Next Upcoming Event
June 2025
Threat Hunting
Most organizations wait for an attack before responding. This is like locking your door only after a thief has already entered. Threat hunting flips the script. It is not about reacting; it is about actively searching for cyber threats before they cause damage.
19 - 20 Jun
8:00 am - 6:00 pm
July 2025
Cybersecurity Essentials
Course Overview: Cybersecurity Essentials is a comprehensive foundational course designed to provide students with a solid understanding of the fundamental concepts, tools, and best practices needed to navigate the dynamic and rapidly evolving landscape of cybersecurity. Covering a wide array of topics, this course introduces students to network security, data protection, ethical hacking, risk management, and more. Students will learn to identify vulnerabilities, implement effective security measures, and respond to cyber threats through both theoretical lessons and practical exercises. By the end of the course, students will be equipped to safeguard information systems, ensure regulatory compliance, and contribute to building secure digital infrastructures in organizations. This course is an essential stepping stone for anyone pursuing a career in cybersecurity, which is becoming increasingly vital as cyber threats grow in sophistication. Course Objectives: Upon completion of this course, students will: Understand the key principles of cybersecurity, including the importance of confidentiality, integrity, and availability (CIA Triad). Be able to identify and mitigate various types of cyber threats such as malware, phishing, DDoS, and insider threats. Gain a strong foundation in network security, including firewall configuration, VPNs, and intrusion detection/prevention systems. Understand the basics of cryptography, encryption, and secure communication protocols. Learn endpoint security best practices, including antivirus tools, patch management, and endpoint detection. Familiarize themselves with key cybersecurity tools like SIEM, vulnerability scanning, and network monitoring tools. Understand identity and access management, including authentication, access control models, and multi-factor authentication (MFA). Be able to create and implement security policies, disaster recovery plans, and comply with industry regulations. Develop awareness of social engineering tactics and how to build a cybersecurity-conscious organizational culture. Explore emerging trends in cybersecurity, including cloud security, IoT security, and AI-driven security solutions. Course Requirements: No prior experience in cybersecurity is required. Basic knowledge of computer systems and networks is helpful but not mandatory. Access to a computer with an internet connection and the ability to install or use necessary tools (free versions of software will be provided). A keen interest in learning about cybersecurity concepts and practices. Accreditations: Upon successful completion of the course, students will receive a Certificate of Completion in Cybersecurity Essentials. The course may be eligible for Continuing Education Units (CEUs) or Professional Development Units (PDUs) depending on the accrediting institution. Examination and Award: Final Examination: The final exam will consist of both theoretical and practical components. Students will be assessed on their knowledge of core cybersecurity principles, the application of various security measures, and their ability to respond to cyber incidents. Hands-On Project: Students will complete a hands-on project, which includes tasks such as configuring a firewall, performing a vulnerability scan, and simulating a phishing attack. Examination Weights: Final Exam: 40% Hands-On Project: 40% Assignments and Quizzes: 20% Module 1: Introduction to Cybersecurity Topics: Definition and Importance of Cybersecurity Overview of Cyber Threats and Attacks Key Objectives: Confidentiality, Integrity, and Availability (CIA Triad) Cybersecurity Trends and Challenges Learning Outcomes: Understand the importance of cybersecurity in protecting digital assets. Gain familiarity with the CIA Triad and how it applies to security. Identify the current trends and challenges facing the cybersecurity industry. Module 2: Threat Landscape Topics: Types of Cyber Threats: Malware, Phishing, DDoS, Insider Threats, APTs Vulnerabilities and Exploits Risk Assessment Basics Learning Outcomes: Recognize common types of cyber threats and their impacts on organizations. Learn the basics of risk assessment and how to assess vulnerabilities in digital systems. Understand the role of exploits and how attackers use them to gain unauthorized access. Module 3: Fundamentals of Network Security Topics: Networking Basics: IP Addressing, Subnetting, Protocols (HTTP, HTTPS, FTP, SSH) Firewalls and IDS/IPS Virtual Private Networks (VPNs) Wireless Security Learning Outcomes: Understand basic networking concepts such as IP addressing and protocols. Learn about firewalls, IDS/IPS systems, and their role in securing networks. Gain knowledge of VPNs and wireless security protocols. Module 4: Cryptography Essentials Topics: Encryption and Decryption Symmetric vs Asymmetric Encryption Hashing (MD5, SHA-256) Digital Signatures and Certificates Public Key Infrastructure (PKI) Secure Communication Protocols (TLS, SSL) Learning Outcomes: Understand how encryption and decryption protect data confidentiality. Learn the differences between symmetric and asymmetric encryption. Become familiar with cryptographic hashing and its use in securing data. Understand the role of digital signatures, certificates, and PKI in cybersecurity. Module 5: Endpoint Security Topics: Secure Operating Systems (Windows, Linux, macOS) Antivirus and Antimalware Tools Patch Management and Software Updates Endpoint Detection and Response (EDR) Tools Learning Outcomes: Learn how to secure different operating systems and implement endpoint protection. Gain practical experience with antivirus tools and endpoint security measures. Understand the importance of software updates and patch management in preventing vulnerabilities. Module 6: Cybersecurity Tools and Techniques Topics: Security Information and Event Management (SIEM) Vulnerability Scanning and Penetration Testing Network Monitoring Tools (Wireshark, Splunk) Forensics Tools Learning Outcomes: Understand how SIEM tools aggregate and analyze security data. Learn about vulnerability scanning and how to identify security weaknesses in systems. Gain hands-on experience with tools like Wireshark for network monitoring and Splunk for security data analysis. Module 7: Identity and Access Management (IAM) Topics: Authentication Methods (Passwords, Biometrics, MFA) Authorization and Access Control Models Role-Based Access Control (RBAC) Single Sign-On (SSO) and Identity Federation Learning Outcomes: Learn about various authentication methods and how MFA enhances security. Understand authorization models such as RBAC and how they control access to systems. Gain knowledge of SSO and identity federation in managing user access.
10 Jul - 19 Dec
8:00 am - 6:00 pm
August 2025
CERTIFIED FRAUD EXAMINER (August)
The Certified Fraud Examiner (CFE) Training Program equips participants with the essential skills to detect, deter, and prevent fraud in various industries across all sectors of an organization.
09 - 31 Aug
8:00 am - 5:00 pm
Institute of Forensics & ICT Security
4th floor, Block B, Ntinda Complex, Kampala-Uganda
Investigation and Report Writing
An investigation is only as good as its report. If your report is weak, your evidence is useless.
21 - 22 Aug
8:00 am - 6:00 pm
September 2025
Data Protection & Privacy Training for Hospitals & Schools
Why you must attend Hospitals health facilites handle the most sensitive type of data—patient information. A single data breach can expose medical records, violate patient trust, and lead to severe legal consequences. Yet, many hospitals still treat data protection as an afterthought rather than a core function. Medical professionals focus on saving lives. But who is protecting patient data? Many hospitals unknowingly expose confidential information through weak systems, careless handling, and lack of awareness. Compliance with data protection laws is not optional—it is a legal and ethical responsibility. This training will equip hospital administrators, IT staff, and medical practitioners with practical strategies to secure patient data, ensure compliance, and prevent costly data breaches. Key learning outcomes a) Understand data privacy and protection laws and compliance requirements specific to hospitals. b) Learn how patient data is exposed—and how to prevent breaches. c) Discover best practices for securing medical records, electronic health systems, and patient files. d) Identify common hospital data privacy risks and how to mitigate them. e) Explore strategies for secure data handling, storage, and sharing in hospitals. f) Learn how to respond to data breaches and manage risk effectively. g) Understand the role of hospital staff in ensuring patient privacy. h) Work through real-world case studies of data breaches in healthcare settings. Who should attend? a) Hospital and school administrators and management are responsible for compliance and risk. b) Doctors, nurses, medical staff, school administrators and teachers who handle patient data daily. c) IT and cybersecurity teams securing hospital data systems. d) Records and data officers manage patient files and medical records. e) Legal and compliance officers ensure hospitals meet data protection regulations. f) HR personnel handling staff and patient personal data. g) Insurance and billing officers dealing with sensitive financial and medical information. The abandoned patient file A doctor at a private hospital in Kampala left a patient file on his desk. A visitor walked in, took photos of the medical report, and shared them on social media. Within hours, the patient’s confidential HIV status was exposed to the public. The hospital faced a lawsuit, lost credibility, and paid heavy fines. This is how simple lapses cause major privacy violations. Most hospitals do not suffer from hackers—they suffer from careless handling of patient data. This training will teach you how to prevent such incidents before they happen. Secure your spot now A hospital cannot function without patient trust. If patients do not believe their information is safe, they will go elsewhere. Data protection is not just about compliance—it is about safeguarding patient dignity. Next steps: Register now to secure your seat. Limited slots available. Bring your team. Data protection is a shared responsibility. Contact us for group discounts or more details. Act now. A hospital’s greatest asset is its reputation. Protect it.
25 Sep
8:00 am - 6:00 pm
October 2025
International Cyber Security Awareness Month – October 2025
Cybersecurity is no longer an IT issue; it is a business survival issue. Hackers attack systems through users. And the weakest link in any organization is unaware employees who fall for phishing emails, use weak passwords, or unknowingly expose sensitive data.
13 - 17 Oct
8:00 am - 6:00 pm
Cyber Security Conference 2025
Theme: “Securing the Future – AI-Driven Security and Risk Management (Trends, Threats, and Tools)” Date: 16th October 2025 Venue: Speke Resort Munyonyo Fees: UGX 650,000 (Non-members) UGX 500,000 (IFIS Alumni, members and Students). To become a member, enroll on any of our courses here>> or apply for membership here, if you have any international professional certification. Why you must attend Artificial Intelligence (AI) is transforming cybersecurity. But is it securing us, or making us more vulnerable? AI-driven security tools can detect threats faster, predict attacks, and automate defenses. Yet, hackers are also using AI to launch smarter, more adaptive cyber-attacks. The race is on—organizations must stay ahead or risk being left exposed. This conference is for leaders and decision-makers who need to understand how AI is reshaping cybersecurity. It is not just another IT conference—it is where strategy meets innovation, where we discuss real-world threats, tools, and the future of risk management. Cyber threats are no longer theoretical. They are here, evolving, and targeting businesses, governments, and individuals. The question is, are you ready? Key conference highlights a) The AI advantage in cybersecurity – How AI is detecting and preventing cyber threats faster than ever. b) AI-powered cybercrime – How hackers are using AI to automate attacks and bypass security systems. c) Emerging cyber threats of 2025 and beyond – The evolving threat landscape and how to prepare for the unknown. d) AI-driven risk management – How organizations can use AI to assess, predict, and mitigate risks in real time. e) The future of cybersecurity jobs – Will AI replace cybersecurity professionals, or create new opportunities? f) Regulatory and ethical considerations – Balancing AI adoption with data privacy and compliance requirements. g) Practical AI security tools – Live demos and case studies on AI-driven security solutions. h) Expert panel discussions – Insights from top cybersecurity minds on strategy, innovation, and real-world implementation. Who should attend? a) CEOs, CFOs, and business leaders – Cybersecurity is no longer just an IT issue; it is a business survival issue. b) CISOs, IT security professionals, and cybersecurity teams – Stay ahead of AI-driven threats and defenses. c) Risk and compliance officers – Learn how AI is reshaping regulatory compliance and risk management. d) Government and law enforcement agencies – Understand how AI-driven threats impact national security. e) Banking and financial sector professionals – Protect your institution from AI-powered fraud and cyberattacks. f) Healthcare and data-driven industries – Secure patient records, intellectual property, and sensitive data. g) Academics and cybersecurity researchers – Explore AI’s role in the next generation of cybersecurity. h) Tech innovators and startups – Learn how to integrate AI-driven security into products and services. The AI-powered con artist A high-level executive in Kampala received a phone call from his “CEO” asking him to authorize an urgent payment. The voice sounded exactly like the CEO. But it wasn’t. Hackers had used AI voice-cloning technology to impersonate him. By the time the fraud was detected, UGX 22 million had already been transferred. This is not fiction. AI is changing the game, for both security and cybercrime. Spam emails now sound and look very professional. The email redflags of spelling mistakes, and poor grammar have now dissappeared. You must use AI tools to detect AI cybercriminals. Interesting times indeed! The tools that protect us are the same tools criminals are using to attack us. The only way to stay ahead is to understand these technologies—and that is what this conference is about. Secure your spot now The future of cybersecurity is AI-driven. The question is, will you be in control, or will you be a victim? Next steps: Register now, click here >> Bring your team. Cybersecurity is a collective responsibility. Contact us for sponsorship, group discounts, or more details. Take action today. AI is not waiting for you to catch up. Be part of the conversation that secures the future.
16 Oct
8:00 am - 6:00 pm
No event found!