#about us

Learn More About
us

Our mission is to bridge the training, placement and retention gap for the youth in IT and cyber security career paths

Explore Me

Who we Are

What We Are

Cyber Shujaa project is a youth focused program that is spearheaded and funded by Serianu Limited, Kenya Bankers Association (KBA), United States International University -Africa (USIU-A) and Challenge Fund for Youth Employment (CFYE) based out of Netherlands. Over the last 6 years we have been engaged in a series of research activities to understand the gaps within ICT and Cybersecurity sector in Africa.

The Cyber Shujaa program seeks to address the above challenges. We are focussed on continuously analysing the market and industry for ICT talent needs, designing practical curriculums for these needs, conducting vigorous training for the participants and market placement of these youth.

Through our consortium, Kenya Bankers Association provides the market intelligence that informs the curriculum development, USIU Africa designs the curriculum and ensures the youth are at the heart of the program while Serianu Limited provides the technical training and immersion.

Our Goal

Here's Our Goals

01

Skills

Upskill 2000 youth in cybersecurity skills (50% female)

02

Decent Jobs

Improve the job decency of 1000 employed youth.

03

Entrepreneurship

Support 30 Cybersecurity entrepreneurs (youth)

04

Academia and Industry

A harmonised cybersecurity employment framework linking the supply (academia) and demand (industry)

Our Courses

Here's what we Offer

Security Analyst Program

The Security Analyst Cohort empowers trainees with practical skills to work as a vulnerability assessor, penetration tester or as a security operations center analyst.

Data Protection Program

The Data Protection Officer Training equips trainees with practical skills to work as a Data governance, Data Protection Officers, and Data Privacy Professional within the organisation.

Cloud security program

The cloud security track addresses a growing workforce demand for cloud security specialists who are grounded well on network and infrastructure security concepts.

Our Story

Here's our Success so far

card-logo

The Security Analyst Program has had more than 200 graduates, 80 from the first cohort and 120 from the second cohort, with 30% being female, successfully complete a work-readiness program that has equipped them with industry- specific cybersecurity skills and soft skills training.

Students from this program are expected to take up jobs as security analysts, auditors, vulnerability assessors, penetration testers, security operation centre staff, incident responders and forensic investigators.

They would be responsible for analysing an organization's controls by performing technical and non-technical security assessments and preparing reports of their findings with accompanying remediation recommendations to strengthen the security posture of information systems.

The training was delivered online for the last 12 weeks with 80% of the content being practical hands-on labs.

We have partnered with organisations and recruitment firms for job placements. 40 Graduates have already been placed in various organisations ranging from banks, corporate and also consulting firms. More are being called for interviews with the hope of securing employment. We are encouraging them to also apply for online job opportunities from all around the world. Those who want to be self- employed will be taken through a business incubation period that should help them roll out and strengthen their businesses.


card-logo

For the Data Protection Program there are ninety eight (112) graduates who have gone through the training. We have had three cohorts so far, One in May, the second in June and the third in October.

The Data Protection implementation course was designed to guide individuals to acquire the necessary knowledge and skills to serve as a Data Protection Officer (DPO), set up the necessary organisational framework for a Data Protection regime and help organisations ensure compliance with local and international Data Protection Regulations requirements.

The course was run in a hybrid format with physical and four Online Weekly Project feedback sessions. Trainees were from all the 47 Banks and were drawn from Risk, IT, Security, and Compliance or Legal functions for the training.


card-logo

For the Cloud and Network security Training we celebrate the first graduating cohort of Cloud and Network Security specialists. In the last couple of years, there has been a great push towards cloud adoption. This is because, with cloud computing, organizations are able to roll out systems quickly, with a faster time to market while incurring minimal capital expenditure and having an outsourced model of shared technology services that need to be refreshed at least every 3 years.celebrate the first graduatingcohort of Cloud and NetworkSecurity specialists. In the lastcouple of years, there has beena great push towards cloudadoption. This is because, withcloud computing, organizationsare able to roll out systemsquickly, with a faster time tomarket while incurring minimalcapital expenditure and havingan outsourced model of sharedtechnology services that need tobe refreshed at least every 3 years.

Over the last 12 weeks, we have had immersive hands-on lessons on: how to secure network layers 1 to 7 using a defense-in-depth approach, cloud governance, cloud security architectures, frameworks and best practices for risk management, identity and access management, securing compute services, securing remote access, securing cloud data, DevSecOps, monitoring and incident response.

Specialists graduating from this track will be poised to take up jobs relating to: strategic cloud maturity model adoption, informed shared responsibility, cloud governance, secure architecture design, best practice controls implementation, defense-in-depth security, technical and non-technical risk audits, vulnerability assessments of existing implementations, threat hunting and continuous monitoring of cloud deployments.

This track aims to develop skills on preparation of security assessment and remediation reports that clearly communicate to management in order to strengthen the security posture of cloud deployments while ensuring organizations achieve their business goals.

We have been very privileged to receive support from Microsoft who have provided all 60 participants free access tokens to practice with cloud services on the Microsoft Azure and Dev Ops portals. All graduates from this track will be sponsored with vouchers sit the AZ-500 exam on Microsoft Azure Security Technologies.u

In addition, with the support of USIU-Africa the participants have also been able to take up the Cisco Cloud Security course which will enable them to obtain the vendor- neutal Certificate of Cloud Security Knowledge training developed by Cloud Security Alliance.

We truly believe these graduates are going to be top specialists in cloud and network security protecting deployments not just in our region but also across the world.