IFIS Trainings Booking Form

With Practical Skills You Suceed. Please book one of our year training events.

Download our Annual Training Calendar from here

Take a look at all the IFIS courses. Download brochure now.

0 Lessons

Certified Risk Strategy Professional (CRISP)

Today’s global and volatile economy challenges organizations with increasing level of complexity and uncertainty, increasing pace of technological and business changes, escalating compliance requirements, reliance on IT, the complexity of the supply chain, corporate social capital investment, the fragility of reputation and so on have highlighted the vulnerability of organizations to these risk issues.

START COURSE

0 Lessons

Certified Fraud Forensic Professional (CFFP)

CFFP is the world’s most comprehensive fraud investigation using forensic science. A CFFP can handle any kind of investigation covering digital and financial forensics as well as criminal investigations involving fraud.

TAKE COURSE

0 Lessons

Certified Cyber Security Manager (CCSM)

This CCSM (Certified Cyber Security Manager) certification training will give you the requisite skillsets to design, deploy and manage security architecture for your organization.

APPLY NOW

0 Lessons

Certified Business Intelligence Data Analyst (CBIDA)

Data and big data analytics are the lifeblood of any successful business. Getting the technology right can be challenging but building the right team with the right skills to undertake big data initiatives can be even harder.

Accredited Diploma Courses

0 Lessons

Diploma in Risk Management

This is a two-year programme that equips graduates with the knowledge and technical (practical) skills in Risk Management. The duration is broken down into four semesters.

APPLY NOW

0 Lessons

Diploma in Information Security and Computer Forensics

This is a two-year programme that equips students with the knowledge and technical (practical) skills in computer forensics and information security (cybersecurity). The duration is broken down into four semesters.

APPLY FOR DIPLOMA

Explore Short Courses

4 Lessons

Next Generation End-Point Security Protection Practical Class

Learn about integrated endpoint protection, network security risk management and enhanced user behaviour analysis for predictive security protection.

4 Lessons

Protection Mechanisms for Data at Rest

Data at rest has proved to a more lucrative venture for cybercriminals owing to the fact that more volumes of valuable information are easily accessible at rest than when in transit.

5 Lessons

Windows Systems Forensic Analysis

You cannot protect what you do not know, and understanding forensic capabilities and artefacts is a fundamental cog of information security.

7 Lessons

Introduction to Digital Forensics

This is an introductory course that will explain the concepts of computer forensics as well as demonstrations of proper collections of digital evidence.

2 Lessons

Mac and iOS Forensic Analysis and Incident Response

This course aims to enable investigators to investigate the Apple devices they encounter.

0 Lessons

Smartphone Forensics

Take your skills to the next level: it’s time for the good guys to get smarter and for the bad guys to know that their smartphone activity can and will be used against them!

5 Lessons

Mobile Device Security

In a world where smartphones store gigabytes of personally identifiable information, human negligence remains the single biggest threat to the security of your personal and corporate information.

8 Lessons

Cybersecurity for Executives

This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations.

15 Lessons

Introduction to Cybersecurity

This five-day course covers a wide range of baseline topics, including terminology, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles.

From Our Alumni

Latest Blog

Fraud Investigation and Examination
IFIS Main

Write an effective investigation report

Who did what, where, when, and how? An investigation must provide answers to each of these questions concerning the issues at hand. Everyone wants to

Subscribe to Newletter

Subscribe to our newsletter and stay updated with the latest in cybersecurity and digital forensics.