Course News & Blogs
- All Posts
- Blog
- Career Management
- Computer Security
- Cyber Defence
- Cyber Incidence Response
- Cyber Preparedness
- Cyber Security
- Data Privacy
- Endpoint Security
- Fraud Investigation and Examination
- Fraud Management
- IT Security Audit
- Marketing
- Mobile Security
- Training
- UX/UI Design
- Web Development
Mr Strategy’s Memo on fraud risk Have you ever been accused of a crime you never committed? Imagine waking up...
There’s a pervasive myth in boardrooms and IT departments alike: that with enough investment, training, and fancy software, a company...
Every fraud starts as a ‘necessary adjustment.’ Then it becomes a habit. Then it becomes the business model. Carter’s, a...
Every company has its secrets. Undue enrichment is usually part of them. Stories about a top honcho who stole large...

In an era where financial transactions are becoming increasingly complex and digital, fraud has evolved into one of the most...
In the overcrowded world of cybersecurity certifications, everyone is chasing acronyms you know several. They look good on a LinkedIn...
Umoja SACCO, a mid-sized financial cooperative with 15,000 members, faced growing cybersecurity threats as it digitized its services. It needed...
Dear Executive Team, Cybersecurity doesn’t have to mean writing a blank check. The conventional wisdom screams for bloated Security Operations...

In the digital age, the Internet has become an essential part of daily life, offering numerous opportunities for economic growth,...

Who did what, where, when, and how? An investigation must provide answers to each of these questions concerning the issues...

Application monitoring just like overall network monitoring is a vital IT function for corporate organizations. From employee productivity with the...

Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...

Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of...

Protecting company data, sensitive and high priority information, corporate networks, software, company equipment, and personnel is what makes physical security....

Did you know that 99.7% of applications have at least one vulnerability! Findings from Verizon’s 2020 Data Breach Investigations Report...

In this digital generation, the great shift to mobile devices and technology adoption has tremendously changed our mode of interaction....

In the good old days, before COVID19, the easiest way to keep children from online dangers was to not give...
Career skills that work at IFIS
Enhance your career with courses in Cybersecurity, Fraud Risk Management, and Personal Productivity. Gain the skills to protect systems, manage risks, and optimize your performance. Start today to stay ahead in a competitive job market!

- Intermediate
- Certification
Certified Business Intelligence Data Analyst (CBIDA)

- Intermediate
- Certification
CERTIFIED RISK STRATEGY PROFESSIONAL(CRISP)

- Intermediate
- Certification
CERTIFIED FRAUD FORENSIC PROFESSIONAL (CFFP)

- Intermediate
- Certification