All event times are displayed based on UTC timezone.
Fri, April 11, 2025 12:00 AM

Course Overview:

This course is designed to teach students how to leverage Power BI and Excel for effective data analytics. It covers the fundamentals of data collection, manipulation, and visualization, helping participants turn raw data into valuable insights. By mastering Excel and Power BI’s capabilities, learners will be able to create informative reports and dashboards to aid in data-driven decision-making. Key topics include data cleaning, transformation, advanced formulas, building interactive dashboards, and advanced Power BI features for business intelligence. By the end of this course, participants will have the skills to analyze and present data confidently, with practical knowledge applicable across industries.

Course Objectives:

  1. Equip students with essential Excel skills for data analysis, including advanced formulas and pivot tables.
  2. Teach how to use Power BI to process and visualize data, turning raw information into interactive reports and dashboards.
  3. Develop skills in data cleaning, transformation, and analysis to extract insights from large datasets.
  4. Understand best practices for data visualization and storytelling through dashboards.
  5. Enable students to apply data analytics to make informed, data-driven decisions in any business or industry context

Course Requirements:

  1. Basic understanding of computer use and Microsoft Office.
  2. Access to Microsoft Excel (any version) and Power BI Desktop (free version).
  3. No prior experience in data analysis is required, but familiarity with Excel will be helpful.

Accreditations:

  1. Upon successful completion, participants will receive a Certificate of Achievement in Data Analytics with Power BI and Excel from the institution.
  2. The course may count towards Continuing Education Units (CEUs) or Professional Development Units (PDUs), depending on your institution's accreditation body.

Examination and Award:

  1. Final Examination: A written and practical exam where students must demonstrate their ability to use Excel and Power BI for data analytics and visualization.
  2. Capstone Project Presentation: Submit and present the final data analysis project, showcasing all techniques learned throughout the course.

Examination Weights:

  1. Final Examination: 40%
  2. Capstone Project: 40%
  3. Assignments and Quizzes: 20%

Module 1: Introduction to Data Analytics

Topics:
  1. Overview of Data Analytics: Importance and Applications
  2. Role of Power BI and Excel in Data Analysis
  3. Fundamentals of Data-Driven Decision Making
  4. Key Concepts in Data Analytics (Data Cleaning, Transformation, Visualization)
Learning Outcomes:
  1. Understand the significance of data analytics in business decision-making.
  2. Recognize the role of Excel and Power BI in data analysis.
  3. Develop a foundational understanding of data cleaning, transformation, and visualization processes.

Module 2: Working with Excel for Data Analytics

Topics:
  1. Basic Excel Functions: Worksheets, Cells, and Data Entry
  2. Techniques for Data Cleaning in Excel (Sorting, Filtering, Removing Duplicates)
  3. Advanced Formulas and Functions (VLOOKUP, INDEX, MATCH, IF Statements)
  4. Pivot Tables and Pivot Charts: Creating and Customizing Reports
  5. Conditional Formatting and Data Validation
Learning Outcomes:
  1. Gain proficiency in data entry, cleaning, and preparation using Excel.
  2. Apply advanced formulas and functions to solve data analysis problems.
  3. Use Pivot Tables and Pivot Charts to summarize and present data effectively.
  4. Understand and apply Excel’s data validation and formatting features for better analysis.

Module 3: Power BI Fundamentals

Topics:
  1. Introduction to Power BI and Its Components (Power Query, Power Pivot, Power View)
  2. Connecting and Importing Data into Power BI
  3. Cleaning and Transforming Data with Power BI
  4. Building Basic Visualizations: Charts, Graphs, and Tables
  5. Introduction to Interactive Dashboards in Power BI
Learning Outcomes:
  1. Understand Power BI's interface and key components for data analysis.
  2. Import and prepare data in Power BI for analysis and reporting.
  3. Create basic visualizations, charts, and tables for data presentation.
  4. Develop an understanding of interactive dashboard creation in Power BI.

Module 4: Data Visualization and Reporting

Topics:
  1. Best Practices for Data Visualization (Choosing the Right Visuals)
  2. Customizing Visuals and Reports in Power BI and Excel
  3. Interactive Elements in Power BI: Slicers, Filters, and Drill-Downs
  4. Storytelling with Data: Crafting Meaningful Reports and Dashboards
  5. Publishing and Sharing Reports in Power BI
Learning Outcomes:
  1. Learn to apply data visualization best practices for effective reporting.
  2. Customize charts, tables, and visuals in Excel and Power BI to meet analysis needs.
  3. Build interactive and user-friendly reports and dashboards with filters, slicers, and drill-downs.
  4. Understand how to publish and share Power BI reports with stakeholders.

Module 5: Advanced Power BI Techniques

Topics:
  1. Mastering DAX (Data Analysis Expressions) for Complex Calculations
  2. Forecasting and Trend Analysis in Power BI
  3. Setting Up Alerts and Data-Driven Actions in Power BI
  4. Integrating Power BI with Excel, SQL, and Other Applications
Learning Outcomes:
  1. Learn to use DAX for advanced data analysis and custom calculations in Power BI.
  2. Gain skills in using Power BI for forecasting and trend analysis.
  3. Set up alerts and automate data-driven actions within Power BI.
  4. Integrate Power BI with external data sources, such as Excel and SQL, for more advanced analysis.

Module 6: Capstone Project

Topics:
  1. Data Collection and Problem Definition for Real-World Analysis
  2. Using Power BI and Excel to Analyze and Visualize Data
  3. Report and Dashboard Design: Key Takeaways and Best Practices
  4. Final Assessment: Presenting Your Data Findings
Learning Outcomes:
  1. Apply all concepts learned throughout the course to a real-world dataset.
  2. Design and build an interactive report/dashboard in Power BI and Excel.
  3. Demonstrate the ability to analyze, visualize, and present data insights clearly and effectively.
favorite_border
Fri, April 11, 2025 12:00 AM
Course Overview:
This course is an ideal starting point for beginners interested in pursuing a career in web and graphic design. It combines the technical aspects of web development with the creative elements of graphic design, offering a comprehensive approach to digital design. Students will gain proficiency in web technologies like HTML, CSS, and JavaScript, along with graphic design principles, tools, and techniques. By the end of the course, students will be equipped to create visually appealing and functional websites, design engaging digital assets, and build a professional portfolio. This course emphasizes hands-on projects, preparing students for real-world applications and career opportunities in the web and graphic design industry.
Course Objectives:
Upon successful completion of this course, participants will:
  1. Understand and apply the core principles of web and graphic design, including layout, typography, and color theory.
  2. Gain practical experience using design tools such as Adobe XD, Figma, Photoshop, Illustrator, and Webflow for web and graphic design tasks.
  3. Master HTML, CSS, and JavaScript to create responsive, functional websites.
  4. Understand user experience (UX) and user interface (UI) design principles for designing seamless websites and digital experiences.
  5. Learn the fundamentals of web accessibility, ensuring designs are inclusive and usable for all users.
  6. Build and deploy websites using Content Management Systems (CMS) like WordPress and platforms like GitHub Pages and Netlify.
  7. Develop effective communication skills to collaborate with clients and incorporate feedback into design solutions.
  8. Create a professional portfolio website to showcase skills and work, improving employability or attracting freelance opportunities.
Course Requirements:
  1. No prior experience in web or graphic design is necessary.
  2. Basic computer skills and familiarity with using the internet.
  3. A passion for learning design concepts and a desire to create beautiful, functional websites.
  4. Access to a computer with an internet connection and design software (free trials of Adobe XD, Figma, and other mentioned tools will be provided).
Accreditations:
  • Upon successful completion, participants will receive a Certificate of Achievement in Web and Graphic Design.
  • The course may count towards Continuing Education Units (CEUs) or Professional Development Units (PDUs), depending on the accrediting institution.
Examination and Award:
  • Final Examination: A combination of practical assignments and a written exam covering both web design and graphic design topics. Students will be assessed on their ability to create a fully functional website, apply design principles, and use tools effectively.
  • Capstone Project: A hands-on project where students demonstrate their design and development skills by building a website with both graphic design and web development elements.
Examination Weights:
  1. Final Examination: 40%
  2. Capstone Project: 40%
  3. Assignments and Quizzes: 20%
Module 1: Introduction to Web and Graphic Design
Topics:
  1. The Role of Web and Graphic Designers
  2. Core Design Principles (Balance, Alignment, Contrast, Hierarchy, Proximity)
Learning Outcomes:
  1. Understand the distinctions between web design (creating websites) and graphic design (visual elements for branding, logos).
  2. Apply fundamental design principles to create balanced and visually appealing layouts for both web and graphic design projects.
Module 2: Web Design Fundamentals
Topics:
  1. Overview of Web Technologies (HTML, CSS, JavaScript)
  2. User Experience (UX) and User Interface (UI) Design
  3. Introduction to Design Tools (Adobe XD, Figma, Webflow)
Learning Outcomes:
  1. Gain an understanding of how HTML, CSS, and JavaScript work together to create functional websites.
  2. Learn key principles of UX/UI design to create intuitive and user-friendly websites.
  3. Get hands-on experience with design tools for building wireframes, prototypes, and interface designs for web projects.
Module 3: HTML and CSS Essentials
Topics:
  1. HTML Structure and Elements (Headings, Links, Images, Lists)
  2. CSS Basics and Styling (Text, Colors, Layouts)
  3. Responsive Design with Media Queries
Learning Outcomes:
  1. Master the basics of HTML to build the structure of a webpage, including semantic HTML for better SEO and accessibility.
  2. Learn CSS to style websites, including layout techniques like Flexbox and Grid.
  3. Understand responsive design principles and implement media queries to make websites mobile-friendly.
Module 4: Graphic Design Principles and Tools
Topics:
  1. Typography and Color Theory
  2. Image Editing and Logo Creation (Adobe Photoshop, Illustrator)
  3. Designing for Branding (Visual Identities, Logos, Icons)
Learning Outcomes:
  1. Understand how to choose fonts and color schemes that align with brand messaging and design goals.
  2. Gain proficiency in Photoshop and Illustrator to edit photos, create logos, and design vector graphics.
  3. Learn how to design branding materials like logos and icons that represent businesses and products effectively.
Module 5: Advanced Web Design Techniques
Topics:
  1. Advanced CSS Styling (Animations, Transitions)
  2. Introduction to JavaScript for Designers (Interactivity, Forms, Sliders)
  3. Web Accessibility (WCAG Guidelines, Making Websites Inclusive)
Learning Outcomes:
  1. Enhance your CSS skills by incorporating animations, transitions, and responsive elements to improve website interactivity.
  2. Learn basic JavaScript concepts to add interactive features such as buttons, sliders, and forms to websites.
  3. Understand web accessibility principles and how to design websites that are inclusive and usable by all, including people with disabilities.
Module 6: Content Management Systems (CMS)
Topics:
  1. Setting Up WordPress Websites
  2. Installing Themes and Using Plugins (SEO, Forms, Galleries)
Learning Outcomes:
  1. Learn how to set up and customize a WordPress website, install themes, and utilize plugins for extended functionality.
  2. Understand how to implement basic SEO techniques and optimize content for search engines.
Module 7: Portfolio Development and Web Deployment
Topics:
  1. Building a Personal Portfolio Website
  2. Deploying Websites with GitHub Pages, Netlify, and Web Hosting Providers
Learning Outcomes:
  1. Design and build a personal portfolio website to showcase your web and graphic design projects.
  2. Gain experience in deploying websites using platforms like GitHub Pages, Netlify, and traditional web hosting services.
Module 8: Capstone Project
Topics:
  1. Real-World Web Design Project (Building a Functional Website)
  2. Project Presentation and Feedback
Learning Outcomes:
  1. Apply all the skills learned throughout the course to complete a fully functional website for a hypothetical client, integrating both graphic design and web development elements.
  2. Present your capstone project to peers and instructors for feedback and refinement.
favorite_border
Fri, April 11, 2025 12:00 AM

Course Overview:

Cybersecurity Essentials is a comprehensive foundational course designed to provide students with a solid understanding of the fundamental concepts, tools, and best practices needed to navigate the dynamic and rapidly evolving landscape of cybersecurity. Covering a wide array of topics, this course introduces students to network security, data protection, ethical hacking, risk management, and more. Students will learn to identify vulnerabilities, implement effective security measures, and respond to cyber threats through both theoretical lessons and practical exercises. By the end of the course, students will be equipped to safeguard information systems, ensure regulatory compliance, and contribute to building secure digital infrastructures in organizations. This course is an essential stepping stone for anyone pursuing a career in cybersecurity, which is becoming increasingly vital as cyber threats grow in sophistication.

Course Objectives:

Upon completion of this course, students will:
  1. Understand the key principles of cybersecurity, including the importance of confidentiality, integrity, and availability (CIA Triad).
  2. Be able to identify and mitigate various types of cyber threats such as malware, phishing, DDoS, and insider threats.
  3. Gain a strong foundation in network security, including firewall configuration, VPNs, and intrusion detection/prevention systems.
  4. Understand the basics of cryptography, encryption, and secure communication protocols.
  5. Learn endpoint security best practices, including antivirus tools, patch management, and endpoint detection.
  6. Familiarize themselves with key cybersecurity tools like SIEM, vulnerability scanning, and network monitoring tools.
  7. Understand identity and access management, including authentication, access control models, and multi-factor authentication (MFA).
  8. Be able to create and implement security policies, disaster recovery plans, and comply with industry regulations.
  9. Develop awareness of social engineering tactics and how to build a cybersecurity-conscious organizational culture.
  10. Explore emerging trends in cybersecurity, including cloud security, IoT security, and AI-driven security solutions.

Course Requirements:

  1. No prior experience in cybersecurity is required.
  2. Basic knowledge of computer systems and networks is helpful but not mandatory.
  3. Access to a computer with an internet connection and the ability to install or use necessary tools (free versions of software will be provided).
  4. A keen interest in learning about cybersecurity concepts and practices.

Accreditations:

  • Upon successful completion of the course, students will receive a Certificate of Completion in Cybersecurity Essentials.
  • The course may be eligible for Continuing Education Units (CEUs) or Professional Development Units (PDUs) depending on the accrediting institution.

Examination and Award:

  • Final Examination: The final exam will consist of both theoretical and practical components. Students will be assessed on their knowledge of core cybersecurity principles, the application of various security measures, and their ability to respond to cyber incidents.
  • Hands-On Project: Students will complete a hands-on project, which includes tasks such as configuring a firewall, performing a vulnerability scan, and simulating a phishing attack.

Examination Weights:

  1. Final Exam: 40%
  2. Hands-On Project: 40%
  3. Assignments and Quizzes: 20%
Module 1: Introduction to Cybersecurity
Topics:
  1. Definition and Importance of Cybersecurity
  2. Overview of Cyber Threats and Attacks
  3. Key Objectives: Confidentiality, Integrity, and Availability (CIA Triad)
  4. Cybersecurity Trends and Challenges
Learning Outcomes:
  1. Understand the importance of cybersecurity in protecting digital assets.
  2. Gain familiarity with the CIA Triad and how it applies to security.
  3. Identify the current trends and challenges facing the cybersecurity industry.

Module 2: Threat Landscape

Topics:
  1. Types of Cyber Threats: Malware, Phishing, DDoS, Insider Threats, APTs
  2. Vulnerabilities and Exploits
  3. Risk Assessment Basics
Learning Outcomes:
  1. Recognize common types of cyber threats and their impacts on organizations.
  2. Learn the basics of risk assessment and how to assess vulnerabilities in digital systems.
  3. Understand the role of exploits and how attackers use them to gain unauthorized access.

Module 3: Fundamentals of Network Security

Topics:
  1. Networking Basics: IP Addressing, Subnetting, Protocols (HTTP, HTTPS, FTP, SSH)
  2. Firewalls and IDS/IPS
  3. Virtual Private Networks (VPNs)
  4. Wireless Security
Learning Outcomes:
  1. Understand basic networking concepts such as IP addressing and protocols.
  2. Learn about firewalls, IDS/IPS systems, and their role in securing networks.
  3. Gain knowledge of VPNs and wireless security protocols.

Module 4: Cryptography Essentials

Topics:
  1. Encryption and Decryption
  2. Symmetric vs Asymmetric Encryption
  3. Hashing (MD5, SHA-256)
  4. Digital Signatures and Certificates
  5. Public Key Infrastructure (PKI)
  6. Secure Communication Protocols (TLS, SSL)
Learning Outcomes:
  1. Understand how encryption and decryption protect data confidentiality.
  2. Learn the differences between symmetric and asymmetric encryption.
  3. Become familiar with cryptographic hashing and its use in securing data.
  4. Understand the role of digital signatures, certificates, and PKI in cybersecurity.

Module 5: Endpoint Security

Topics:
  1. Secure Operating Systems (Windows, Linux, macOS)
  2. Antivirus and Antimalware Tools
  3. Patch Management and Software Updates
  4. Endpoint Detection and Response (EDR) Tools
Learning Outcomes:
  1. Learn how to secure different operating systems and implement endpoint protection.
  2. Gain practical experience with antivirus tools and endpoint security measures.
  3. Understand the importance of software updates and patch management in preventing vulnerabilities.

Module 6: Cybersecurity Tools and Techniques

Topics:
  1. Security Information and Event Management (SIEM)
  2. Vulnerability Scanning and Penetration Testing
  3. Network Monitoring Tools (Wireshark, Splunk)
  4. Forensics Tools
Learning Outcomes:
  1. Understand how SIEM tools aggregate and analyze security data.
  2. Learn about vulnerability scanning and how to identify security weaknesses in systems.
  3. Gain hands-on experience with tools like Wireshark for network monitoring and Splunk for security data analysis.

Module 7: Identity and Access Management (IAM)

Topics:
  1. Authentication Methods (Passwords, Biometrics, MFA)
  2. Authorization and Access Control Models
  3. Role-Based Access Control (RBAC)
  4. Single Sign-On (SSO) and Identity Federation
Learning Outcomes:
  1. Learn about various authentication methods and how MFA enhances security.
  2. Understand authorization models such as RBAC and how they control access to systems.
  3. Gain knowledge of SSO and identity federation in managing user access.
 
favorite_border
Fri, April 11, 2025 09:00 AM

Why you must attend

Cyber threats are growing. Most organizations wait until they are attacked to take action. This is a mistake. A penetration test helps you find weaknesses before hackers do. Ethical hacking is not just for IT teamsit is for anyone serious about security.

Many organizations believe they are secure because they have firewalls and antivirus software. That is not enough. Hackers do not break in; they log in. They exploit weak passwords, social engineering, and overlooked vulnerabilities. Penetration testing reveals the security gaps you do not see.

This training will not just explain penetration testing it will show you how it works. Through hands-on demonstrations and real-world scenarios, you will learn how hackers think and how to stop them. You are advised to bring along your laptop with VM installed or do not worry, we will show you how to set up the environment on your laptop.

Key training outcomes

a) Understand penetration testing and ethical hacking principles.

b) Learn how attackers think and exploit security flaws.

c) Discover the tools and techniques used in real-world penetration tests.

d) Identify weaknesses in networks, applications, and systems before attackers do.

e) Explore different types of attacks, including phishing, password cracking, and privilege escalation.

f) Learn how to conduct penetration tests legally and ethically.

g) Understand reporting and remediation strategies to strengthen security.

Who should attend?

a) IT and cybersecurity professionals who want to improve their skills in penetration testing.

b) Risk and compliance officers responsible for securing organizational systems.

c) System administrators and network engineers looking to enhance security.

d) Auditors and forensic investigators who need to assess security vulnerabilities.

e) Anyone interested in ethical hacking and cybersecurity best practices.

Key talking points

a) The difference between penetration testing and hacking why ethical hacking matters.

b) Why traditional security measures fail against modern cyber threats.

c) Common penetration testing tools and techniques used by professionals.

d) How hackers exploit weak passwords, misconfigurations, and human error.

e) Real-world case studies: How penetration testing uncovered critical vulnerabilities.

f) How to legally conduct penetration tests and report findings effectively.

Register now

Cyber threats are evolving. Your security must evolve too. This training will equip you with the skills to test and protect your systems before an attack happens.

Next steps:

  1. Register now to secure your seat. Limited slots available.
  2. Bring your team. Cybersecurity is a shared responsibility.
  3. Contact us for group discounts or more details.

Make a right call now. The best time to test your security was yesterday. The second best time is now.

Date: 10-11 April 2025

Venue: IFIS (Physical)

Fees: UGX 550,000

favorite_border
Fri, June 13, 2025 09:00 AM

Why you must attend

Fraud is like termites in a wooden house. You do not see the damage until the structure collapses. By then, it is too late. Many organizations wait for fraud to happen before taking action. This approach is costly. According to the ACFE’s Occupational Fraud 2024: A Report to the Nations, organizations lose an estimated 5% of their annual revenue to fraud. That is not just money lost, it is trust, reputation, and business stability at risk. A fraud risk management framework is not just about catching thieves. It is about building strong internal controls that make fraud difficult in the first place. This course will equip you with the tools to detect, deter, and prevent fraud before it cripples your organization.

Key training outcomes

a) Understand the full impact of fraud and why many organizations fail to detect it. b) Learn how fraudsters operate and the loopholes they exploit. c) Discover the key components of a fraud risk management framework. d) Identify red flags and early warning signs of fraud before it escalates. e) Learn introduction to digital forensic techniques to investigate and prevent fraud. f) Explore case studies of organizations that suffered fraud and how they recovered. g) Understand regulatory expectations and how to protect your organization from legal and financial risks.

Who should attend?

a) CEOs, board members, and senior executives who need to strengthen fraud controls. b) Risk and compliance officers responsible for fraud prevention strategies. c) Internal auditors and forensic investigators who need to uncover and analyze fraud risks. d) Finance managers and accountants who handle transactions and financial reporting. e) Law enforcement and regulators who investigate fraud cases. f) Business owners and entrepreneurs who need to protect their enterprises from internal fraud.

Key talking points

a) Why traditional fraud detection methods are failing. b) How fraudsters think and operate in organizations. c) The hidden link between weak internal controls and financial loss. d) Real-life fraud cases in Uganda, how they happened and what could have stopped them. e) Building a strong anti-fraud culture in your organization. f) Practical steps to develop a fraud risk management framework.

The storekeeper’s trick

In Kireka surburb, a businessman owned a dry foodshop. Every evening, he counted his stock, and nothing ever seemed missing. Yet, at the end of the year, his profits were much lower than expected. After an investigation, he discovered the trickthe storekeeper was not stealing entire bags. Instead, he removed small scoops of stock every day, so tiny they went unnoticed. Over time, the losses added up to a full warehouse. Fraud works the same way. It starts small. It hides in routine transactions. Have you ever heard of the term “Salami technique?” If you wait to see big losses, you are already too late. This training will show you how to spot the scoops before they become a warehouse full of losses.

Secure your spot now

Fraud does not just drain money—it destroys organizations. The strongest businesses are those that actively detect, deter, and prevent fraud. Next steps:
  1. Register now to secure your seat. Limited slots available.
  2. Bring your team. Fraud prevention is a team effort.
  3. Contact us for group discounts or more details.
Act now. You do not want to find out the hard way how much fraud is costing your organization.
favorite_border
Thu, June 19, 2025 12:00 AM

Why you must attend

Most organizations wait for an attack before responding. This is like locking your door only after a thief has already entered. Threat hunting flips the script. It is not about reacting, it is about actively searching for cyber threats before they cause damage. Cybercriminals do not announce their presence. They hide inside networks, waiting for the right moment to strike. Traditional security tools only catch known threats. But what about the unknown threats lurking in your systems? That is where threat hunting comes in. This course will teach you how to actively seek, identify, and eliminate hidden cyber threats before they become full-blown attacks. You will learn how attackers operate, how to investigate suspicious activity, and how to stay ahead of emerging threats.

Key learning outcomes

a) Understand the fundamentals of threat hunting and why it is essential for modern cybersecurity. b) Learn the different types of cyber threats and how they infiltrate organizations. c) Discover the phases of a threat hunt, from detection to investigation and response. d) Explore the tools and technologies used in real-world threat hunting. e) Develop hands-on skills in detecting malicious activity and analyzing attack patterns. f) Learn how to investigate and respond to advanced cyber threats before they cause harm. g) Understand how threat intelligence improves cybersecurity defenses. h) Gain insights into real-world case studies of successful threat hunts.

Who should attend?

a) Cybersecurity professionals looking to sharpen their skills in proactive defense. b) IT security analysts responsible for monitoring and protecting organizational networks. c) Incident response teams who need to detect and eliminate threats quickly. d) Risk and compliance officers who oversee security policies and threat mitigation. e) System administrators and network engineers looking to improve their security expertise. f) Business leaders and decision-makers who want to understand cyber risks and strengthen defenses.

The hidden snake in the compound

A farmer noticed his chickens were disappearing. At first, he thought it was just bad luck. Then, he saw faint tracks in the dust, something had been coming at night. Instead of waiting for more losses, he decided to investigate. He followed the tracks and found a snake hiding under his granary. It had been taking chickens one by one, unnoticed. Had he waited, he would have lost his entire flock. Threat hunting works the same way. Cyber threats do not always announce themselves. They move quietly, waiting for the right moment to strike. If you are not actively searching, you will only notice them when it is too late. This training will teach you how to find the snake before it strikes.

Secure your spot now

Cyber threats are evolving. Attackers are getting smarter. Your security strategy must evolve too. This training will give you the knowledge and skills to hunt and eliminate cyber threats before they become disasters. Next steps
  1. Register now to secure your seat. Limited slots available.
  2. Bring your team. Threat hunting is more effective when multiple eyes are watching.
  3. Contact us for group discounts or more details to train your team in-house.
Act now. The threats are already inside, the question is, will you find them before they find you? Date: 19-20 June 2025 Venue: Hybrid Fees: UGX 500,000
favorite_border
Thu, July 24, 2025 09:00 AM

Why you must attend

Today, everything is digital, evidence is no longer found only in physical files and paperwork, it is hidden in form of metadata in emails, devices, and networks. Every crime leaves a digital footprint. The challenge is knowing how to find it, collect it, and analyze it properly for purposes of court. Most organizations and individuals struggle with digital evidence. Deleted files, hidden logs, and encrypted data make investigations complex. Without the right skills, critical evidence is lost or ignored. Digital forensics ensures that no trace is left unexplored. This course is hands-on. You will collect and analyze digital evidence using open-source forensic tools. You will learn how investigators track digital crimes, uncover hidden files, and extract valuable insights from devices. Whether you are a beginner or looking to build a foundation in digital forensics, this course will equip you with practical skills that can be applied immediately.

Key learning outcomes

a) Understand the basics of digital forensics and why it is essential in modern investigations. b) Learn how digital evidence is collected, preserved, and analyzed. c) Discover common forensic tools used to investigate digital crimes – open source ones and how to use them well, and the off-the-shelf tools, the differences and how to master both. Remember it is not about the tool, it is about the user of the tool that makes a difference. d) Gain hands-on experience in recovering deleted files and hidden data. e) Learn how to trace digital footprints and uncover crucial evidence. f) Understand the role of digital forensics in cybercrime investigations. g) Explore real-world cases where digital forensics exposed fraud, hacking, and insider threats.

Who should attend?

a) Cybersecurity professionals who want to build skills in digital investigations. b) Law enforcement officers and investigators handling digital evidence. c) Risk and compliance officers involved in fraud detection and cyber risk management. d) IT professionals and system administrators looking to strengthen security and response capabilities. e) Legal professionals who need to understand digital forensics in cases involving cybercrime. f) Students and beginners looking to start a career in digital forensics.

The disappearing ledger

A business owner noticed his money was always short at the end of the day. His cashier swore nothing was missing. Everything on paper balanced. But something felt wrong. Instead of accusing blindly, the owner installed a hidden camera. What he found shocked him, the cashier would steal money, then adjust the sales records to hide the theft. This is exactly how digital crimes happen. Cybercriminals do not erase crimes, they hide them in logs, deleted files, and hidden records. Digital forensics is like the hidden camera, it reveals what really happened. This training will teach you how to find the missing pieces of the digital puzzle.

Secure your spot now

Digital evidence is fragile. If you do not know how to collect and analyze it properly, it will be lost forever. This course will give you the skills to uncover the truth hidden in devices and data. Next steps:
  1. Register today secure your seat. First come, first enrolled.
  2. Bring your team. Digital investigations require collaboration.
  3. Contact us for group discounts or more details.
Act now. In digital forensics, the first mistake is often the last chance to uncover the truth. Make sure you get it right. Remember, digital evidence is volatile. You must act queickly and seamlessly. Date: 24 – 25 July 2025 Venue: IFIS (Physical) Fees: UGX 600,000
favorite_border
Thu, July 24, 2025 09:00 AM

Why you must attend

An investigation is only as good as its report. If your report is weak, your evidence is useless. Many professionals conduct good investigations but fail to document their findings clearly and convincingly. This is where most cases collapse. A poorly written report can let a guilty party walk free, cause an innocent person to suffer, or weaken an organization’s ability to take corrective action. The ability to structure, analyze, and present investigative findings is a skill that separates effective professionals from the rest. I have seen companies literaly begging an employee to resign. They know the person was involved in fraud, but the investigation was poorly done – reads like an internal audit report and therefore cannot withstand detailed scrutiny of an opossing counsel! This training will empower you to make the right decisions and win cases. This course is hands-on. You will write reports based on real-world cases and simulated investigations. You will learn how to gather facts, structure reports, and present evidence in a clear, precise, and defensible manner.

Key learning outcomes

a) Understand the principles of effective investigation and report writing. b) Learn how to collect, organize, and document evidence c) Discover how to write clear, structured, and impactful reports. d) Identify common reporting mistakes that weaken investigations. e) Learn how to present findings convincingly to decision-makers, courts, and stakeholders. f) Understand legal and ethical considerations in investigation reporting. g) Develop practical writing techniques to enhance clarity, accuracy, and persuasiveness. Get a sample investigations report template to guide your report writing effectiveness. h) Work on real-world cases and simulated investigations for hands-on experience.

Who should attend?

a) Law enforcement officers and investigators who need to document cases effectively. b) Internal auditors and forensic examiners responsible for fraud investigations. c) HR professionals handling disciplinary investigations and workplace misconduct. d) Risk and compliance officers tasked with corporate investigations. e) Legal professionals who rely on investigative reports for case preparation. f) Journalists and researchers involved in investigative reporting. g) Business leaders and managers handling internal investigations and decision-making.

Why This Training Matters

1. The Police Officer’s Dilemma – A Case Collapses

A police officer in Kampala arrested a fraud suspect with strong evidence—witness statements, transaction records, and digital footprints. However, when the case reached court, the investigation report was vague, lacked proper documentation, and had contradictions. The judge dismissed the case due to “insufficient evidence.” The officer had done all the work, but the poor report let the criminal go free. This training ensures that well-investigated cases do not collapse because of weak reporting.

2. The HR Manager’s Nightmare – A Wrongful Termination

A company’s HR manager received complaints about a supervisor harassing employees. An internal investigation was done, but the final report was poorly written, lacked structure, and had no clear evidence as most of it was hearsay. The accused supervisor sued for wrongful termination and won the case. The company lost millions in damages. This training teaches HR professionals how to write structured, fact-based reports that stand up to legal scrutiny.

Secure your spot now

A well-written report can win a case, expose wrongdoing, protect an organization, and influence decisions. A poor one can weaken investigations, protect criminals, and cause injustice. This training will equip you with the skills to document findings in a way that is clear, precise, and impossible to ignore. Next steps:
  1. Register now to secure your seat
  2. Bring your team. Strong investigations require strong documentation.
  3. Contact us for group discounts or more details.
Act now. Your investigation is only as good as your report. Make it count. Date: 21-22 August 2025 Venue: Hybrid Fees: UGX 600,000 To register, contact. admissions@forensicsinstitute.org
favorite_border
Investigation and Report Writing
Thu, September 25, 2025 12:00 AM

Why you must attend

Hospitals health facilites handle the most sensitive type of data, patient information. A single data breach can expose medical records, violate patient trust, and lead to severe legal consequences. Yet, many hospitals still treat data protection as an afterthought rather than a core function. Medical professionals focus on saving lives. But who is protecting patient data? Many hospitals unknowingly expose confidential information through weak systems, careless handling, and lack of awareness. Compliance with data protection laws is not optional, it is a legal and ethical responsibility. This training will equip hospital administrators, IT staff, and medical practitioners with practical strategies to secure patient data, ensure compliance, and prevent costly data breaches.

Key learning outcomes

a) Understand data privacy and protection laws and compliance requirements specific to hospitals. b) Learn how patient data is exposed—and how to prevent breaches. c) Discover best practices for securing medical records, electronic health systems, and patient files. d) Identify common hospital data privacy risks and how to mitigate them. e) Explore strategies for secure data handling, storage, and sharing in hospitals. f) Learn how to respond to data breaches and manage risk effectively. g) Understand the role of hospital staff in ensuring patient privacy. h) Work through real-world case studies of data breaches in healthcare settings.

Who should attend?

a) Hospital and school administrators and management responsible for compliance and risk. b) Doctors, nurses, medical staff, school administrators and teachers who handle patient data daily. c) IT and cybersecurity teams securing hospital data systems. d) Records and data officers managing patient files and medical records. e) Legal and compliance officers ensuring hospitals meet data protection regulations. f) HR personnel handling staff and patient personal data. g) Insurance and billing officers dealing with sensitive financial and medical information.

The abandoned patient file

A doctor at a private hospital in Kampala left a patient file on his desk. A visitor walked in, took photos of the medical report, and shared them on social media. Within hours, the patient’s confidential HIV status was exposed to the public. The hospital faced a lawsuit, lost credibility, and paid heavy fines. This is how simple lapses cause major privacy violations. Most hospitals do not suffer from hackers—they suffer from careless handling of patient data. This training will teach you how to prevent such incidents before they happen.

Secure your spot now

A hospital cannot function without patient trust. If patients do not believe their information is safe, they will go elsewhere. Data protection is not just about compliance, it is about safeguarding patient dignity. Next steps:
  1. Register now to secure your seat. Limited slots available.
  2. Bring your team. Data protection is a shared responsibility.
  3. Contact us for group discounts or more details.
Act now. A hospital’s greatest asset is its reputation. Protect it. Venue: Hybrid Fees: UGX 250,000
favorite_border
You have been successfully Subscribed! Ops! Something went wrong, please try again.

About Us

 we specialize in bridging the gap between knowledge and application.

Quick links

Contact Us

Cyber Security Conference

Experiences & Testimonials

Resources

Free Downloads

Surveys

Quizzes

Recent news

  • All Post
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd