecurity Incident Management with Lawrence Muchilwa
1:25:56
Introduction to Android with Kiiru Maina
Cyber Shujaa
Introduction to Android with Kiiru Maina
1:14:12
DevSecOps with Ayub Roti
Cyber Shujaa
DevSecOps with Ayub Roti
1:10:14
AI Governance with Nimo Kering'
Cyber Shujaa
AI Governance with Nimo Kering'
1:02:44
Demytifying Pentesting with Velma Anangwe
Cyber Shujaa
Demytifying Pentesting with Velma Anangwe
1:37:59
Network Fundamentals with Christopher Kamau
Cyber Shujaa
Network Fundamentals with Christopher Kamau
1:13:28
Break or Make into Cybersecurity with Kharim Mchatta
Cyber Shujaa
Break or Make into Cybersecurity with Kharim Mchatta
1:34:38
Database Administration with Martin Yegon
Cyber Shujaa
Database Administration with Martin Yegon
54:19
Personal Branding as a Cybersecurity Professional
Cyber Shujaa
Personal Branding as a Cybersecurity Professional
56:18
Quantum Computing in Cybersecurity with Elijah Githugo
Cyber Shujaa
Quantum Computing in Cybersecurity with Elijah Githugo
1:13:48
Network Security with Brian Kimathi
Cyber Shujaa
Network Security with Brian Kimathi
1:23:39
Interview Preparation with Jane Akoth Prudence
Cyber Shujaa
Interview Preparation with Jane Akoth Prudence
1:26:07
Threat Intelligence with James Mwenda Ndiu
Cyber Shujaa
Threat Intelligence with James Mwenda Ndiu
51:46
CV Writing with Monica Kanyutu
Cyber Shujaa
CV Writing with Monica Kanyutu
1:19:29
Cloud Security with Joshua Karisa
Cyber Shujaa
Cloud Security with Joshua Karisa
1:13:53
Introduction to DevSecOps with Kiiru Maina
Cyber Shujaa
Introduction to DevSecOps with Kiiru Maina
1:23:06
Fraud and Risk Analysis with Beatrice Joy Ngumo
Cyber Shujaa
Fraud and Risk Analysis with Beatrice Joy Ngumo
1:14:25
WK 1  INTRODUCTION & BRANDING
Cyber Shujaa
WK 1 INTRODUCTION & BRANDING
1:11:33
Understanding Cybersecurity Fundamentals with Rodney Somoire
Cyber Shujaa
Understanding Cybersecurity Fundamentals with Rodney Somoire
1:24:02
Leveraging Online Opportunities with Gamuchirai Muchafa
Cyber Shujaa
Leveraging Online Opportunities with Gamuchirai Muchafa
59:03
WK 1  Introduction & Branding Morning 20250131 091419 Meeting Recording
Cyber Shujaa
WK 1 Introduction & Branding Morning 20250131 091419 Meeting Recording
1:11:33
Starting a Cybersecurity Career with Bewes Mungai
Cyber Shujaa
Starting a Cybersecurity Career with Bewes Mungai
1:38:46
IT Remote Work Opportunities with Patrick Odhiambo
Cyber Shujaa
IT Remote Work Opportunities with Patrick Odhiambo
1:26:02
Professional Ethics with Hope Nduta
Cyber Shujaa
Professional Ethics with Hope Nduta
1:27:36
Interview Preparation with Jane Akoth and Monica Kanyutu
Cyber Shujaa
Interview Preparation with Jane Akoth and Monica Kanyutu
1:30:10
The Significance of Data Protection with Melody Malusi
Cyber Shujaa
The Significance of Data Protection with Melody Malusi
1:25:27
Day 3 Q&A  Session for Cyber Threat Management (2:00-4 pm)
Cyber Shujaa
Day 3 Q&A Session for Cyber Threat Management (2:00-4 pm)
1:05:17
Day 4 Session 5 Interviewing Skills (11:30 am-1:00 pm)
Cyber Shujaa
Day 4 Session 5 Interviewing Skills (11:30 am-1:00 pm)
1:27:08
Day 4 Session 4: Mastering Soft Skills (9:00-11:00 am)
Cyber Shujaa
Day 4 Session 4: Mastering Soft Skills (9:00-11:00 am)
2:06:11
Day 2 Session 1&2 : Personal Branding: LinkedIn & Professional Presence (9:00-11:00 am)
Cyber Shujaa
Day 2 Session 1&2 : Personal Branding: LinkedIn & Professional Presence (9:00-11:00 am)
1:52:29
Day 3 Session 3 Building a Winning Cybersecurity Resume (9:00-11:00 am)
Cyber Shujaa
Day 3 Session 3 Building a Winning Cybersecurity Resume (9:00-11:00 am)
1:37:03
Cyber Shujaa Women's Bootcamp 30th October 2024 Session 3- Building a Winning Cybersecurity Resume
Cyber Shujaa
Cyber Shujaa Women's Bootcamp 30th October 2024 Session 3- Building a Winning Cybersecurity Resume
1:37:03
Cyber Shujaa Women's Bootcamp  29th October-Personal Branding
Cyber Shujaa
Cyber Shujaa Women's Bootcamp 29th October-Personal Branding
1:52:29
Threat Modelling with Kiiru Maina
Cyber Shujaa
Threat Modelling with Kiiru Maina
1:31:13
Network Penetration Testing with Mathew Macharia
Cyber Shujaa
Network Penetration Testing with Mathew Macharia
1:32:47
Secure Software Development with Charles Njuguna
Cyber Shujaa
Secure Software Development with Charles Njuguna
1:08:59
Becoming an Information Systems Auditor with Michael Mwangi
Cyber Shujaa
Becoming an Information Systems Auditor with Michael Mwangi
1:18:46
Building a Career in Cybersecurity with Job Okello
Cyber Shujaa
Building a Career in Cybersecurity with Job Okello
1:18:40
Cyber Shujaa 4th Graduation
Cyber Shujaa
Cyber Shujaa 4th Graduation
4:22:43
Cyber Shujaa 4th Graduation
Cyber Shujaa
Cyber Shujaa 4th Graduation
Mobile App Assessment with Collins Wanjohi
Cyber Shujaa
Mobile App Assessment with Collins Wanjohi
1:19:38
IT Risk and Compliance with Kelvin Saitoti
Cyber Shujaa
IT Risk and Compliance with Kelvin Saitoti
1:36:59
Digital Forensics with Daniel Ndegwa
Cyber Shujaa
Digital Forensics with Daniel Ndegwa
1:13:19
AWS Cloud Security with Kevin Tuei
Cyber Shujaa
AWS Cloud Security with Kevin Tuei
1:29:45
Interview Preparation with Cynthia Njoroge
Cyber Shujaa
Interview Preparation with Cynthia Njoroge
1:17:10
Cyber Risk and Data Privacy with Joy Naeku
Cyber Shujaa
Cyber Risk and Data Privacy with Joy Naeku
1:05:36
Planning Your Career Journey: Strategies for Long-Term Success and Impact with Martin M Kamethu
Cyber Shujaa
Planning Your Career Journey: Strategies for Long-Term Success and Impact with Martin M Kamethu
1:11:55
Software Security Specialist WK 5
Cyber Shujaa
Software Security Specialist WK 5
44:44
Software Security Specialist 1B
Cyber Shujaa
Software Security Specialist 1B
2:07:20
Software Security Specialist 1A
Cyber Shujaa
Software Security Specialist 1A
1:46:06
Software Security Specialist Wk 4
Cyber Shujaa
Software Security Specialist Wk 4
1:32:37
Software Security Specialist WK 2 & 3
Cyber Shujaa
Software Security Specialist WK 2 & 3
1:32:42
Network Security with Maureen Gate
Cyber Shujaa
Network Security with Maureen Gate
1:12:52
Introduction to Application Security with Kiiru Maina
Cyber Shujaa
Introduction to Application Security with Kiiru Maina
1:31:54
Data Protection with Gloria Nyaboke
Cyber Shujaa
Data Protection with Gloria Nyaboke
1:14:22
Launching Your Cybersecurity Career with Angelica Kimani
Cyber Shujaa
Launching Your Cybersecurity Career with Angelica Kimani
1:14:19
Identity and Access Management with Kevin Tuei
Cyber Shujaa
Identity and Access Management with Kevin Tuei
1:19:07
Cybersecurity Skills Gap and Career Progression with Stephen Wanjuki
Cyber Shujaa
Cybersecurity Skills Gap and Career Progression with Stephen Wanjuki
1:06:14
Personal Branding with Nancy Muriithi
Cyber Shujaa
Personal Branding with Nancy Muriithi
1:04:57
Cloud Audits with Stephen Robia
Cyber Shujaa
Cloud Audits with Stephen Robia
1:04:57
CV Writing with Stephen N Kiseli
Cyber Shujaa
CV Writing with Stephen N Kiseli
1:33:22
Professional Ethics with Bewes Mungai
Cyber Shujaa
Professional Ethics with Bewes Mungai
1:13:21
Threat Intelligence with John Kuria
Cyber Shujaa
Threat Intelligence with John Kuria
1:04:18
Role of Data Protection in Information Security with Melody Wangechi Malusi
Cyber Shujaa
Role of Data Protection in Information Security with Melody Wangechi Malusi
1:24:21
Software Development Within Cybersecurity with George Kariuki Ngugi
Cyber Shujaa
Software Development Within Cybersecurity with George Kariuki Ngugi
1:00:52
Leveraging Online Opportunities in Technology with Gerald Mwanu
Cyber Shujaa
Leveraging Online Opportunities in Technology with Gerald Mwanu
1:06:27
Starting a career in Cybersecurity with Brenda Kamangara
Cyber Shujaa
Starting a career in Cybersecurity with Brenda Kamangara
1:12:50
Critical Intersection of Data Protection and Cybersecurity with Margaret Ndungu
Cyber Shujaa
Critical Intersection of Data Protection and Cybersecurity with Margaret Ndungu
59:19
Threat Modelling with Tracy Magoma
Cyber Shujaa
Threat Modelling with Tracy Magoma
1:05:06
CV writing with Stephen N Kiseli
Cyber Shujaa
CV writing with Stephen N Kiseli
1:37:57
Navigating a New Workspace with Wangari Macharia
Cyber Shujaa
Navigating a New Workspace with Wangari Macharia
56:36
Risk Management and Business Continuity Strategies with Gloria Nyaboke
Cyber Shujaa
Risk Management and Business Continuity Strategies with Gloria Nyaboke
1:04:28
Secrets Management in Modern Day Applications with Kiiru Maina
Cyber Shujaa
Secrets Management in Modern Day Applications with Kiiru Maina
57:13
Endpoint security and Cyber Security Ethics with David Njuguna
Cyber Shujaa
Endpoint security and Cyber Security Ethics with David Njuguna
1:00:58
How to perform risk assessment in an organization with Javan Khagasi
Cyber Shujaa
How to perform risk assessment in an organization with Javan Khagasi
1:11:09
Career Transitions and Flexibility in the Cybersecurity Field with Mark Smith Karige
Cyber Shujaa
Career Transitions and Flexibility in the Cybersecurity Field with Mark Smith Karige
1:23:51
Building a successful career path in cybersecurity with Stephen Wanjuki
Cyber Shujaa
Building a successful career path in cybersecurity with Stephen Wanjuki
1:28:51
Insights for aspiring cybersecurity professionals with Payne Omari
Cyber Shujaa
Insights for aspiring cybersecurity professionals with Payne Omari
1:30:31
Selecting a Career Path in Cybersecurity with Alexander Gatheca
Cyber Shujaa
Selecting a Career Path in Cybersecurity with Alexander Gatheca
1:07:49
Cybersecurity journey with Allan Victor
Cyber Shujaa
Cybersecurity journey with Allan Victor
1:07:31
Dealing With Rejection in Job Hunting
Cyber Shujaa
Dealing With Rejection in Job Hunting
1:31:57
Cyber Shujaa Career Session
Cyber Shujaa
Cyber Shujaa Career Session
57:18
Cyber Shujaa DevSecOps with Joylynn Kirui
Cyber Shujaa
Cyber Shujaa DevSecOps with Joylynn Kirui
1:03:52
A day in the Life of a SOC Analyst
Cyber Shujaa
A day in the Life of a SOC Analyst
1:15:14
Deep Dive into DevSecOps with Joylynn Kirui
Cyber Shujaa
Deep Dive into DevSecOps with Joylynn Kirui
2:49:00