Thales Cybersecurity Academy

Cybersecurity Training & Certification

Thales Cybersecurity solutions form the foundation of security in today’s digital landscape, where cloud, data, and software are at the core of every organization. The Thales Cybersecurity Academy provides comprehensive technical training and certification programs designed specifically for customers and partners who want to maximize the value of Thales technologies. Delivered by our expert instructors with extensive field experience, the Academy’s training portfolio equips participants with the knowledge and practical skills needed to successfully deploy, integrate, and manage Thales cybersecurity solutions. Through structured courses, hands-on labs, and industry best practices, our programs enable organizations to accelerate implementation, strengthen operational expertise, and confidently stay ahead of evolving cybersecurity challenges.

Check out our latest catalog: Thales CSP Training Catalog

For more information on any training related inquiries, contact the training team.

Thales Cybersecurity Academy

To register for a specific certification course, visit our:

Cybersecurity Academy Training Calendar

Cybersecurity Academy Learning Options:

Thales’ Cybersecurity Academy offers a structured portfolio of training programs designed to support customers and partners at every stage of their learning journey. Our courses combine expert-led instruction, hands-on labs, and flexible digital learning options to help participants develop the knowledge and practical skills required to successfully deploy, manage, and optimize Thales cybersecurity solutions. 
We offer the following training programs:

Foundational Courses 
Foundational courses introduce the Thales cybersecurity portfolio and provide a high-level understanding of our technologies, solutions, and key security concepts. These courses are ideal for professionals who are new to Thales solutions or who want to build a strong baseline knowledge before progressing to more technical training. Foundational courses are typically delivered through self-paced digital learning, including narrated presentations and short video modules.

Core Courses 
Core courses provide in-depth, product-focused technical training designed to equip participants with the practical knowledge required to deploy and configure Thales cybersecurity solutions. These courses combine theoretical instruction with hands-on lab exercises, allowing learners to install, configure, and operate the relevant products in a guided environment. Core courses can be delivered through instructor-led sessions (online or onsite) or through structured self-paced training depending on the product.

Advanced Courses 
Advanced courses are designed for experienced professionals who want to deepen their expertise and master advanced features, integrations, and operational best practices. These expert-level courses build upon the knowledge gained in Core training and focus on complex deployments, advanced configurations, and real-world implementation scenarios.

NOTE:

  • Completion of the relevant Core course is required before attending Advanced training.
  • Participants who successfully complete the relevant certification exams receive an official certificate and a digital badge recognizing their expertise.

On-Demand E-Learning Library 
Enhance your learning journey with Thales Cybersecurity Academy course subscriptions, designed to provide a flexible and comprehensive approach to professional development. Our subscription model gives learners streamlined access to a wide range of training courses and certification resources, enabling continuous upskilling and the confidence to effectively deploy, manage, and optimize Thales Cybersecurity solutions.

Thales offers three subscription options - On-Demand (eLearning Library), Hybrid, and All-Inclusive - each designed to support flexible learning experiences for individuals and teams.

The On-Demand eLearning Library provides self-paced training that can be accessed anytime, allowing learners to build new skills or reinforce existing knowledge at their own pace. Continuously updated with the latest content, the library includes short expert insights, practical how-to guidance, focused learning modules, and full courses aligned with specific product lines. Each library provides a curated set of resources that helps learners develop a strong understanding of Thales solutions, their architecture, and the integrated security capabilities they deliver.

    Thales Data Security HSM (Hardware Security Module) solutions deliver trusted cryptographic key protection and management for organizations that need to secure sensitive data and meet strict security and compliance requirements. HSMs provide a hardened, tamper-resistant environment for generating, storing, and managing encryption keys, helping prevent unauthorized access and reducing the risk of key compromise. Certified to industry standards such as FIPS 140-2 Level 3 and Common Criteria, Thales HSMs are widely used across highly regulated sectors including finance, government, and telecommunications.

    Our Thales Data Security HSM certification courses provide in-depth technical training on the architecture, deployment, administration, and maintenance of Thales HSM solutions in both on-premises and cloud environments. Through guided instruction and hands-on lab exercises, students gain practical experience installing, configuring, managing, and troubleshooting HSM systems in either a classroom or virtual lab environment.

    These courses are designed for security professionals, system architects, and system administrators responsible for cryptographic infrastructure and secure key management within enterprise environments. They equip participants with the knowledge and practical skills required to confidently deploy and manage Thales HSM solutions.

    For the complete list of courses available across all Thales Data Security - HSM solutions, please refer to our Training Catalog.

    Thales Data Security Encryption solutions provide powerful technologies to protect sensitive information across cloud, on-premises, and hybrid environments. These solutions support a wide range of encryption capabilities (including transparent encryption, tokenization, format-preserving encryption, and centralized key management) helping organizations secure data at rest, in transit, and during processing while meeting strict regulatory and compliance requirements.

    Our Thales Data Security Encryption certification courses provide a technical deep dive into the architecture, deployment, and administration of these encryption platforms. Through a combination of instructor-led content and hands-on labs, participants learn how to install, configure, manage, and troubleshoot encryption solutions across both physical and virtual environments.

    Designed for IT professionals, security architects, and system administrators, these courses provide the practical skills needed to implement and maintain enterprise-grade encryption strategies that protect critical data and support strong security policies.

    For the complete list of courses available across all Thales Data Security - Encryption solutions, please refer to our Training Catalog.

    Thales Application Security solutions, including Imperva technologies, are designed to protect applications, APIs, and the sensitive data they process across modern digital environments. These solutions help organizations defend against evolving cyber threats while maintaining application performance, availability, and regulatory compliance. By integrating capabilities such as encryption, tokenization, and advanced application-layer protection, Thales enables organizations to secure data both within applications and across cloud, on-premises, and hybrid infrastructures.

    Our Application Security certification courses provide technical training on the architecture, deployment, and management of these solutions. Through a combination of instructor-led content and hands-on lab exercises, participants gain practical experience implementing and managing application security technologies that protect web applications, APIs, and databases.

    These courses are designed for security engineers, architects, developers, and system administrators who are responsible for securing modern applications and ensuring that critical business data remains protected.

    For the complete list of courses available across all Thales Application Security solutions, please refer to our Training Catalog.

    Thales Identity & Access Management (IAM) solutions help organizations control and secure access to critical systems and sensitive data across modern IT environments. By providing strong authentication, identity governance, and centralized access management, these solutions enable organizations to enforce security policies, support the principle of least privilege, and reduce the risk of unauthorized access. Thales IAM technologies integrate seamlessly with cloud, on-premises, and hybrid infrastructures, helping organizations maintain secure and compliant identity management frameworks.

    Our Identity & Access Management certification courses focus on the deployment, configuration, and administration of Thales IAM technologies. Through a combination of instructor-led training and hands-on lab exercises, participants gain practical experience implementing authentication solutions and integrating identity controls into existing enterprise environments.

    These courses are designed for security professionals, system administrators, and architects responsible for managing user identities and access policies, equipping them with the knowledge and skills required to deploy and maintain secure IAM solutions.

    For the complete list of courses available across all Thales Identity & Access Management (IAM) solutions, please refer to our Training Catalog.

    Course structure

    Course Structure

    Our courses combine essential theory with practical, hands-on workshops to ensure participants gain both knowledge and real-world skills.

    Course requirement

    Course Requirements

    Suitable for participants with a range of experience levels, from beginners to more experienced professionals.

    Course result

    Certification & Recognition

    Upon passing the certification exam, participants are awarded a verifiable digital badge and certificate that can be shared online to highlight their skills and professional accomplishment.